3Com Switch 4500 PWR 26-Port manuals
Switch 4500 PWR 26-Port
Table of contents
- getting started
- Table Of Contents
- Table Of Contents
- Download the Latest Software and Documentation for Your 3Com Switch
- Related Documentation
- Overview
- Introduction to the Switch 4210 Family PWR Switches
- Introduction to the Switch 4210 Family Non-PWR Models
- Technical Specifications
- SFP Modules Supported for the Switch 4210
- Rack-Mounting the Switch
- Mounting the Switch on a Desktop
- Connecting the Power Cords and the Ground Wire
- Connecting Console Cable
- Methods of Managing a Switch
- Setting Up Overview
- automatic ip configuration using dhcp
- Viewing Automatically Configured IP Information
- Manually Configuring IP Information
- Setting Up Command Line Interface Management
- Setting Up Command Line Interface Management using SSH
- Setting Up SNMP Management
- Default Users and Passwords
- Solving Problems Indicated by LEDs
- Solving Hardware Problems
- Solving Communication Problems
- Solving Fabric Formation Problems
- Upgrade Options
- Contents of the Installation File
- Configuring the Boot Loader and Updating the Boot ROM Using the CLI
- Upgrading from the Boot ROM Menu
- Configuring the Boot Loader Using the Boot Menu
- Null Modem Cable
- Modem Cable
- Register Your Product to Gain Service Benefits
- Contact Us
- Com Network Supervisor
- Com Network Director
- Com Enterprise Management Suite
Switch 4500 PWR 26-Port
Table of contents
- getting started
- Table Of Contents
- Table Of Contents
- Download the Latest Software and Documentation for Your 3Com Switch
- Related Documentation
- Overview
- Introduction to the Switch 4210 Family PWR Switches
- Introduction to the Switch 4210 Family Non-PWR Models
- Technical Specifications
- SFP Modules Supported for the Switch 4210
- Rack-Mounting the Switch
- Mounting the Switch on a Desktop
- Connecting a Redundant Power Supply
- Using Power over Ethernet
- Connecting the Console Cable
- Methods of Managing a Switch
- Setting Up Your Switch
- Viewing Automatically Configured IP Information
- Manually Configuring IP Information
- Setting Up Switch with IP Information
- Setting Up Command Line Interface Management
- Setting Up Web Interface Management
- Web management over network
- Default Users and Passwords
- Problem Solving
- Solving Problems Indicated by LEDs
- Solving Hardware Problems
- Solving Communication Problems
- Solving Fabric Formation Problems
- Null Modem Cable
- Modem Cable
- Register Your Product to Gain Service Benefits
- Contact Us
- Com Network Supervisor
- Com Network Access Manager
- Com Enterprise Management Suite
- Important Safety Information
- L'information de Sécurité Importante
- Información de Seguridad Importante
- Importanti Informazioni di Sicurezza
- Regulatory Notices
Switch 4500 PWR 26-Port
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Before You Start
- About Your CD-ROM
- Related Documentation
- Accessing Online Documentation
- About the Switch 4500
- Summary of Hardware Features
- Gigabit Ports
- Unit LED
- Switch 4500 — Rear View Detail
- Redundant Power System Socket
- i nstalling the s witch
- Package Contents
- Choosing a Suitable Site
- Rack-mounting
- Rack Mounting the Back of your Switch 4500 (PWR only)
- Connecting a Redundant Power Supply to your Switch 4500 PWR
- Specifying the Redundant Power System
- Connecting the Switch to the Redundant Power System
- Connecting the Earthing Cable
- Placing Units On Top of Each Other
- The Power-up Sequence
- Choosing the Correct Cables for the 1000BASE-X SFP Ports
- SFP Operation
- Inserting an SFP Transceiver
- Removing an SFP Transceiver
- Methods of Managing a Switch
- Web Interface Management
- Setting Up Overview
- IP Configuration
- Preparing for Management
- Manually Configuring IP Information
- Connecting to a Front Panel Port
- Viewing Automatically Configured IP Information
- Using 3Com Network Director
- Setting Up Command Line Interface Management
- Setting Up Command Line Interface Management using SSH
- Setting Up Web Interface Management
- Web Management Over the Network
- Pre-requisites
- How To Interconnect Units
- Guidelines For Interconnecting Units
- Unit Numbering within the Stack
- Solving Problems Indicated by LEDs
- Solving Hardware Problems
- Solving Communication Problems
- Solving Stack Formation Problems
- The Contents of the Executable File
- Backup
- XModem (via the console cable)
- Upgrading from the Bootrom Interface
- TFTP
- XModem
- Bootrom Upgrade
- via TFTP
- Bootrom Upgrade via XModem
- Power Cord Set — Japan
- L'information de Sécurité Importante
- Wichtige Sicherheitsinformationen
- Información de Seguridad Importante
- Importanti Informazioni di Sicurezza
- Null Modem Cable
- Modem Cable
- Switch 4500 (26 Port)
- Switch 4500 (50 Port)
- Switch 4500 PWR (26 Port)
- Switch 4500 PWR (50 Port)
- Earthing Lead
- Register Your Product
- Troubleshoot Online
- Contact Us
Switch 4500 PWR 26-Port
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Conventions
- Related Documentation
- Introduction to the CLI
- CLI Views
- CLI Features
- Supported User Interfaces
- Logging in through the Console Port
- Configuration Example
- Logging in through Telnet
- Telnet Configuration with Authentication Mode Being Scheme
- Logging in Using a Modem
- Logging in through the Web-based Network Management System
- Managing from an NMS
- User Control
- Introduction to Configuration File
- Management of Configuration File
- VLAN Overview
- Port-Based VLAN
- VLAN Configuration
- Configuring a Port-Based VLAN
- Configuring VLAN Management
- Displaying and Maintaining management VLAN configuration
- IP Addressing Overview
- Configuring IP Addresses
- Displaying IP Addressing Configuration
- IP Performance Overview
- Displaying and Maintaining IP Performance Configuration
- Ethernet Port Overview
- Ethernet Port Configuration
- Configuring the Interval to Perform Statistical Analysis on Port Traffic
- Disabling Up/Down Log Output on a Port
- Ethernet Port Configuration Example
- Troubleshooting Ethernet Port Configuration
- Overview
- Link Aggregation Classification
- Aggregation Group Categories
- Link Aggregation Configuration
- Displaying and Maintaining Link Aggregation Configuration
- Port Isolation Overview
- Displaying Port Isolation Configuration
- Port Security Overview
- Port Security Configuration
- Displaying Port Security Configuration
- Introduction to the MAC Address Table
- Managing MAC Address Table
- Configuring MAC Address Table Management
- Displaying MAC Address Table Information
- Configuration Example
- STP Overview
- MSTP Overview
- port state
- Configuring Root Bridge
- Configuring Leaf Nodes
- Performing mCheck Operation
- Configuring Guard Functions
- Configuring Digest Snooping
- Configuring Rapid Transition
- STP Maintenance Configuration
- Displaying and Maintaining MSTP
- Multicast Overview
- Multicast Models
- Multicast Packet Forwarding Mechanism
- IGMP Snooping Overview
- IGMP Snooping Configuration
- Displaying and Maintaining IGMP Snooping
- IGMP Snooping Configuration Examples
- Troubleshooting IGMP Snooping
- Introduction to 802.1x
- Basic 802.1x Configuration
- Advanced 802.1x Configuration
- Displaying and Debugging 802.1x
- Introduction to HABP
- HABP Client Configuration
- System-Guard Configuration
- Displaying and Maintaining the System-Guard Function
- Introduction to AAA
- Introduction to AAA Services
- AAA Configuration Task List
- RADIUS Configuration Task List
- Displaying and Maintaining AAA
- AAA Configuration Examples
- Troubleshooting AAA
- MAC Authentication Overview
- Related Concepts
- MAC Address Authentication Enhanced Function Configuration
- Displaying and Debugging MAC Authentication
- MAC Authentication Configuration Example
- Introduction to ARP
- ARP Configuration
- ARP Configuration Example
- Introduction to DHCP
- DHCP Packet Format
- Protocol Specification
- Introduction to DHCP Snooping
- DHCP Snooping Configuration
- Introduction to DHCP Client
- Displaying DHCP/BOOTP Client Configuration
- ACL Overview
- ACL Configuration
- Example for Upper-layer Software Referencing ACLs
- QoS Supported By Switch 4210 Family
- QoS Configuration
- Mirroring Overview
- Mirroring Configuration Example
- Cluster Overview
- Cluster Configuration Tasks
- Displaying and Maintaining Cluster Configuration
- PoE Overview
- PoE Configuration
- PoE Configuration Example
- Introduction to PoE Profile
- Displaying PoE Profile Configuration
- PoE Profile Configuration Example
- configuration procedure
- SNMP Overview
- Configuring Basic SNMP Functions
- Configuring Trap Parameters
- Enabling Logging for Network Management
- Introduction to RMON
- RMON Configuration
- Displaying RMON
- Introduction to NTP
- NTP Configuration Tasks
- Configuring NTP Implementation Modes
- Configuring Access Control Right
- Configuring NTP Authentication
- Configuring Optional NTP Parameters
- Displaying NTP Configuration
- SSH Overview
- Configuring the SSH Server
- Configuring the SSH Client
- Displaying SSH Configuration
- File System Configuration
- File Attribute Configuration
- Introduction to FTP and SFTP
- FTP Configuration
- SFTP Configuration
- Introduction to TFTP
- TFTP Configuration
- Information Center Overview
- Information Center Configuration
- Displaying and Maintaining Information Center
- Information Center Configuration Examples
- Introduction to Loading Approaches
- Remote Boot ROM and Software Loading
- Basic System Configuration
- Displaying the System Status
- Network Connectivity Test
- Device Management Configuration
- Displaying the Device Management Configuration
- Remote-Ping Overview
- Remote-Ping Configuration
- Remote-Ping Configuration Example
- network diagram
- IPv6 Overview
- IPv6 Configuration Task List
- IPv6 Configuration Example
- Introduction to IPv6 Application
- IPv6 Application Configuration Example
- Troubleshooting IPv6 Application
- DNS Overview
- Configuring Domain Name Resolution
- DNS Configuration Example
- Troubleshooting DNS
- Introduction to Password Control Configuration
Switch 4500 PWR 26-Port
Table of contents
- getting started guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Before You Start
- Conventions
- About the Switch 4500
- Summary of Hardware Features
- BASE-T/ 100BASE-TX Ports
- Console Port
- Unit LED
- Switch 4500 — Rear View Detail
- Redundant Power System Socket
- Package Contents
- Important Steps Before Proceeding
- Specifying the Redundant Power System
- Connecting the Switch to the Redundant Power System
- Connecting the Earthing Cable
- The Power-up Sequence
- Choosing the Correct Cables for the 1000BASE-X SFP Ports
- SFP Operation
- Inserting an SFP Transceiver
- Packing and Shipping the Switch 4500
- Methods of Managing a Switch
- Web Interface Management
- Setting Up Overview
- IP Configuration
- Preparing for Management
- Manually Configuring IP Information
- Connecting to a Front Panel Port
- Viewing Automatically Configured IP Information
- Using 3Com Network Director
- Setting Up Command Line Interface Management
- Setting Up Command Line Interface Management using SSH
- Setting Up Web Interface Management
- Web Management Over the Network
- Pre-requisites
- How To Interconnect Units
- Guidelines For Interconnecting Units
- Unit Numbering within the Stack
- Solving Problems Indicated by LEDs
- Solving Hardware Problems
- Solving Communication Problems
- Solving Stack Formation Problems
- The Contents of the Executable File
- Backup
- XModem (via the console cable)
- Upgrading from the Bootrom Interface
- TFTP
- XModem
- Bootrom Upgrade
- via TFTP
- Bootrom Upgrade via XModem
- Null Modem Cable
- Modem Cable
- Switch 4500 (26 Port)
- Switch 4500 (50 Port)
- Switch 4500 PWR (26 Port)
- Switch 4500 PWR (50 Port)
- Earthing Lead
- Register Your Product
- Troubleshoot Online
- Contact Us
Switch 4500 PWR 26-Port
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- How This Guide is Organized
- Conventions
- Related Documentation
- Product Overview
- Stacking Overview
- Logging In to the Switch
- Setting up Configuration Environment Through Telnet
- Setting up Configuration Environment Through a Dial-up Modem
- Command Line Interface
- Features and Functions of Command Line
- User Interface Configuration
- Displaying and Debugging User Interface
- Ethernet Port Configuration
- Displaying and Debugging Ethernet Port
- Ethernet Port Configuration Example
- Ethernet Port Troubleshooting
- Link Aggregation Configuration
- Displaying and Debugging Link Aggregation
- VLAN Configuration
- Displaying and Debugging VLAN
- VLAN Configuration Example Two
- Voice VLAN Configuration
- Displaying and Debugging of Voice VLAN
- Configuring Voice VLAN with a PC Downstream from Phone
- Step By Step Description
- Voice VLAN in Auto Mode
- Voice VLAN in Manual Mode
- PoE Overview
- PoE Configuration
- Setting the Maximum Power Output on a Port
- Setting the PoE Mode on a Port
- Upgrading the PSE Processing Software Online
- IP Address Configuration
- Configuring IP Address
- Displaying and Debugging IP Address
- IP Address Configuration Example
- Configuring ARP
- Displaying and Debugging ARP
- DHCP Relay
- DHCP Client Configuration
- Displaying and Debugging DHCP Configuration
- DHCP Relay Configuration Example Two
- Troubleshooting DHCP Relay Configuration
- Access Management Configuration
- Displaying and Debugging Access Management
- Access Management via the Web
- UDP Helper Configuration
- Displaying and Debugging UDP Helper Configuration
- IP Performance Configuration
- Displaying and Debugging IP Performance
- IP Routing Protocol Overview
- Selecting Routes Through the Routing Table
- Routing Management Policy
- Static Routes
- Configuring Static Routes
- Example: Typical Static Route Configuration
- Troubleshooting Static Routes
- Configuring RIP
- Displaying and Debugging RIP
- Example: Typical RIP Configuration
- Troubleshooting RIP
- Configuring an IP Routing Policy
- Displaying and Debugging the Routing Policy
- configuration procedure
- Troubleshooting Routing Protocols
- Brief Introduction to ACL
- ACL Supported by the Switch
- Activating ACL
- Advanced ACL Configuration Example
- Basic ACL Configuration Example
- QoS Configuration
- Setting Port Priority
- Setting Port Mirroring
- Setting Traffic Limit
- Displaying and Debugging QoS Configuration
- Port Mirroring Configuration Example
- ACL Control Configuration
- ACL Control Over Users Accessing Switches by SNMP
- Configuring ACL Control for HTTP Users
- IGMP Snooping Overview
- Configuring IGMP Snooping
- Configuring Router Port Aging Time
- Displaying and Debugging IGMP Snooping
- IGMP Snooping Fault Diagnosis and Troubleshooting
- Introduction to Stacking
- Specifying the Stacking VLAN of the Switch
- Saving the Unit ID of Each Unit in the Stack
- Setting an XRN Authentication Mode for Switches
- Stack Configuration Example
- STP Overview
- Configuration BPDU Forwarding Mechanism in STP
- Implement RSTP on the Switch
- RSTP Configuration
- Enable/Disable RSTP on a Switch
- Enable/Disable RSTP on a Port
- Set Priority of a Specified Bridge
- Set Forward Delay of a Specified Bridge
- Set Hello Time of the Specified Bridge
- Specifying the Maximum Transmission Rate of STP Packets on a Port
- Specifying the Path Cost on a Port
- Set the Priority of a Specified Port
- Set mCheck of the Specified Port
- Display and Debug RSTP
- RSTP Configuration Example
- IEEE 802.1X Overview
- X Authentication Process
- Implementing 802.1X on the Switch
- Setting the Port Access Control Mode
- Checking the Users that Log on the Switch via Proxy
- Configuring the Authentication Method for 802.1X User
- Enabling/Disabling a Quiet-Period Timer
- Displaying and Debugging 802.1X
- Centralized MAC Address Authentication
- Centralized MAC Address Authentication Configuration
- Configuring the User Name and Password for Fixed Mode
- Displaying and Debugging Centralized MAC Address Authentication
- AAA and RADIUS Protocol Configuration
- Implementing AAA/RADIUS on the Ethernet Switch
- Creating/Deleting an ISP Domain
- Enabling/Disabling the Messenger Alert
- Configuring Self-Service Server URL
- Disconnecting a User by Force
- Creating/Deleting a RADIUS Scheme
- Configuring RADIUS Accounting Servers and the Related Attributes
- Setting the RADIUS Packet Encryption Key
- Setting Retransmission Times of RADIUS Request Packet
- Setting the Username Format Transmitted to the RADIUS Server
- Configuring the Local RADIUS Authentication Server
- Displaying and Debugging AAA and RADIUS Protocol
- AAA and RADIUS Protocol Configuration Example
- Configuring the Switch 4500
- AAA and RADIUS Protocol Fault Diagnosis and Troubleshooting
- Problem Diagnosis
- File System Overview
- Storage Device Operation
- Configuring File Management
- Saving the Current-configuration
- FTP Overview
- Enabling/Disabling FTP Server
- Displaying and Debugging FTP Server
- FTP Server Configuration Example
- Downloading Files by means of TFTP
- TFTP Client Configuration Example
- Overview
- MAC Address Table Configuration
- Setting the Max Count of MAC Addresses Learned by a Port
- MAC Address Table Management Display Example
- MAC Address Table Management Configuration Example
- Device Management Configuration
- Upgrading BootROM
- Basic System Configuration
- Displaying the State and Information of the System
- Display Diagnostic Information
- Introduction to Remote-ping
- Remote-ping Configuration
- Configuration Example
- Logging Function
- Info-Center Configuration
- Sending the Information to Loghost
- Sending the Information to Control Terminal
- Sending the Information to the Log Buffer
- Sending the Information to the Trap Buffer
- Sending the Information to SNMP Network Management
- Configuration examples of sending logs to Unix loghost
- Configuration examples of sending log to Linux loghost
- Configuration Examples of Sending Log to Control Terminal
- SNMP Versions and Supported MIB
- Configuring SNMP
- Setting Community Name
- Setting the Destination Address of Trap
- Setting/Deleting an SNMP Group
- Creating/Updating View Information or Deleting a View
- SNMP Configuration Example
- Reading Usmusr Table Configuration Example
- Configuring RMON
- Adding/Deleting an Entry to/from the Alarm Table
- Adding/Deleting an Entry to/from the Extended RMON Alarm Table
- RMON Configuration Example
- Applications of NTP
- Implementation Principle of NTP
- NTP Implementation Modes
- Configuring NTP Implementation Modes
- Configuring Access Control Right
- Configuration Procedure
- Configuring Optional NTP Parameters
- Displaying and Debugging NTP
- Configuring NTP Peer Mode
- network diagram
- Configuring NTP Multicast Mode
- Configuring NTP Server Mode with Authentication
- SSH Terminal Service
- SSH Server Configuration
- SSH Client Configuration
- Configuring the Device as an SSH Client
- SSH Server Configuration Example
- SSH Client Configuration Example
- encryption algorithm
- SFTP Service
- SFTP Client Configuration
- SFTP Configuration Example
- Introduction to Password Control Configuration
- Password Control Configuration
- Configuring Password Aging
- Configuring the Minimum Password Length
- Configuring User Login Password in Encryption Mode
- Configuring the Timeout for User Password Authentication
- Displaying Password Control
- Introduction
- Bootrom Interface
- Skipping the Current Configuration File
- Bootrom Password Recovery
- Setting Up a RADIUS Server
- Configuring Funk RADIUS
- Configuring FreeRADIUS
- Setting Up the RADIUS Client
- Windows 2000 Built-in Client
- Cisco Secure ACS (TACACS+) and the 3Com Switch 4500
- Adding a 3Com Switch 4500 as a RADIUS Client
- Adding a User for Network Login
- Adding a User for Switch Login
Switch 4500 PWR 26-Port
Table of contents
- command reference guide
- about this manual
- related documentation
- Table of Contents
- Table Of Contents
- Table Of Contents
- login commands
- auto-execute command
- display telnet-server source-ip
- display telnet source-ip
- display users
- display web users
- free user-interface
- history-command max-size
- ip http shutdown
- protocol inbound
- set authentication password
- telnet ipv6
- telnet source-interface
- telnet-server source-interface
- user privilege level
- cli configuration commands
- display history-command
- super password
- commands for user control
- ip http acl
- snmp-agent usm-user
- Table of Contents
- Table Of Contents
- configuration file management commands
- display current-configuration vlan
- display saved-configuration
- display startup
- display this
- reset saved-configuration
- startup saved-configuration
- Table of Contents
- Table Of Contents
- vlan configuration commands
- display vlan
- display port
- port access vlan
- port hybrid pvid vlan
- port link-type
- port trunk permit vlan
- port trunk pvid vlan
- Table of Contents
- Table Of Contents
- ip address configuration commands
- display ip interface brief
- ip host
- ip performance optimization configuration commands
- display fib ip-address
- display fib acl
- display fib
- display fib statistics
- display icmp statistics
- display ip socket
- display ip statistics
- display tcp statistics
- display tcp status
- display udp statistics
- icmp redirect send
- icmp unreach send
- reset tcp statistics
- tcp timer syn-timeout
- tcp window
- Table of Contents
- Table Of Contents
- voice vlan configuration commands
- display voice vlan status
- voice vlan
- voice vlan aging
- voice vlan enable
- voice vlan mac-address
- voice vlan mode
- voice vlan security enable
- Table of Contents
- Table Of Contents
- port basic configuration commands
- copy configuration
- display brief interface
- display interface
- display link-delay
- display port combo
- display unit
- flow interval
- jumboframe enable
- loopback-detection control enable
- loopback-detection enable
- loopback-detection interval-time
- reset counters interface
- speed auto
- Table of Contents
- Table Of Contents
- link aggregation configuration commands
- display link-aggregation summary
- display link-aggregation verbose
- display lacp system-id
- lacp enable
- lacp system-priority
- link-aggregation group mode
- port link-aggregation group
- reset lacp statistics
- port isolation configuration commands
- Table of Contents
- Table Of Contents
- port security commands
- display port-security
- mac-address security
- port-security authorization ignore
- port-security enable
- port-security intrusion-mode
- port-security max-mac-count
- port-security ntk-mode
- port-security oui
- port-security port-mode
- port-security timer disableport
- port-security trap
- Table of Contents
- Table Of Contents
- dldp configuration commands
- dldp authentication-mode
- dldp interval
- dldp reset
- dldp work-mode
- dldp delaydown-timer
- mac address table management configuration
- standby detect-group
- Table of Contents
- Table Of Contents
- mstp configuration commands
- display stp
- display stp abnormalport
- display stp portdown
- display stp region-configuration
- display stp root
- reset stp
- stp bpdu-protection
- stp compliance
- stp config-digest-snooping
- stp cost
- stp dot1d-trap
- stp edged-port
- stp loop-protection
- stp mcheck
- stp mode
- stp pathcost-standard
- stp point-to-point
- stp port priority
- stp portlog
- stp priority
- stp root primary
- stp root secondary
- stp root-protection
- stp tc-protection
- stp timer forward-delay
- stp timer hello
- stp timer max-age
- stp timer-factor
- stp transmit-limit
- Table of Contents
- Table Of Contents
- Table Of Contents
- ip routing table commands
- routing table
- display ip routing-table acl
- display ip routing-table ip-address
- display ip routing-table ip-address1 ip-address
- display ip routing-table protocol
- display ip routing-table radix
- display ip routing-table statistics
- display ip routing-table verbose
- reset ip routing-table statistics protocol
- static route configuration commands
- ip route-static
- rip configuration commands
- default cost
- display rip interface
- filter-policy export
- filter-policy import
- rip authentication-mode
- rip input
- rip metricin
- rip output
- rip version
- rip work
- ip routing policy configuration commands
- apply tag
- display route-policy
- if-match { acl | ip-prefix
- if-match interface
- if-match ip next-hop
- ip ip-prefix
- Table of Contents
- Table Of Contents
- common multicast configuration commands
- display multicast-source-deny
- mac-address multicast vlan
- unknown-multicast drop enable
- igmp snooping configuration commands
- display igmp-snooping group
- display igmp-snooping statistics
- igmp-snooping fast-leave
- igmp-snooping general-query source-ip
- igmp-snooping group-limit
- igmp-snooping group-policy
- igmp-snooping host-aging-time
- igmp-snooping nonflooding-enable
- igmp-snooping querier
- igmp-snooping query-interval
- igmp-snooping version
- igmp-snooping vlan-mapping
- multicast static-group interface
- multicast static-group vlan
- multicast static-router-port
- multicast static-router-port vlan
- reset igmp-snooping statistics
- Table of Contents
- Table Of Contents
- Table Of Contents
- x configuration commands
- the switch
- dot1x authentication-method
- dot1x dhcp-launch
- dot1x guest-vlan
- dot1x handshake
- dot1x max-user
- dot1x port-control
- dot1x port-method
- dot1x retry
- dot1x retry-version-max
- dot1x re-authenticate
- dot1x supp-proxy-check
- dot1x timer
- dot1x timer reauth-period
- dot1x version-check
- reset dot1x statistics
- quick ead deployment configuration commands
- dot1x timer acl-timeout
- habp configuration commands
- display habp table
- habp enable
- habp server vlan
- system guard configuration commands
- display system-guard ip-record
- display system-guard tcn state
- system-guard ip detect-threshold
- system-guard ip enable
- system-guard l3err enable
- system-guard tcn enable
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa configuration commands
- accounting optional
- authorization vlan
- cut connection
- display connection
- display domain
- display local-user
- local-user password-display-mode
- radius configuration commands
- accounting-on enable
- calling-station-id mode
- display local-server statistics
- display radius statistics
- display stop-accounting-buffer
- local-server nas-ip
- primary accounting
- primary authentication
- radius client
- radius scheme
- radius trap
- reset radius statistics
- reset stop-accounting-buffer
- retry realtime-accounting
- secondary accounting
- secondary authentication
- stop-accounting-buffer enable
- timer quiet
- timer realtime-accounting
- timer response-timeout
- ead configuration commands
- Table of Contents
- Table Of Contents
- mac address authentication basic function configuration commands
- mac-authentication interface
- mac-authentication authmode usernameasmacaddress
- mac-authentication authmode usernamefixed
- mac-authentication authpassword
- mac-authentication domain
- reset mac-authentication
- mac address authentication enhanced function configuration commands
- mac-authentication max-auth-num
- mac-authentication timer guest-vlan-reauth
- Table of Contents
- Table Of Contents
- arp configuration commands
- arp static
- arp timer aging
- display arp count
- display arp timer aging
- gratuitous-arp period-resending enable
- reset arp
- Table of Contents
- Table Of Contents
- dhcp relay agent configuration commands
- dhcp relay information enable
- dhcp relay information strategy
- dhcp-security static
- dhcp-server detect
- dhcp-server ip
- display dhcp-server
- display dhcp-server interface
- dhcp snooping configuration commands
- dhcp-snooping information format
- dhcp-snooping information packet-format
- dhcp-snooping information strategy
- dhcp-snooping information vlan circuit-id
- dhcp-snooping information vlan remote-id
- dhcp-snooping trust
- display dhcp-snooping
- dhcp client configuration commands
- ip address dhcp-alloc
- bootp client configuration commands
- ip address bootp-alloc
- Table of Contents
- Table Of Contents
- acl configuration commands
- display acl
- display drv qacl_resource
- display packet-filter
- display time-range
- packet-filter vlan
- rule (for basic acls)
- rule (for advanced acls)
- rule (for layer 2 acls)
- rule (for user-defined acls)
- rule comment
- Table of Contents
- Table Of Contents
- qos commands
- display qos cos-local-precedence-map
- display qos-interface line-rate
- display qos-interface mirrored-to
- display qos-interface traffic-priority
- display qos-interface traffic-remark-vlanid
- priority trust
- protocol-priority protocol-type
- qos cos-local-precedence-map
- traffic-priority vlan
- mirroring commands
- Table of Contents
- Table Of Contents
- xrn fabric commands
- change unit-id
- display ftm
- display xrn-fabric
- fabric save-unit-id
- fabric-port enable
- ftm fabric-vlan
- xrn-fabric authentication-mode
- set unit name
- Table of Contents
- Table Of Contents
- Table Of Contents
- cluster configuration commands
- ndp enable
- ndp timer hello
- reset ndp statistics
- ntdp configuration commands
- display ntdp device-list
- ntdp enable
- ntdp hop
- ntdp timer
- ntdp timer port-delay
- cluster enable
- cluster switch-to
- cluster-mac syn-interval
- cluster-snmp-agent group v
- cluster-snmp-agent mib-view included
- cluster-snmp-agent usm-user v
- display cluster
- display cluster candidates
- display cluster members
- ftp cluster
- management-vlan synchronization enable
- nm-interface vlan-interface
- reboot member
- enhanced cluster feature configuration commands
- display cluster base-members
- display cluster base-topology
- display cluster black-list
- display cluster current-topology
- topology accept
- topology restore-from
- Table of Contents
- Table Of Contents
- poe configuration commands
- display poe interface power
- display poe powersupply
- display poe temperature-protection
- poe enable
- poe legacy enable
- poe mode
- poe priority
- poe temperature-protection
- poe update
- poe profile configuration commands
- display poe-profile
- udp helper configuration commands
- Table of Contents
- Table Of Contents
- snmp configuration commands
- display snmp-agent group
- display snmp-agent mib-view
- display snmp-agent statistics
- display snmp-agent sys-info
- display snmp-agent trap-list
- enable snmp trap updown
- snmp-agent calculate-password
- snmp-agent local-engineid
- snmp-agent mib-view
- snmp-agent packet max-size
- snmp-agent target-host
- snmp-agent trap enable
- snmp-agent trap ifmib
- snmp-agent trap life
- snmp-agent trap source
- snmp-agent usm-user { v1 | v2c
- snmp-agent usm-user v
- rmon configuration commands
- display rmon event
- display rmon eventlog
- display rmon history
- display rmon prialarm
- display rmon statistics
- rmon alarm
- rmon event
- rmon history
- rmon prialarm
- rmon statistics
- Table of Contents
- Table Of Contents
- ntp configuration commands
- display ntp-service status
- display ntp-service trace
- ntp-service access
- ntp-service authentication enable
- ntp-service authentication-keyid
- ntp-service broadcast-server
- ntp-service max-dynamic-sessions
- ntp-service multicast-client
- ntp-service reliable authentication-keyid
- ntp-service source-interface
- ntp-service unicast-server
- Table of Contents
- Table Of Contents
- ssh commands
- display public-key peer
- display rsa local-key-pair public
- display rsa peer-public-key
- display ssh server
- display ssh server-info
- display ssh user-information
- display ssh-server source-ip
- public-key local create
- public-key local destroy
- public-key local export rsa
- public-key peer
- public-key peer import sshkey
- public-key-code begin
- public-key-code end
- rsa local-key-pair create
- rsa local-key-pair destroy
- rsa peer-public-key import sshkey
- ssh authentication-type default
- ssh client assign
- ssh client first-time enable
- ssh server authentication-retries
- ssh server timeout
- ssh user assign
- ssh user authentication-type
- ssh user service-type
- ssh2 source-interface
- ssh2 source-ip
- ssh-server source-ip
- Table of Contents
- Table Of Contents
- file system configuration commands
- file prompt
- reset recycle-bin
- boot attribute-switch
- boot web-package
- display web package
- configuration file backup and restore commands
- restore startup-configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- ftp server configuration commands
- display ftp-server source-ip
- ftp disconnect
- ftp server enable
- ftp timeout
- ftp-server source-interface
- ftp client configuration commands
- display ftp source-ip
- ftp { cluster | remote-server } source-interface
- ftp { cluster | remote-server } source-ip
- ftp source-interface
- sftp server enable
- sftp timeout
- sftp client configuration commands
- display sftp source-ip
- sftp source-interface
- sftp source-ip
- tftp configuration commands
- tftp get
- tftp put
- tftp tftp-server source-interface
- tftp tftp-server source-ip
- tftp source-ip
- tftp-server acl
- Table of Contents
- Table Of Contents
- information center configuration commands
- display logbuffer
- display logbuffer summary
- info-center channel name
- info-center console channel
- info-center logbuffer
- info-center loghost
- info-center loghost source
- info-center snmp channel
- info-center source
- info-center synchronous
- info-center switch-on
- info-center timestamp
- info-center trapbuffer
- reset logbuffer
- terminal logging
- Table of Contents
- Table Of Contents
- basic system configuration commands
- clock timezone
- display clock
- display debugging
- display version
- system debugging commands
- terminal debugging
- network connectivity test commands
- device management commands
- display cpu
- display fan
- display memory
- display schedule reboot
- display transceiver diagnosis interface
- display transceiver interface
- display transceiver manuinfo interface
- schedule reboot at
- schedule reboot delay
- schedule reboot regularity
- system-monitor enable
- xmodem get
- Table of Contents
- Table Of Contents
- vlan-vpn configuration commands
- vlan-vpn enable
- vlan-vpn inner-cos-trust
- vlan-vpn tpid
- selective qinq configuration commands
- raw-vlan-id inbound
- vlan-vpn vid
- Table of Contents
- Table Of Contents
- ipv6 configuration commands
- display ipv6 host
- display ipv6 interface
- display ipv6 neighbors
- display ipv6 neighbors count
- display ipv6 socket
- display ipv6 statistics
- display tcp ipv6 statistics
- display tcp ipv6 status
- display udp ipv6 statistics
- ipv6 address
- ipv6 address auto link-local
- ipv6 address eui
- ipv6 address link-local
- ipv6 host
- ipv6 nd dad attempts
- ipv6 nd hop-limit
- ipv6 neighbor
- ipv6 neighbors max-learning-num
- ipv6 route-static
- reset ipv6 neighbors
- reset tcp ipv6 statistics
- tcp ipv6 timer syn-timeout
- ipv6 application configuration commands
- tftp ipv
- tracert ipv
- access management configuration commands
- appendix a command index
- Table Of Contents
Switch 4500 PWR 26-Port
Table of contents
- configuration guide
- Table Of Contents
- command conventions
- related documentation
- CLI Configuration
- User Control
- VLAN Configuration
- GVRP Configuration
- Port Isolation Configuration
- DLDP Configuration
- IP Routing Protocol Overview
- RIP Configuration
- Multicast Overview
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- cli configuration
- entering cli through telnet
- com products cli descriptions
- cli view description
- tips on using the cli
- command line error information
- displaying and executing history commands
- undo form of a command
- cli configurations
- configuring command levels
- saving configurations
- logging in to an ethernet switch
- common user interface configuration
- logging in through the console port
- console port login configuration
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- logging in using a modem
- modem connection establishment
- logging in through the web-based network management system
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- logging in through nms
- displaying source ip address configuration
- controlling telnet users
- controlling network management users by source ip addresses
- controlling web users by source ip address
- configuration example
- switching user level
- adopting hwtacacs authentication for user level switching
- configuration examples
- hwtacacs authentication configuration example
- configuration file management
- erasing the startup configuration file
- displaying switch configuration
- vlan overview
- advantages of vlans
- vlan interface
- assigning an ethernet port to specified vlans
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- assigning an ethernet port to a vlan
- configuring the default vlan for a port
- ip addressing configuration
- subnetting and masking
- configuring ip addresses
- configuring static domain name resolution
- ip address configuration example ii
- static domain name resolution configuration example
- introduction to ip performance configuration
- disabling icmp to send error packets
- displaying and maintaining ip performance configuration
- voice vlan configuration
- how switch 4500 series switches identify voice traffic
- setting the voice traffic transmission priority
- security mode of voice vlan
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- port basic configuration
- limiting traffic on individual ports
- configuring flow control on a port
- duplicating the configuration of a port to other ports
- enabling loopback test
- enabling the system to test connected cable
- enabling giant-frame statistics function
- setting the port state change delay
- displaying and maintaining basic port configuration
- troubleshooting ethernet port configuration
- link aggregation configuration
- link aggregation classification
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- configuring a description for an aggregation group
- link aggregation configuration example
- port isolation overview
- port isolation configuration example
- port security configuration
- port security features
- port security configuration task list
- setting the maximum number of secure mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- configuring guest vlan for a port in macaddressoruserloginsecure mode
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security mode macaddresswithradius configuration example
- port security mode userloginwithoui configuration example
- port security mode macaddresselseuserloginsecureext configuration example
- port security mode macaddressanduserloginsecureext configuration example
- guest vlan configuration example
- port binding configuration
- displaying and maintaining port binding configuration
- dldp fundamentals
- performing basic dldp configuration
- resetting dldp state
- displaying and maintaining dldp
- mac address table management
- mac address table management configuration task list
- setting the mac address aging timer
- enabling destination mac address triggered update
- adding a static mac address entry manually
- auto detect configuration
- auto detect basic configuration
- auto detect implementation in vlan interface backup
- configuration example for auto detect implementation with static routing
- configuration example for auto detect implementation with vlan interface backup
- mstp configuration
- rapid spanning tree protocol overview
- mstp implementation on switches
- mstp configuration task list
- configuring root bridge
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the current port as an edge port
- configuring leaf nodes
- configuring a port as an edge port
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring root guard
- configuring loop guard
- configuring digest snooping
- configuring vlan-vpn tunnel
- mstp maintenance configuration
- displaying and maintaining mstp
- mstp configuration example
- vlan-vpn tunnel configuration example
- introduction to ip route and routing table
- routing protocol overview
- displaying and maintaining a routing table
- static route configuration
- displaying and maintaining static routes
- troubleshooting a static route
- rip configuration
- rip configuration task list
- configuring basic rip functions
- rip route control
- configuring rip route control
- rip network adjustment and optimization
- displaying and maintaining rip configuration
- troubleshooting rip configuration
- ip route policy configuration
- defining a route policy
- ip-prefix configuration
- ip route policy configuration example
- troubleshooting ip route policy
- roles in multicast
- common notations in multicast
- multicast models
- multicast protocols
- multicast packet forwarding mechanism
- implementation of the rpf mechanism
- common multicast configuration
- configuring dropping unknown multicast packets
- igmp snooping configuration
- basic concepts in igmp snooping
- work mechanism of igmp snooping
- configuring igmp snooping
- configuring the version of igmp snooping
- configuring fast leave processing
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- configuring a port as a simulated group member
- configuring a vlan tag for query messages
- displaying and maintaining igmp snooping
- configuring multicast vlan
- troubleshooting igmp snooping
- architecture of 802.1x authentication
- encapsulation of eapol messages
- timers used in 802.1x
- x implementation on a 3com 4500 series switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring proxy checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x configuration
- quick ead deployment configuration
- configuring quick ead deployment
- displaying and maintaining quick ead deployment
- troubleshooting
- habp configuration
- habp client configuration
- system guard configuration
- configuring system guard
- enabling layer 3 error control
- displaying and maintaining system guard configuration
- aaa overview
- introduction to radius
- introduction to hwtacacs
- aaa configuration task list
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- creating a radius scheme
- configuring ignorance of assigned radius authorization attributes
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius server
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- displaying and maintaining aaa configuration
- displaying and maintaining hwtacacs protocol configuration
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- auto vlan configuration example
- troubleshooting aaa
- troubleshooting hwtacacs configuration
- ead configuration
- ead configuration example
- mac address authentication configuration
- quiet mac address
- mac address authentication enhanced function configuration
- mac address authentication configuration examples
- arp configuration
- arp table
- introduction to gratuitous arp
- configuring gratuitous arp
- displaying and debugging arp
- arp attack defense configuration
- introduction to arp packet rate limit
- configuring arp attack defense
- configuring the maximum number of dynamic arp entries that a vlan interface can learn
- configuring arp attack detection
- configuring the arp packet rate limit function
- arp attack defense configuration example
- arp attack defense configuration example ii
- arp attack defense configuration example iii
- dhcp overview
- dhcp server configuration
- dhcp ip address preferences
- dhcp server configuration task list
- configuring the global address pool based dhcp server
- creating a dhcp global address pool
- configuring gateways for the dhcp client
- configuring the interface address pool based dhcp server
- enabling the interface address pool mode on interface(s)
- configuring an address allocation mode for an interface address pool
- configuring dhcp server security functions
- configuring dhcp accounting functions
- displaying and maintaining the dhcp server
- dhcp server configuration examples
- dhcp server with option 184 support configuration example
- dhcp accounting configuration example
- troubleshooting a dhcp server
- dhcp relay agent configuration
- dhcp relay agent configuration task list
- correlating a dhcp server group with a relay agent interface
- configuring dhcp relay agent security functions
- configuring the dhcp relay agent to support option
- configuring dhcp inform message handling feature used in xrn system
- dhcp relay agent configuration example
- dhcp snooping configuration
- introduction to dhcp-snooping option
- introduction to ip filtering
- configuring dhcp snooping to support option
- configuring ip filtering
- displaying and maintaining dhcp snooping configuration
- dhcp packet rate limit configuration
- configuring port state auto recovery
- dhcp/bootp client configuration
- configuring a dhcp/bootp client
- x Configuration
- acl configuration
- ways to apply an acl on a switch
- acl configuration task list
- configuring basic acl
- configuring advanced acl
- applying acl rules on ports
- displaying and maintaining acl configuration
- example for controlling web login users by source ip
- advanced acl configuration example
- ipv6 acl configuration example
- example for applying an acl to a vlan
- qos configuration
- major traffic control techniques
- qos supported by switch 4500 series
- protocol priority
- priority marking
- line rate
- congestion avoidance
- configuring the mapping between 802.1p priority and local precedence
- setting the priority of protocol packets
- marking packet priority
- configuring traffic policing
- configuring queue scheduling
- displaying and maintaining qos
- qos configuration examples
- configuration example of priority marking and queue scheduling
- configuration procedure
- mirroring configuration
- remote port mirroring
- port mirroring – stp collaboration
- configuring local port mirroring
- configuring remote port mirroring
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- establishment of an xrn fabric
- how xrn works
- specifying the fabric port of a switch
- specifying the vlan used to form an xrn fabric
- setting a unit id for a switch
- assigning a unit name to a switch
- displaying and maintaining xrn fabric
- network diagram
- cluster configuration
- roles in a cluster
- how a cluster works
- cluster configuration task list
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- configuring the cluster synchronization function
- displaying and maintaining cluster configuration
- cluster configuration examples
- network management interface configuration example
- enhanced cluster feature configuration example
- poe configuration
- setting the poe mode on a port
- configuring the pd compatibility detection function
- upgrading the pse processing software online
- poe configuration example
- poe profile configuration
- displaying poe profile configuration
- udp helper configuration
- configuring udp helper
- displaying and maintaining udp helper
- snmp configuration
- supported mibs
- configuring trap-related functions
- configuring extended trap function
- snmp configuration example
- rmon configuration
- commonly used rmon groups
- displaying rmon
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- configuring the number of dynamic sessions allowed on the local switch
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring ntp server/client mode with authentication
- ssh overview
- ssh operating process
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring key pairs
- configuring the public key of a client on the server
- assigning a public key to an ssh user
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- comparison of ssh commands with the same functions
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- file system management configuration
- directory operations
- prompt mode configuration
- introduction to file attributes
- configuring file attributes
- file backup and restoration
- ftp and sftp configuration
- introduction to sftp
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: a switch operating as a tftp client
- tftp configuration example
- information center overview
- information center configuration
- setting to output system information to the trap buffer
- disabling a port from generating link up/down logging information
- information center configuration examples
- log output to a linux log host
- log output to the console
- boot rom and host software loading
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration and debugging
- displaying debugging status
- network connectivity test
- device management
- scheduling a reboot on the switch
- specifying the app to be used at reboot
- upgrading the host software in the fabric
- displaying the device management configuration
- remote switch app upgrade configuration example
- scheduled task configuration
- scheduled task configuration example
- inner-to-outer tag priority replicating and mapping
- configuring the inner-to-outer tag priority replicating and mapping feature
- displaying and maintaining vlan-vpn configuration
- selective qinq configuration
- selective qinq configuration task list
- enabling the inter-vlan mac address replicating feature
- remote-ping configuration
- displayed information
- ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- protocols and standards
- ipv6 configuration task list
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the maximum number of ipv6 icmp error packets sent within a specified time
- ipv6 configuration example
- ipv6 application configuration
- ipv6 traceroute
- ipv6 telnet
- ipv6 applications
- unable to ping a remote destination
- unable to run traceroute
- password control configuration operations
- password control configuration
- configuring the limitation of minimum password length
- configuring history password recording
- configuring a user login password in interactive mode
- AAA Configuration
- configuring password composition policies
- displaying password control
- access management configuration
- configuring access management
- combining access management with port isolation
- lldp configuration
- Device Management
- operating modes of lldp
- how lldp works
- performing basic lldp configuration
- enabling lldp polling
- setting other lldp parameters
- setting an encapsulation format for lldpdus
- configuring lldp trapping
- displaying and maintaining lldp
- cdp-compatible lldp configuration example
- pki configuration
- architecture of pki
- applications of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in manual mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- troubleshooting pki
- failed to request a local certificate
- ssl configuration
- ssl configuration task list
- ssl server policy configuration example
- configuring an ssl client policy
- displaying and maintaining ssl
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- https configuration example
Switch 4500 PWR 26-Port
Table of contents
- about this manual
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- relationship between a user and a user interface
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- configuration example
- logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- logging in using a modem
- switch configuration
- cli configuration
- modifying the command level
- switching user level
- cli views
- cli features
- terminal display
- error prompts
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- logging in through nms
- user control
- controlling telnet users by acl
- controlling web users by source ip address
- logging out a web user
- Table of Contents
- Table Of Contents
- configuration file management
- management of configuration file
- erasing the startup configuration file
- specifying a configuration file for next startup
- displaying device configuration
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- vlan interface
- link types of ethernet ports
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- configuring a hybrid-port-based vlan
- displaying and maintaining port-based vlan
- Table of Contents
- Table Of Contents
- configuring the management vlan
- displaying and maintaining management vlan configuration
- Table Of Contents
- ip addressing configuration
- special case ip addresses
- configuring ip addresses
- ip address configuration examples
- ip performance configuration
- disabling icmp to send error packets
- Table of Contents
- Table Of Contents
- dns configuration
- configuring domain name resolution
- configuring dynamic domain name resolution
- dns configuration example
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Table Of Contents
- how switch s4210 identify voice traffic
- configuring voice vlan assignment mode of a port
- security mode of voice vlan
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- Table of Contents
- Table Of Contents
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- Table of Contents
- Table Of Contents
- port basic configuration
- initially configuring a port
- limiting traffic on individual ports
- enabling flow control on a port
- configuring loopback detection for an ethernet port
- configuring loopback detection for ethernet port(s)
- enabling loopback test
- configuring the interval to perform statistical analysis on port traffic
- configuring storm control on a port
- setting the port state change delay
- displaying and maintaining basic port configuration
- Table of Contents
- Table Of Contents
- operational key
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation configuration
- Table Of Contents
- port isolation configuration
- displaying port isolation configuration
- Table Of Contents
- port security configuration
- port security configuration task list
- enabling port security
- setting the port security mode
- configuring port security features
- configuring guest vlan for a port in macaddressoruserloginsecure mode
- ignoring the authorization information from the radius server
- configuring security mac addresses
- displaying and maintaining port security configuration
- port security configuration example
- guest vlan configuration example
- port binding configuration
- displaying and maintaining port binding configuration
- Table of Contents
- Table Of Contents
- dldp fundamentals
- dldp status
- dldp operating mode
- dldp implementation
- dldp neighbor state
- performing basic dldp configuration
- resetting dldp state
- dldp configuration example
- Table of Contents
- Table Of Contents
- managing mac address table
- mac address table management configuration task list
- setting the mac address aging timer
- setting the maximum number of mac addresses a port can learn
- adding a static mac address entry manually
- Table of Contents
- Table Of Contents
- Table Of Contents
- mstp configuration
- rapid spanning tree protocol overview
- mstp implementation on switches
- configuring root bridge
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the current port as an edge port
- configuring leaf nodes
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring root guard
- configuring loop guard
- configuring tc-bpdu attack guard
- configuring bpdu dropping
- configuring digest snooping
- configuring vlan-vpn tunnel
- mstp maintenance configuration
- enabling trap messages conforming to 802.1d standard
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- roles in multicast
- advantages and applications of multicast
- multicast architecture
- multicast address
- multicast protocols
- multicast packet forwarding mechanism
- rpf check
- work mechanism of igmp snooping
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring static member port for a multicast group
- configuring a static router port
- configuring a vlan tag for query messages
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- configuration procedure
- troubleshooting igmp snooping
- common multicast configuration
- configuring a multicast mac address entry
- Table of Contents
- Table Of Contents
- x configuration
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s4210 series switch
- introduction to 802.1x configuration
- configuring basic 802.1x functions
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring proxy checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and debugging 802.1x
- x mandatory authentication domain configuration example
- habp configuration
- habp client configuration
- system-guard configuration
- displaying and maintaining system-guard
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to isp domain
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- creating a radius scheme
- configuring radius authentication/authorization servers
- configuring the sending mode of accounting start requests
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius authentication server function
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- aaa configuration examples
- remote radius authentication of telnet/ssh users
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- Table of Contents
- Table Of Contents
- mac authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- configuring a guest vlan
- configuring the maximum number of mac address authentication users allowed to access a port
- configuring the quiet mac function on a port
- mac authentication configuration example
- Table of Contents
- Table Of Contents
- arp table
- arp process
- introduction to arp attack detection
- introduction to arp packet rate limit
- configuring arp attack detection
- configuring the arp packet rate limit function
- gratuitous arp packet configuration
- arp configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- dhcp overview
- obtaining ip addresses dynamically
- dhcp packet format
- protocol specification
- dhcp server configuration
- dhcp ip address preferences
- configuring the global address pool based dhcp server
- enabling the global address pool mode on interface(s)
- configuring gateways for the dhcp client
- configuring the interface address pool based dhcp server
- enabling the interface address pool mode on interface(s)
- configuring an address allocation mode for an interface address pool
- configuring dhcp server security functions
- configuring ip address detecting
- dhcp accounting configuration
- displaying and maintaining the dhcp server
- dhcp server configuration examples
- dhcp server with option 184 support configuration example
- dhcp accounting configuration example
- troubleshooting a dhcp server
- overview of dhcp-snooping option
- overview of ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- displaying dhcp snooping configuration
- ip filtering configuration example
- dhcp packet rate limit configuration
- configuring dhcp packet rate limit
- dhcp/bootp client configuration
- how automatic configuration works
- introduction to bootp client
- configuring a dhcp/bootp client
- dhcp client configuration example
- Table of Contents
- Table Of Contents
- acl configuration
- ways to apply an acl on a switch
- types of acls supported by switch 4210 series
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl to a vlan
- displaying acl configuration
- example for upper-layer software referencing acls
- example for applying acls to hardware
- advanced acl configuration example
- network diagram
- Table of Contents
- Table Of Contents
- qos configuration
- major traffic control techniques
- qos supported by the 4210 series ethernet switches
- priority trust mode
- priority marking
- port rate limiting
- flow-based traffic accounting
- traffic mirroring
- configuring priority mapping
- marking packet priority
- configuring traffic policing
- configuring port rate limiting
- configuring traffic redirecting
- configuring queue scheduling
- configuring traffic accounting
- enabling the burst function
- configuring traffic mirroring
- displaying qos
- qos configuration example
- qos profile configuration
- configuring a qos profile
- displaying qos profile configuration
- qos profile configuration example
- Table of Contents
- Table Of Contents
- configuring local port mirroring
- configuring remote port mirroring
- displaying port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration tasks
- configuring the management device
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- configuring the cluster synchronization function
- displaying and maintaining cluster configuration
- cluster configuration example
- enhanced cluster feature configuration example
- Table of Contents
- Table Of Contents
- poe configuration tasks
- setting the maximum output power on a port
- setting the poe mode on a port
- configuring poe over-temperature protection on the switch
- displaying poe configuration
- poe profile configuration
- displaying poe profile configuration
- Table of Contents
- Table Of Contents
- snmp configuration
- configuring basic snmp functions
- configuring trap parameters
- configuring extended trap
- displaying snmp
- commonly used rmon groups
- displaying rmon
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration tasks
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- disabling an interface from receiving ntp messages
- configuring ntp symmetric peer mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- asymmetric key algorithm
- ssh server and client configuration task list
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user
- assigning a public key to an ssh user
- exporting the rsa or dsa public key
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system management configuration
- file operations
- flash memory operations
- file system configuration example
- file attribute configuration
- booting with the startup file
- Table of Contents
- Table Of Contents
- ftp and sftp configuration
- ftp configuration
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp server
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: a switch operating as a tftp client
- Table of Contents
- Table Of Contents
- information center
- system information format
- information center configuration
- configuring to display the time stamp with the utc time zone
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the log buffer
- displaying and maintaining information center
- information center configuration examples
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- boot rom and host software loading
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration and debugging
- debugging the system
- displaying debugging status
- command alias configuration
- network connectivity test
- device management
- scheduling a reboot on the switch
- upgrading the boot rom
- displaying the device management configuration
- remote switch app upgrade configuration example
- scheduled task configuration
- Table of Contents
- Table Of Contents
- test types supported by remote-ping
- remote-ping server configuration
- remote-ping client configuration
- displaying remote-ping configuration
- dhcp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- introduction to ipv6 dns
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the maximum number of ipv6 icmp error packets sent within a specified time
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- ipv6 application configuration
- ipv6 tftp
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table of Contents
- Table Of Contents
- password control configuration operations
- password control configuration
- configuring the limitation of minimum password length
- configuring history password recording
- configuring a user login password in interactive mode
- configuring the password authentication timeout time
- configuring password composition policies
- displaying password control
- Table of Contents
- Table Of Contents
- smart link configuration
- operating mechanism of smart link
- configuring smart link
- configuring associated devices
- displaying and debugging smart link
- monitor link configuration
- how monitor link works
- creating a monitor link group
- configuring a downlink port
- monitor link configuration example
- Table of Contents
- Table Of Contents
- arp and ip attack defense configuration
- configuring the maximum number of dynamic arp entries a vlan interface can learn
- arp/ip attack defense based on 802.1x
- configuring 802.1x-based arp/ip attack defense
- enabling arp source mac address consistency check
- arp attack defense configuration example ii
- arp/ip attack defense configuration example iii
- Table of Contents
- Table Of Contents
- lldp configuration
- operating modes of lldp
- how lldp works
- performing basic lldp configuration
- enabling lldp polling
- setting other lldp parameters
- setting an encapsulation format for lldpdus
- configuring lldp trapping
- displaying and maintaining lldp
- cdp-compatible lldp configuration example
- Table of Contents
- Table Of Contents
- pki configuration
- architecture of pki
- applications of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in manual mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- failed to request a local certificate
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl protocol stack
- ssl server policy configuration example
- configuring an ssl client policy
- displaying and maintaining ssl
- Table Of Contents
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- https configuration example
Related products
Switch 4210 PWR 9-PortSwitch 4210 PWR 18-PortSwitch 5500G-EI PWR 48-PortSwitch 4210 9-PortSwitch 4210 52-PortSwitch 4500 FamilySWITCH 4060SWITCH 4050Switch 7754Switch 77573Com categories
Switch
Network Router
Network Hardware
Wireless Access Point
Network Card
Modem
Computer Hardware
Software
Telephone
Gateway
manualsdatabase
Your AI-powered manual search engine