3Com Switch 4800G PWR 24-Port manuals
Switch 4800G PWR 24-Port
Table of contents
Switch 4800G PWR 24-Port
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Conventions
- Preface
- Serving as a Convergence Layer Device
- Logging In to an Ethernet Switch
- Introduction
- Console Port Login Configuration
- Console Port Login Configuration with Authentication Mode Being None
- Console Port Login Configuration with Authentication Mode Being Password
- Console Port Login Configuration with Authentication Mode Being Scheme
- Telnet Configuration with Authentication Mode Being None
- Telnet Configuration with Authentication Mode Being Password
- Telnet Configuration with Authentication Mode Being Scheme
- Telnet Connection Establishment
- Configuration on the Administrator Side
- Modem Connection Establishment
- HTTP Connection Establishment
- Web Server Shutdown/Startup
- Displaying Web Users
- Connection Establishment Using NMS
- Overview
- Displaying the source IP address/Interface Specified for Telnet Packets
- Controlling Telnet Users
- Controlling Network Management Users by Source IP Addresses
- Controlling Web Users by Source IP Address
- configuration procedure
- Introduction to VLAN
- Configuring Basic VLAN Attributes
- Port-Based VLAN Configuration
- MAC Address-Based VLAN Configuration
- Protocol-Based VLAN Configuration
- Configuring IP-Subnet-Based VLAN
- Displaying and Maintaining VLAN
- Introduction to Voice VLAN
- Configuring Voice VLAN
- Displaying and Maintaining Voice VLAN
- Introduction to GVRP
- GVRP Configuration Task List
- Displaying and Maintaining GVRP
- IP Addressing Overview
- Configuring IP Addresses
- Displaying and Maintaining IP Addressing
- IP Performance Overview
- Configuring TCP Attributes
- Configuring ICMP to Send Error Packets
- Displaying and Maintaining IP Performance
- Introduction to QinQ
- Configuring Basic QinQ
- Configuring Selective QinQ
- Configuring the TPID Value to Be Carried in VLAN Tags
- Introduction to BPDU Tunneling
- Configuring BPDU Isolation
- Configuring BPDU Transparent Transmission
- Configuring Destination Multicast MAC Address for BPDU Tunnel Frames
- network diagram
- Ethernet Port Configuration
- Maintaining and Displaying an Ethernet Port
- Introduction to Port Isolation
- Displaying Isolation Groups
- Link Aggregation
- Approaches to Link Aggregation
- Load Sharing in a Link Aggregation Group
- Aggregation Port Group
- Configuring Link Aggregation
- Displaying and Maintaining Link Aggregation
- Link Aggregation Configuration Example
- Introduction to MAC Address Table
- Configuring MAC Address Table Management
- Displaying and Maintaining MAC Address Table Management
- IP Source Guard Overview
- Configuring Dynamic Binding Function
- Troubleshooting
- DLDP Configuration Task List
- Displaying and Maintaining DLDP
- MSTP Overview
- Configuration Task List
- Configuring the Root Bridge
- Configuring Leaf Nodes
- Performing mCheck
- Configuring Digest Snooping
- Configuring No Agreement Check
- Configuring Protection Functions
- Displaying and Maintaining MSTP
- MSTP Configuration Example
- IP Routing and Routing Table
- Routing Protocol Overview
- Displaying and Maintaining a Routing Table
- Introduction to Graceful Restart
- Graceful Restart Communication Procedure
- Graceful Restart Mechanism for Several Commonly Used Protocols
- Configuring a Static Route
- Detecting Reachability of the Static Route's Nexthop
- Displaying and Maintaining Static Routes
- RIP Overview
- Configuring RIP Basic Functions
- Configuring RIP Route Control
- Configuring RIP Network Optimization
- Displaying and Maintaining RIP
- Troubleshooting RIP
- Introduction to OSPF
- OSPF Configuration Task List
- Configuring OSPF Basic Functions
- Configuring OSPF Area Parameters
- Configuring OSPF Network Types
- Configuring OSPF Route Control
- Configuring OSPF Network Optimization
- Configuring OSPF Graceful Restart
- Displaying and Maintaining OSPF
- verify the configuration
- network requirements
- Troubleshooting OSPF Configuration
- IS-IS Overview
- IS-IS Configuration Task List
- Configuring IS-IS Basic Functions
- Configuring IS-IS Routing Information Control
- Tuning and Optimizing IS-IS Network
- Configuring IS-IS GR
- Displaying and Maintaining IS-IS
- IS-IS Configuration Example
- BGP Overview
- BGP Configuration Task List
- Configuring BGP Basic Functions
- Controlling Route Distribution and Reception
- Configuring BGP Route Attributes
- Tuning and Optimizing BGP Networks
- Configuring a Large Scale BGP Network
- Configuring BGP GR
- Displaying and Maintaining BGP
- BGP Configuration Examples
- bgp community configuration
- Troubleshooting BGP
- Introduction to Routing Policy
- Routing Policy Configuration Task List
- Configuring a Routing Policy
- Displaying and Maintaining the Routing Policy
- Troubleshooting Routing Policy Configuration
- Introduction to IPv6 Static Routing
- Displaying and Maintaining IPv6 Static Routes
- Introduction to RIPng
- Configuring RIPng Basic Functions
- Configuring RIPng Route Control
- Tuning and Optimizing the RIPng Network
- Displaying and Maintaining RIPng
- Introduction to OSPFv3
- IPv6 OSPFv3 Configuration Task List
- Configuring OSPFv3 Basic Functions
- Configuring OSPFv3 Routing Information Management
- Tuning and Optimizing an OSPFv3 Network
- Displaying and Maintaining OSPFv3
- OSPFv3 Configuration Examples
- Troubleshooting OSPFv3 Configuration
- Introduction to IPv6 IS-IS
- Configuring IPv6 IS-IS Routing Information Control
- Displaying and Maintaining IPv6 IS-IS
- IPv6 IS-IS Configuration Example
- IPv6 BGP Overview
- Configuring IPv6 BGP Basic Functions
- Configuring IPv6 BGP Route Attributes
- Tuning and Optimizing IPv6 BGP Networks
- Configuring a Large Scale IPv6 BGP Network
- Displaying and Maintaining IPv6 BGP Configuration
- IPv6 BGP Configuration Examples
- Troubleshooting IPv6 BGP Configuration
- Defining Filtering Lists
- Routing Policy Configuration Example
- IPv6 Overview
- IPv6 Basics Configuration Task List
- Configuring IPv6 NDP
- Configuring PMTU Discovery
- Configuring IPv6 TCP Properties
- Configuring IPv6 DNS
- Displaying and Maintaining IPv6 Basics Configuration
- IPv6 Configuration Example
- Troubleshooting IPv6 Basics Configuration
- Dual Stack Overview
- Introduction to Tunneling
- Tunneling Configuration Task List
- Configuring 6to4 Tunnel
- Configuring ISATAP Tunnel
- Displaying and Maintaining Tunneling Configuration
- Introduction to Multicast
- Multicast Models
- Multicast Architecture
- Multicast Packet Forwarding Mechanism
- IGMP Snooping Overview
- IGMP Snooping Configuration Task List
- Configuring Basic Functions of IGMP Snooping
- Configuring IGMP Snooping Port Functions
- Configuring IGMP Snooping Querier
- Configuring an IGMP Snooping Policy
- Displaying and Maintaining IGMP Snooping
- IGMP Snooping Configuration Examples
- Troubleshooting IGMP Snooping Configuration
- MLD Snooping Overview
- MLD Snooping Configuration Task List
- Configuring Basic Functions of MLD Snooping
- Configuring MLD Snooping Port Functions
- Configuring MLD Snooping Querier
- Configuring an MLD Snooping Policy
- Displaying and Maintaining MLD Snooping
- MLD Snooping Configuration Examples
- Troubleshooting MLD Snooping
- Introduction to Multicast VLAN
- Displaying and Maintaining Multicast VLAN
- Introduction to IPv6 Multicast VLAN
- Displaying and Maintaining IPv6 Multicast VLAN
- IGMP Overview
- IGMP Configuration Task List
- Configuring Basic Functions of IGMP
- Adjusting IGMP Performance
- Displaying and Maintaining IGMP
- IGMP Configuration Example
- Troubleshooting IGMP
- PIM Overview
- Configuring PIM-DM
- Configuring PIM-SM
- Configuring PIM-SSM
- Configuring PIM Common Information
- Displaying and Maintaining PIM
- PIM Configuration Examples
- Troubleshooting PIM Configuration
- MSDP Overview
- MSDP Configuration Task List
- Configuring an MSDP Peer Connection
- Configuring SA Messages Related Parameters
- Displaying and Maintaining MSDP
- Troubleshooting MSDP
- Multicast Routing and Forwarding Overview
- Configuring Multicast Routing and Forwarding
- Displaying and Maintaining Multicast Routing and Forwarding
- Troubleshooting Multicast Routing and Forwarding
- x Overview
- Configuring 802.1x
- Configuring a Guest VLAN
- Displaying and Maintaining 802.1x
- Guest VLAN Configuration Example
- ACL Assignment Configuration Example
- Introduction to HABP
- Displaying and Maintaining HABP
- MAC Authentication Overview
- Related Concepts
- Configuring MAC Authentication
- Displaying and Maintaining MAC Authentication
- AAA/RADIUS/HWTACACS Overview
- AAA/RADIUS/HWTACACS Configuration Task List
- Configuring AAA
- Configuring RADIUS
- Configuring HWTACACS
- Displaying and Maintaining AAA/RADIUS/HWTACACS
- AAA/RADIUS/HWTACACS Configuration Examples
- Troubleshooting AAA/RADIUS/HWTACACS
- ARP Overview
- Configuring ARP
- Configuring Gratuitous ARP
- Displaying and Maintaining ARP
- Proxy ARP Overview
- Proxy ARP Configuration Examples
- Introduction to DHCP
- DHCP Address Allocation
- DHCP Message Format
- DHCP Options
- Protocols and Standards
- Introduction to DHCP Server
- DHCP Server Configuration Task List
- Configuring an Address Pool for the DHCP Server
- Configuring the DHCP Server Security Functions
- Configuring the Handling Mode for Option 82
- DHCP Server Configuration Examples
- Troubleshooting DHCP Server Configuration
- Introduction to DHCP Relay Agent
- Configuring the DHCP Relay Agent
- Displaying and Maintaining DHCP Relay Agent Configuration
- DHCP Relay Agent Configuration Example
- Troubleshooting DHCP Relay Agent Configuration
- Introduction to DHCP Client
- Displaying and Maintaining the DHCP Client
- DHCP Snooping Overview
- Configuring DHCP Snooping Basic Functions
- Displaying and Maintaining DHCP Snooping
- Introduction to BOOTP Client
- Configuring an Interface to Dynamically Obtain an IP Address Through BOOTP
- Introduction to ACL
- Introduction to IPv4 ACL
- Introduction to IPv6 ACL
- Creating a Time Range
- Configuring a Basic IPv4 ACL
- Configuring an Advanced IPv4 ACL
- Configuring an Ethernet Frame Header ACL
- Copying an IPv4 ACL
- Displaying and Maintaining IPv4 ACLs
- Configuring a Basic IPv6 ACL
- Configuring an Advanced IPv6 ACL
- Copying an IPv6 ACL
- Traditional Packet Forwarding Service
- Occurrence and Influence of Congestion and the Countermeasures
- Major Traffic Management Techniques
- Traffic Classification Overview
- TP and LR Overview
- LR Configuration
- Displaying and Maintaining LR
- Configuring QoS Policy
- Displaying and Maintaining QoS Policy
- Congestion Management Policy
- Configuring an SP Queue
- Configuring a WRR Queue
- Configuring SP+WRR Queues
- Displaying and Maintaining Congestion Management
- Priority Mapping Overview
- Configuring a Priority Mapping Table
- Configuring the Port Priority
- Configuring Port Priority Trust Mode
- Displaying and Maintaining Priority Mapping
- Applying a QoS Policy to VLANs
- Displaying and Maintaining QoS Policies Applied to VLANs
- Configuring Traffic Mirroring
- Displaying and Maintaining Traffic Mirroring
- Introduction to Port Mirroring
- Configuring Local Port Mirroring
- Configuring Remote Port Mirroring
- Displaying and Maintaining Port Mirroring
- Port Mirroring Configuration Examples
- Cluster Management Overview
- Cluster Configuration Task List
- Configuring the Management Device
- Configuring the Member Devices
- Configuring Access Between the Management Device and Its Member Devices
- Adding a Candidate Device to a Cluster
- Displaying and Maintaining Cluster Management
- Introduction to UDP Helper
- Displaying and Maintaining UDP Helper
- SNMP Overview
- SNMP Configuration
- Configuring SNMP Logging
- Trap Configuration
- Displaying and Maintaining SNMP
- SNMP Configuration Example
- SNMP Logging Configuration Example
- RMON Overview
- Configuring RMON
- Displaying and Maintaining RMON
- RMON Configuration Example
- NTP Overview
- NTP Configuration Task list
- Configuring Optional Parameters of NTP
- Configuring Access-Control Rights
- Configuring NTP Authentication
- Displaying and Maintaining NTP
- DNS Overview
- Configuring the DNS Client
- Configuring the DNS Proxy
- DNS Configuration Examples
- Troubleshooting DNS Configuration
- File System Management
- Configuration File Management
- Displaying and Maintaining Device Configuration
- FTP Overview
- Configuring the FTP Client
- Configuring the FTP Server
- Displaying and Maintaining FTP
- TFTP Overview
- Configuring the TFTP Client
- Displaying and Maintaining the TFTP Client
- Information Center Overview
- Configuring Information Center
- Displaying and Maintaining Information Center
- Basic Configurations
- CLI Features
- System Maintaining and Debugging Overview
- System Maintaining and Debugging
- System Maintaining Example
- Device Management Overview
- Displaying and Maintaining Device Management Configuration
- NQA Overview
- NQA Configuration Task List
- Enabling the NQA Client
- Configuring the Collaboration Function
- Configuring Optional Parameters Common to an NQA Test Group
- Scheduling an NQA Test Group
- Displaying and Maintaining NQA
- Introduction to VRRP
- Configuring VRRP for IPv4
- Configuring VRRP for IPv6
- IPv4-Based VRRP Configuration Examples
- IPv6-Based VRRP Configuration Examples
- Troubleshooting VRRP
- SSH2.0 Overview
- Configuring the Device as an SSH Server
- Configuring the Device as an SSH Client
- Displaying and Maintaining SSH
- SSH Server Configuration Examples
- SSH Client Configuration Examples
- SFTP Overview
- Configuring an SFTP Client
- SFTP Configuration Example
- RRPP Overview
- RRPP Configuration Task List
- Configuring Master Node
- Configuring Transit Node
- Configuring Edge Node
- Configuring Assistant Edge Node
- Displaying and Maintaining RRPP
- configuration considerations
- networking requirements
- rrpp typical configuration examples
- Introduction to Port Security
- Port Security Configuration Task List
- Setting the Maximum Number of Secure MAC Addresses
- Configuring Port Security Features
- Configuring Secure MAC Addresses
- Displaying and Maintaining Port Security
- Troubleshooting Port Security
- Introduction to LLDP
- LLDP Configuration Tasks List
- Configuring LLDP Trap
- LLDP Configuration Example
- lldp configuration example
- PoE Overview
- PoE Configuration Task List
- Configuring PD Power Management
- Configuring a Power Alarm Threshold for the PSE
- Configuring a PD Disconnection Detection Mode
- Displaying and Maintaining PoE
- Troubleshooting PoE
- sFlow Overview
- Configuring sFlow
- Troubleshooting sFlow Configuration
- SSL Overview
- SSL Configuration Task List
- Configuring an SSL Client Policy
- Displaying and Maintaining SSL
- HTTPS Overview
- Associating the HTTPS Service with an SSL Server Policy
- Associating the HTTPS Service with a Certificate Attribute Access Control Policy
- Introduction to PKI
- PKI Configuration Task List
- Configuring a PKI Domain
- Submitting a PKI Certificate Request
- Retrieving a Certificate Manually
- Configuring PKI Certificate Validation
- Destroying a Local RSA Key Pair
- Deleting a Certificate
- PKI Configuration Examples
- Troubleshooting PKI
- Track Overview
- Track Configuration Task List
- Configuring Collaboration Between the Track Module and the Application Modules
- Displaying and Maintaining Track Object(s)
Switch 4800G PWR 24-Port
Table of contents
- configuration guide
- Table Of Contents
- related documentation
- Login
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- logging in using a modem
- modem connection establishment
- cli configuration
- modifying the command level
- switching user level
- cli views
- cli features
- terminal display
- command edit
- management interface
- configuring the login banner
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- user control
- controlling network management users by source ip addresses
- controlling web users by source ip address
- logging out a web user
- Configuration File Management
- introduction to configuration file
- configuration task list
- VLAN
- Static Routing
- static routing configuration
- static route
- configuring a static route
- static route configuration example
- Voice VLAN
- security mode of voice vlan
- displaying and maintaining voice vlan
- voice vlan configuration example
- GVRP
- configuring gvrp timers
- displaying and maintaining gvrp
- Port Basic Configuration
- ethernet port configuration
- Link Aggregation
- configuring a port group
- link aggregation classification
- static lacp aggregation group
- aggregation group categories
- displaying and maintaining link aggregation configuration
- Port Isolation
- port isolation configuration example
- port security configuration
- port security configuration task list
- configuring security mac addresses
- displaying and maintaining port security configuration
- port binding overview
- MAC Address Table Management
- managing mac address table
- configuring mac address table management
- displaying mac address table information
- MSTP
- mstp configuration
- mstp overview
- basic mstp terminologies
- configuring root bridge
- configuring leaf nodes
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring loop guard
- configuring digest snooping
- configuring rapid transition
- stp maintenance configuration
- displaying and maintaining mstp
- x authentication procedure
- quick ead deployment configuration
- MAC Address Authentication
- quick ead deployment configuration example
- troubleshooting
- introduction to habp
- habp client configuration
- system guard configuration
- aaa overview
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- configuring an aaa scheme for an isp domain
- configuring the attributes of a local user
- radius configuration task list
- configuring the status of radius servers
- configuring timers for radius servers
- hwtacacs configuration task list
- aaa configuration examples
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- ead configuration example
- mac address authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- displaying and maintaining mac address authentication configuration
- ip addressing overview
- DHCP
- displaying ip addressing configuration
- ip performance overview
- displaying and maintaining ip performance optimization configuration
- arp configuration
- arp table
- configuring arp
- configuring gratuitous arp
- arp configuration examples
- dhcp overview
- updating ip address lease
- protocol specification
- dhcp relay agent configuration
- configuring the dhcp relay agent
- configuring the dhcp relay agent to support option
- displaying and maintaining dhcp relay agent configuration
- troubleshooting dhcp relay agent configuration
- introduction to dhcp client
- bootp client configuration example
- dns configuration
- configuring domain name resolution
- displaying and maintaining dns
- dns configuration examples
- dynamic domain name resolution configuration example
- troubleshooting dns
- configuring time range
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl to a port group
- displaying acl configuration
- example for controlling telnet login users by source ip
- basic acl configuration example
- advanced acl configuration example
- example for applying an acl to a vlan
- introduction to qos features
- queue scheduling
- configuring priority mapping
- configuring traffic policing
- configuring traffic shaping
- enabling the burst function
- qos configuration examples
- Mirroring
- remote port mirroring
- configuring local port mirroring
- configuring remote port mirroring
- displaying port mirroring
- remote port mirroring configuration example
- stack function overview
- main switch configuration
- slave switch configuration
- displaying and debugging a stack
- cluster overview
- cluster configuration tasks
- SNMP-RMON
- displaying and maintaining cluster configuration
- cluster configuration example
- enhanced cluster feature configuration example
- snmp configuration
- configuring basic snmp functions
- enabling logging for network management
- rmon configuration
- Multicast
- displaying rmon
- roles in multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- work mechanism of igmp snooping
- displaying and maintaining igmp snooping
- configuring multicast vlan
- troubleshooting igmp snooping
- displaying common multicast configuration
- ntp configuration
- ntp implementation modes
- ntp configuration task list
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- displaying ntp configuration
- configuring ntp symmetric peer mode
- ssh configuration
- ssh server and client
- configuring the ssh server
- creating an ssh user and specifying an authentication type
- configuring the ssh client
- displaying and maintaining ssh configuration
- comparison of ssh commands with the same functions
- ssh configuration examples
- when switch acts as server for password and hwtacacs authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- file system configuration
- flash memory operations
- file system configuration example
- file attribute configuration
- booting with the startup file
- introduction to ftp and sftp
- ftp configuration
- ftp banner display configuration example
- sftp configuration
- sftp configuration example
- tftp configuration example
- information center
- system information format
- information center configuration
- displaying and maintaining information center
- information center configuration examples
- log output to a linux log host
- log output to the console
- introduction to loading approaches
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration
- displaying the system status
- device management
- displaying the device management configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- dns test
- poe configuration
- poe configuration example
- displaying poe profile configuration
- poe profile configuration example
- smart link overview
- configuring smart link
- configuring associated devices
- displaying and maintaining smart link
- monitor link configuration
- configuring monitor link
- displaying monitor link configuration
- ipv6 configuration
- introduction to ipv6 address
- ipv6 configuration task list
- configuring ipv6 tcp properties
- ipv6 configuration example
- ipv6 application configuration
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- udp helper configuration
- configuring udp helper
- udp helper configuration example
- access management configuration
- configuring access management
- combining access management with port isolation
Switch 4800G PWR 24-Port
Table of contents
- configuration guide
- about this manual
- Table of Contents
- Table Of Contents
- product features
- access volume
- ip services volume
- ip routing volume
- qos volume
- security volume
- high availability volume
- system volume
- manual version
- Table of Contents
- Table Of Contents
- ethernet port configuration
- configuring an auto-negotiation transmission rate
- configuring flow control on an ethernet port
- configuring the suppression time of physical-link-state change on an ethernet port
- configuring a port group
- setting the interval for collecting ethernet port statistics
- enabling forwarding of jumbo frames
- configuring the mdi mode for an ethernet port
- testing the cable on an ethernet port
- displaying and maintaining an ethernet port
- Table of Contents
- Table Of Contents
- ethernet link aggregation configuration
- aggregating links in static mode
- aggregating links in dynamic mode
- load sharing criteria for link aggregation groups
- ethernet link aggregation configuration task list
- configuring a static aggregation group
- configuring an aggregate interface
- enabling link state trapping for an aggregate interface
- displaying and maintaining ethernet link aggregation
- static aggregation configuration example
- dynamic aggregation configuration example
- aggregation load sharing configuration example
- Table of Contents
- Table Of Contents
- port isolation configuration
- port isolation configuration example
- Table Of Contents
- mstp configuration
- protocol packets of stp
- how stp works
- introduction to rstp
- introduction to mstp
- basic concepts in mstp
- how mstp works
- implementation of mstp on devices
- configuring mstp
- configuring the root bridge or a secondary root bridge
- configuring the work mode of an mstp device
- configuring the maximum hops of an mst region
- configuring timers of mstp
- configuring the timeout factor
- configuring the maximum port rate
- configuring path costs of ports
- configuring port priority
- configuring the link type of ports
- enabling the output of port state transition information
- enabling the mstp feature
- configuring digest snooping
- configuring no agreement check
- configuring protection functions
- displaying and maintaining mstp
- Table of Contents
- Table Of Contents
- lldp configuration
- how lldp works
- lldp configuration task list
- performing basic lldp configuration
- setting the lldp re-initialization delay
- configuring the management address and its encoding format
- setting other lldp parameters
- configuring cdp compatibility
- configuring lldp trapping
- displaying and maintaining lldp
- configuration procedure
- cdp-compatible lldp configuration example
- Table of Contents
- Table Of Contents
- vlan configuration
- vlan fundamentals
- types of vlan
- configuring basic settings of a vlan interface
- port-based vlan configuration
- assigning an access port to a vlan
- assigning a trunk port to a vlan
- assigning a hybrid port to a vlan
- mac-based vlan configuration
- protocol-based vlan configuration
- configuring a protocol-based vlan
- ip subnet-based vlan configuration
- displaying and maintaining vlan
- isolate-user-vlan configuration
- displaying and maintaining isolate-user-vlan
- voice vlan configuration
- voice vlan assignment modes
- security mode and normal mode of voice vlans
- configuring a voice vlan
- setting a port to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- manual voice vlan assignment mode configuration example
- gvrp configuration
- gvrp configuration task list
- configuring garp timers
- displaying and maintaining gvrp
- gvrp configuration examples
- gvrp configuration example ii
- gvrp configuration example iii
- Table of Contents
- Table Of Contents
- qinq configuration
- how qinq works
- implementations of qinq
- configuring basic qinq
- configuring the tpid value in vlan tags
- comprehensive selective qinq configuration example
- Table of Contents
- Table Of Contents
- introduction to bpdu tunneling
- bpdu tunneling implementation
- configuring bpdu tunneling
- configuring destination multicast mac address for bpdus
- bpdu tunneling for pvst configuration example
- Table of Contents
- Table Of Contents
- port mirroring configuration
- configuring local port mirroring
- configuring remote port mirroring
- configuring a remote destination mirroring group (on the destination device)
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- configuring traffic mirroring
- mirroring traffic to the cpu
- applying a qos policy
- displaying and maintaining traffic mirroring
- Table of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- configuring ip addresses
- ip addressing configuration example
- displaying and maintaining ip addressing
- Table of Contents
- Table Of Contents
- arp configuration
- arp message format
- arp table
- configuring arp
- enabling the arp entry check
- arp configuration example
- configuring gratuitous arp
- proxy arp configuration
- enabling proxy arp
- displaying and maintaining proxy arp
- local proxy arp configuration example in case of port isolation
- local proxy arp configuration example in isolate-user-vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- dhcp overview
- dhcp address allocation
- ip address lease extension
- dhcp options
- self-defined options
- protocols and standards
- dhcp relay agent configuration
- dhcp relay agent support for option
- dhcp relay agent configuration task list
- enabling the dhcp relay agent on an interface
- configuring the dhcp relay agent security functions
- configuring the dhcp relay agent to send a dhcp-release request
- displaying and maintaining dhcp relay agent configuration
- dhcp relay agent option 82 support configuration example
- troubleshooting dhcp relay agent configuration
- dhcp client configuration
- displaying and maintaining the dhcp client
- dhcp snooping configuration
- application environment of trusted ports
- dhcp snooping support for option
- configuring dhcp snooping basic functions
- configuring dhcp snooping to support option 82
- displaying and maintaining dhcp snooping
- dhcp snooping option 82 support configuration example
- bootp client configuration
- configuring an interface to dynamically obtain an ip address through bootp
- displaying and maintaining bootp client configuration
- Table of Contents
- Table Of Contents
- dns configuration
- dns proxy
- configuring the dns client
- configuring the dns proxy
- dynamic domain name resolution configuration example
- dns proxy configuration example
- troubleshooting dns configuration
- Table of Contents
- Table Of Contents
- ip performance overview
- enabling forwarding of directed broadcasts to a directly connected network
- configuring tcp optional parameters
- configuring icmp to send error packets
- displaying and maintaining ip performance optimization
- Table of Contents
- Table Of Contents
- udp helper configuration
- displaying and maintaining udp helper
- Table Of Contents
- ipv6 overview
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- ipv6 pmtu discovery
- ipv6 basics configuration task list
- configuring basic ipv6 functions
- configuring ipv6 ndp
- configuring the maximum number of neighbors dynamically learned
- configuring pmtu discovery
- configuring ipv6 tcp properties
- enable sending of multicast echo replies
- configuring ipv6 dns client
- displaying and maintaining ipv6 basics configuration
- ipv6 configuration example
- troubleshooting ipv6 basics configuration
- Table Of Contents
- dual stack overview
- Table Of Contents
- sflow configuration
- configuring sflow
- sflow configuration example
- troubleshooting sflow configuration
- ip routing overview
- routing protocol overview
- displaying and maintaining a routing table
- Table of Contents
- Table Of Contents
- static routing configuration
- configuring a static route
- detecting reachability of the static route's nexthop
- displaying and maintaining static routes
- static route configuration example
- Table of Contents
- Table Of Contents
- rip configuration
- rip version
- rip message format
- configuring rip basic functions
- configuring rip route control
- configuring ripv2 route summarization
- disabling host route reception
- configuring inbound/outbound route filtering
- configuring rip network optimization
- configuring rip timers
- enabling zero field check on incoming ripv1 messages
- configuring ripv2 message authentication
- displaying and maintaining rip
- rip configuration examples
- configuring an additional metric for a rip interface
- troubleshooting rip
- route oscillation occurred
- ipv6 static routing configuration
- displaying and maintaining ipv6 static routes
- Table of Contents
- Table Of Contents
- ripng configuration
- ripng packet format
- configuring ripng basic functions
- configuring ripng route control
- configuring ripng route summarization
- configuring a ripng route filtering policy
- tuning and optimizing the ripng network
- configuring zero field check on ripng packets
- displaying and maintaining ripng
- Table of Contents
- Table Of Contents
- route policy configuration
- route policy configuration task list
- defining filters
- configuring a route policy
- creating a route policy
- defining apply clauses
- displaying and maintaining the route policy
- applying a route policy to ipv6 route redistribution
- troubleshooting route policy configuration
- ipv6 routing information filtering failure
- Table of Contents
- Table Of Contents
- multicast overview
- features of multicast
- multicast models
- multicast architecture
- multicast addresses
- multicast protocols
- multicast packet forwarding mechanism
- Table of Contents
- Table Of Contents
- igmp snooping configuration
- basic concepts in igmp snooping
- how igmp snooping works
- igmp snooping configuration task list
- configuring basic functions of igmp snooping
- configuring igmp snooping port functions
- configuring simulated joining
- configuring igmp snooping querier
- configuring igmp queries and responses
- configuring an igmp snooping policy
- configuring a multicast group filter
- configuring the function of dropping unknown multicast data
- configuring igmp report suppression
- configuring multicast group replacement
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- network diagram
- igmp snooping querier configuration
- troubleshooting igmp snooping configuration
- Table of Contents
- Table Of Contents
- multicast vlan configuration
- multicast vlan configuration task list
- configuring port-based multicast vlan
- configuring multicast vlan ports
- displaying and maintaining multicast vlan
- port-based multicast vlan configuration
- Table of Contents
- Table Of Contents
- mld snooping configuration
- basic concepts in mld snooping
- how mld snooping works
- mld snooping configuration task list
- configuring basic functions of mld snooping
- configuring mld snooping port functions
- configuring mld snooping querier
- configuring mld queries and responses
- configuring source ipv6 addresses of mld queries
- configuring an mld snooping policy
- configuring ipv6 multicast source port filtering
- configuring mld report suppression
- configuring ipv6 multicast group replacement
- displaying and maintaining mld snooping
- mld snooping configuration examples
- mld snooping querier configuration
- troubleshooting mld snooping
- configured ipv6 multicast group policy fails to take effect
- Table of Contents
- Table Of Contents
- introduction to ipv6 multicast vlan
- ipv6 multicast vlan configuration task list
- configuring port-based ipv6 multicast vlan
- configuring ipv6 multicast vlan ports
- displaying and maintaining ipv6 multicast vlan
- port-based multicast vlan configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos overview
- diffserv service model
- qos configuration approaches
- configuring a qos policy
- defining a traffic behavior
- applying the qos policy
- displaying and maintaining qos policies
- priority mapping overview
- priority trust mode on a port
- priority mapping configuration tasks
- configuring priority mapping
- displaying and maintaining priority mapping
- traffic policing and line rate configuration
- traffic policing
- line rate
- configuration example
- configuring the line rate
- congestion management configuration
- congestion management configuration approaches
- configuring congestion management
- configuring wfq queuing
- configuring sp+wrr queues
- displaying and maintaining congestion management
- traffic filtering configuration
- traffic filtering configuration example
- configuring priority marking
- priority marking configuration example
- traffic redirecting configuration
- class-based accounting configuration
- displaying and maintaining traffic accounting
- appendix a acronym
- appendix b default priority mapping tables
- appendix c introduction to packet precedences
- p priority
- Table of Contents
- Table Of Contents
- user profile configuration
- creating a user profile
- enabling a user profile
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa configuration
- introduction to radius
- security and authentication mechanisms
- radius packet format
- extended radius attributes
- introduction to hwtacacs
- aaa configuration task list
- radius configuration task list
- configuring aaa
- configuring isp domain attributes
- configuring aaa authentication methods for an isp domain
- configuring aaa authorization methods for an isp domain
- configuring aaa accounting methods for an isp domain
- configuring local user attributes
- displaying and maintaining aaa
- configuring radius
- specifying the radius authentication/authorization servers
- setting the shared key for radius packets
- setting the upper limit of radius request retransmission attempts
- setting the status of radius servers
- configuring attributes related to data to be sent to the radius server
- setting timers regarding radius servers
- configuring radius accounting-on
- specifying a security policy server
- configuring hwtacacs
- specifying the hwtacacs authentication servers
- specifying the hwtacacs accounting servers
- setting the shared key for hwtacacs packets
- setting timers regarding hwtacacs servers
- aaa configuration examples
- aaa for telnet users by separate servers
- aaa for ssh users by a radius server
- troubleshooting aaa
- troubleshooting hwtacacs
- Table of Contents
- Table Of Contents
- x configuration
- architecture of 802.1x
- eap over lans
- eap over radius
- authentication process of 802.1x
- x timers
- extensions to 802.1x
- configuring 802.1x
- configuring 802.1x for a port
- configuring an 802.1x guest vlan
- x configuration example
- guest vlan and vlan assignment configuration example
- acl assignment configuration example
- x-based ead fast deployment configuration
- configuring ead fast deployment
- displaying and maintaining ead fast deployment
- troubleshooting ead fast deployment
- Table of Contents
- Table Of Contents
- introduction to habp
- configuring habp
- displaying and maintaining habp
- Table Of Contents
- mac authentication configuration
- related concepts
- configuring mac authentication
- configuring a guest vlan
- displaying and maintaining mac authentication
- radius-based mac authentication configuration example
- Table of Contents
- Table Of Contents
- port security configuration
- port security modes
- port security configuration task list
- setting the maximum number of secure mac addresses
- setting the port security mode
- configuring port security features
- configuring intrusion protection
- configuring secure mac addresses
- displaying and maintaining port security
- configuring the userloginwithoui mode
- configuring the macaddresselseuserloginsecure mode
- configuration information
- troubleshooting port security
- cannot change port security mode when a user is online
- Table of Contents
- Table Of Contents
- ip source guard configuration
- configuring a static binding entry
- ip source guard configuration examples
- dynamic binding function configuration example
- troubleshooting ip source guard
- Table of Contents
- Table Of Contents
- ssh2.0 configuration
- configuring the device as an ssh server
- enabling ssh server
- configuring a client public key
- configuring an ssh user
- setting the ssh management parameters
- configuring the device as an ssh client
- configuring whether first-time authentication is supported
- displaying and maintaining ssh
- when switch acts as server for publickey authentication
- ssh client configuration examples
- when switch acts as client for publickey authentication
- sftp service
- configuring an sftp client
- working with the sftp directories
- working with sftp files
- terminating the connection to the remote sftp server
- sftp server configuration example
- Table of Contents
- Table Of Contents
- pki configuration
- architecture of pki
- pki configuration task list
- configuring an entity dn
- configuring a pki domain
- submitting a pki certificate request
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- deleting a certificate
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- configuring a certificate attribute-based access control policy
- troubleshooting pki
- failed to retrieve crls
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl configuration task list
- configuring an ssl server policy
- ssl server policy configuration example
- configuring an ssl client policy
- troubleshooting ssl
- Table of Contents
- Table Of Contents
- public key configuration
- configuring the local asymmetric key pair
- displaying or exporting the local rsa or dsa host public key
- displaying and maintaining public keys
- public key configuration examples
- importing the public key of a peer from a public key file
- Table of Contents
- Table Of Contents
- Table Of Contents
- acl overview
- introduction to ipv4 acl
- ipv4 acl naming
- ipv4 acl step
- introduction to ipv6 acl
- ipv6 acl step
- ipv4 acl configuration
- configuring a basic ipv4 acl
- configuring an advanced ipv4 acl
- configuring an ethernet frame header acl
- copying an ipv4 acl
- displaying and maintaining ipv4 acls
- ipv6 acl configuration
- configuring an advanced ipv6 acl
- copying an ipv6 acl
- displaying and maintaining ipv6 acls
- acl application for packet filtering
- filtering ipv6 packets
- acl application example
- applying an acl to a vlan interface
- Table of Contents
- Table Of Contents
- arp attack protection configuration
- configuring arp defense against ip packet attacks
- enabling arp black hole routing
- configuring source mac address based arp attack detection
- configuring arp packet source mac address consistency check
- configuring arp detection
- configuring arp detection based on specified objects
- arp detection configuration example i
- arp detection configuration example ii
- Table of Contents
- Table Of Contents
- smart link overview
- how smart link works
- smart link configuration task list
- configuring protected vlans for a smart link group
- configuring role preemption for a smart link group
- smart link device configuration example
- configuring an associated device
- displaying and maintaining smart link
- multiple smart link groups load sharing configuration example
- Table of Contents
- Table Of Contents
- monitor link configuration
- configuring monitor link
- configuring monitor link group member ports
- monitor link configuration example
- Table of Contents
- Table Of Contents
- rrpp overview
- basic concepts in rrpp
- rrpp timers
- typical rrpp networking
- rrpp configuration task list
- creating an rrpp domain
- configuring control vlans
- configuring rrpp rings
- configuring rrpp nodes
- activating an rrpp domain
- configuring an rrpp ring group
- displaying and maintaining rrpp
- intersecting ring configuration example
- intersecting-ring load balancing configuration example
- troubleshooting
- Table of Contents
- Table Of Contents
- dldp configuration
- how dldp works
- dldp configuration task list
- enabling dldp
- setting the interval for sending advertisement packets
- setting the port shutdown mode
- configuring dldp authentication
- displaying and maintaining dldp
- Table of Contents
- Table Of Contents
- ethernet oam configuration
- how ethernet oam works
- standards and protocols
- configuring link monitoring
- configuring errored frame seconds event detection
- displaying and maintaining ethernet oam configuration
- ethernet oam configuration example
- Table of Contents
- Table Of Contents
- cfd configuration
- cfd functions
- basic configuration tasks
- configuring mep
- configuring cc on meps
- configuring lb on meps
- finding the path between a source mep and a target mep
- cfd configuration examples
- configuring mep and enabling cc on it
- configuring the rules for generating mips
- Table of Contents
- Table Of Contents
- track overview
- track configuration task list
- configuring collaboration between the track module and the application modules
- displaying and maintaining track object(s)
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- users and user interfaces
- logging in through the console port
- console port login configuration
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet login configuration task list
- telnet login configuration with authentication mode being password
- telnet login configuration with authentication mode being scheme
- logging in through ssh
- user interface configuration examples
- command authorization configuration example
- command accounting configuration example
- web server configuration
- displaying web users
- connection establishment using nms
- specifying source for telnet packets
- displaying the source ip address/interface specified for telnet packets
- controlling telnet users
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip addresses
- Table of Contents
- Table Of Contents
- basic configurations
- entering system view
- configuring the system clock
- displaying the system clock
- enabling/disabling the display of copyright information
- configuring a banner
- configuring cli hotkeys
- configuring command alias
- configuring user privilege levels and command levels
- configuring user privilege level
- switching user privilege level
- modifying command level
- cli features
- synchronous information output
- editing features
- cli display
- display functions
- saving history commands
- Table of Contents
- Table Of Contents
- device management
- rebooting a device
- configuring the scheduled automatic execution function
- upgrading device software
- upgrading the boot file through command lines
- configuring a detection interval
- identifying and diagnosing pluggable transceivers
- displaying and maintaining device management configuration
- device management configuration examples
- Table of Contents
- Table Of Contents
- file system management
- directory operations
- file operations
- batch operations
- setting file system prompt modes
- configuration file management
- saving the current configuration
- specifying a startup configuration file for the next system startup
- backing up the startup configuration file
- displaying and maintaining device configuration
- ftp configuration
- configuring the ftp client
- ftp client configuration example
- configuring the ftp server
- configuring authentication and authorization on the ftp server
- ftp server configuration example
- displaying and maintaining ftp
- tftp configuration
- configuring the tftp client
- displaying and maintaining the tftp client
- Table of Contents
- Table Of Contents
- http configuration
- configuring the port number of the http service
- displaying and maintaining http
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- associating the https service with an acl
- Table of Contents
- Table Of Contents
- snmp configuration
- snmp protocol version
- configuring snmp logging
- snmp trap configuration
- configuring trap parameters
- displaying and maintaining snmp
- snmp configuration example
- snmp logging configuration example
- mib style configuration
- Table of Contents
- Table Of Contents
- rmon configuration
- rmon groups
- configuring rmon
- displaying and maintaining rmon
- Table of Contents
- Table Of Contents
- mac address table configuration
- types of mac address table entries
- configuring mac address table
- configuring the aging timer for dynamic mac address entries
- mac address table configuration example
- mac information configuration
- enabling mac information on an interface
- Table of Contents
- Table Of Contents
- system maintaining and debugging
- introduction to system debugging
- system maintaining
- system maintaining example
- Table Of Contents
- information center configuration
- system information format
- configuring information center
- outputting system information to a monitor terminal
- outputting system information to a log host
- outputting system information to the trap buffer
- outputting system information to the log buffer
- outputting system information to the snmp module
- disabling a port from generating link up/down logging information
- displaying and maintaining information center
- outputting log information to a linux log host
- outputting log information to the console
- Table of Contents
- Table Of Contents
- poe configuration
- poe configuration task list
- configuring a poe interface through the command line
- configuring poe power management
- upgrading pse processing software online
- configuring a pd disconnection detection mode
- displaying and maintaining poe
- troubleshooting poe
- Table of Contents
- Table Of Contents
- hotfix configuration
- hotfix configuration task list
- one-step patch installation
- step-by-step patch installation
- activating patches
- step-by-step patch uninstallation
- displaying and maintaining hotfix
- Table of Contents
- Table Of Contents
- nqa configuration
- basic concepts of nqa
- nqa configuration task list
- configuring the nqa server
- configuring an nqa test group
- configuring a dhcp test
- configuring an ftp test
- configuring an http test
- configuring a udp jitter test
- configuring an snmp test
- configuring a tcp test
- configuring a udp echo test
- configuring a voice test
- configuring a dlsw test
- configuring the collaboration function
- configuring trap delivery
- configuring optional parameters common to an nqa test group
- scheduling an nqa test group
- displaying and maintaining nqa
- dhcp test configuration example
- ftp test configuration example
- http test configuration example
- udp jitter test configuration example
- snmp test configuration example
- tcp test configuration example
- udp echo test configuration example
- voice test configuration example
- dlsw test configuration example
- nqa collaboration configuration example
- Table of Contents
- Table Of Contents
- ntp configuration
- advantages of ntp
- ntp message format
- operation modes of ntp
- ntp configuration task list
- configuring the operation modes of ntp
- configuring the ntp symmetric peers mode
- configuring optional parameters of ntp
- disabling an interface from receiving ntp messages
- configuring access-control rights
- configuring ntp authentication
- displaying and maintaining ntp
- configuring the ntp symmetric mode
- configuring ntp broadcast mode
- configuring ntp client/server mode with authentication
- configuring ntp broadcast mode with authentication
- Table of Contents
- Table Of Contents
- cluster management configuration
- how a cluster works
- cluster configuration task list
- configuring the management device
- configuring ndp parameters
- manually collecting topology information
- enabling the cluster function
- enabling management vlan auto-negotiation
- cluster member management
- configuring the member devices
- adding a candidate device to a cluster
- configuring advanced cluster functions
- configuring interaction for a cluster
- snmp configuration synchronization function
- configuring web user accounts in batches
- displaying and maintaining cluster management
- Table of Contents
- Table Of Contents
- stack configuration
- establishing a stack
- configuring the master device of a stack
- configuring stack ports of a slave device
- displaying and maintaining stack configuration
- Table Of Contents
- automatic configuration
- how automatic configuration works
- obtaining an ip address
- obtaining the configuration file from the tftp server
- executing the configuration file
Switch 4800G PWR 24-Port
Table of contents
Related products
Switch 4800G 24-PortSwitch 4800G PWR 48-PortSwitch 4800G 48-PortSwitch 4500 PWR 26-PortSwitch 4500 PWR 50-PortSwitch 4500 26-PortBASELINE SWITCH 2026SuperStackII Switch 9300SuperStackII Switch 39003CBLUG16A - Baseline Switch 28163Com categories
Switch
Network Router
Network Hardware
Wireless Access Point
Network Card
Modem
Computer Hardware
Software
Telephone
Gateway
manualsdatabase
Your AI-powered manual search engine