Manuals database logo
manualsdatabase
Your AI-powered manual search engine

3Com Switch 4800G PWR 24-Port manuals

Switch 4800G PWR 24-Port first page preview

Switch 4800G PWR 24-Port

Brand: 3Com | Category: Switch
Table of contents
  1. front panel
  2. power supply
  3. related standards
  4. fcc statement
  5. end of life statement
Switch 4800G PWR 24-Port first page preview

Switch 4800G PWR 24-Port

Brand: 3Com | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Conventions
  21. Preface
  22. Serving as a Convergence Layer Device
  23. Logging In to an Ethernet Switch
  24. Introduction
  25. Console Port Login Configuration
  26. Console Port Login Configuration with Authentication Mode Being None
  27. Console Port Login Configuration with Authentication Mode Being Password
  28. Console Port Login Configuration with Authentication Mode Being Scheme
  29. Telnet Configuration with Authentication Mode Being None
  30. Telnet Configuration with Authentication Mode Being Password
  31. Telnet Configuration with Authentication Mode Being Scheme
  32. Telnet Connection Establishment
  33. Configuration on the Administrator Side
  34. Modem Connection Establishment
  35. HTTP Connection Establishment
  36. Web Server Shutdown/Startup
  37. Displaying Web Users
  38. Connection Establishment Using NMS
  39. Overview
  40. Displaying the source IP address/Interface Specified for Telnet Packets
  41. Controlling Telnet Users
  42. Controlling Network Management Users by Source IP Addresses
  43. Controlling Web Users by Source IP Address
  44. configuration procedure
  45. Introduction to VLAN
  46. Configuring Basic VLAN Attributes
  47. Port-Based VLAN Configuration
  48. MAC Address-Based VLAN Configuration
  49. Protocol-Based VLAN Configuration
  50. Configuring IP-Subnet-Based VLAN
  51. Displaying and Maintaining VLAN
  52. Introduction to Voice VLAN
  53. Configuring Voice VLAN
  54. Displaying and Maintaining Voice VLAN
  55. Introduction to GVRP
  56. GVRP Configuration Task List
  57. Displaying and Maintaining GVRP
  58. IP Addressing Overview
  59. Configuring IP Addresses
  60. Displaying and Maintaining IP Addressing
  61. IP Performance Overview
  62. Configuring TCP Attributes
  63. Configuring ICMP to Send Error Packets
  64. Displaying and Maintaining IP Performance
  65. Introduction to QinQ
  66. Configuring Basic QinQ
  67. Configuring Selective QinQ
  68. Configuring the TPID Value to Be Carried in VLAN Tags
  69. Introduction to BPDU Tunneling
  70. Configuring BPDU Isolation
  71. Configuring BPDU Transparent Transmission
  72. Configuring Destination Multicast MAC Address for BPDU Tunnel Frames
  73. network diagram
  74. Ethernet Port Configuration
  75. Maintaining and Displaying an Ethernet Port
  76. Introduction to Port Isolation
  77. Displaying Isolation Groups
  78. Link Aggregation
  79. Approaches to Link Aggregation
  80. Load Sharing in a Link Aggregation Group
  81. Aggregation Port Group
  82. Configuring Link Aggregation
  83. Displaying and Maintaining Link Aggregation
  84. Link Aggregation Configuration Example
  85. Introduction to MAC Address Table
  86. Configuring MAC Address Table Management
  87. Displaying and Maintaining MAC Address Table Management
  88. IP Source Guard Overview
  89. Configuring Dynamic Binding Function
  90. Troubleshooting
  91. DLDP Configuration Task List
  92. Displaying and Maintaining DLDP
  93. MSTP Overview
  94. Configuration Task List
  95. Configuring the Root Bridge
  96. Configuring Leaf Nodes
  97. Performing mCheck
  98. Configuring Digest Snooping
  99. Configuring No Agreement Check
  100. Configuring Protection Functions
  101. Displaying and Maintaining MSTP
  102. MSTP Configuration Example
  103. IP Routing and Routing Table
  104. Routing Protocol Overview
  105. Displaying and Maintaining a Routing Table
  106. Introduction to Graceful Restart
  107. Graceful Restart Communication Procedure
  108. Graceful Restart Mechanism for Several Commonly Used Protocols
  109. Configuring a Static Route
  110. Detecting Reachability of the Static Route's Nexthop
  111. Displaying and Maintaining Static Routes
  112. RIP Overview
  113. Configuring RIP Basic Functions
  114. Configuring RIP Route Control
  115. Configuring RIP Network Optimization
  116. Displaying and Maintaining RIP
  117. Troubleshooting RIP
  118. Introduction to OSPF
  119. OSPF Configuration Task List
  120. Configuring OSPF Basic Functions
  121. Configuring OSPF Area Parameters
  122. Configuring OSPF Network Types
  123. Configuring OSPF Route Control
  124. Configuring OSPF Network Optimization
  125. Configuring OSPF Graceful Restart
  126. Displaying and Maintaining OSPF
  127. verify the configuration
  128. network requirements
  129. Troubleshooting OSPF Configuration
  130. IS-IS Overview
  131. IS-IS Configuration Task List
  132. Configuring IS-IS Basic Functions
  133. Configuring IS-IS Routing Information Control
  134. Tuning and Optimizing IS-IS Network
  135. Configuring IS-IS GR
  136. Displaying and Maintaining IS-IS
  137. IS-IS Configuration Example
  138. BGP Overview
  139. BGP Configuration Task List
  140. Configuring BGP Basic Functions
  141. Controlling Route Distribution and Reception
  142. Configuring BGP Route Attributes
  143. Tuning and Optimizing BGP Networks
  144. Configuring a Large Scale BGP Network
  145. Configuring BGP GR
  146. Displaying and Maintaining BGP
  147. BGP Configuration Examples
  148. bgp community configuration
  149. Troubleshooting BGP
  150. Introduction to Routing Policy
  151. Routing Policy Configuration Task List
  152. Configuring a Routing Policy
  153. Displaying and Maintaining the Routing Policy
  154. Troubleshooting Routing Policy Configuration
  155. Introduction to IPv6 Static Routing
  156. Displaying and Maintaining IPv6 Static Routes
  157. Introduction to RIPng
  158. Configuring RIPng Basic Functions
  159. Configuring RIPng Route Control
  160. Tuning and Optimizing the RIPng Network
  161. Displaying and Maintaining RIPng
  162. Introduction to OSPFv3
  163. IPv6 OSPFv3 Configuration Task List
  164. Configuring OSPFv3 Basic Functions
  165. Configuring OSPFv3 Routing Information Management
  166. Tuning and Optimizing an OSPFv3 Network
  167. Displaying and Maintaining OSPFv3
  168. OSPFv3 Configuration Examples
  169. Troubleshooting OSPFv3 Configuration
  170. Introduction to IPv6 IS-IS
  171. Configuring IPv6 IS-IS Routing Information Control
  172. Displaying and Maintaining IPv6 IS-IS
  173. IPv6 IS-IS Configuration Example
  174. IPv6 BGP Overview
  175. Configuring IPv6 BGP Basic Functions
  176. Configuring IPv6 BGP Route Attributes
  177. Tuning and Optimizing IPv6 BGP Networks
  178. Configuring a Large Scale IPv6 BGP Network
  179. Displaying and Maintaining IPv6 BGP Configuration
  180. IPv6 BGP Configuration Examples
  181. Troubleshooting IPv6 BGP Configuration
  182. Defining Filtering Lists
  183. Routing Policy Configuration Example
  184. IPv6 Overview
  185. IPv6 Basics Configuration Task List
  186. Configuring IPv6 NDP
  187. Configuring PMTU Discovery
  188. Configuring IPv6 TCP Properties
  189. Configuring IPv6 DNS
  190. Displaying and Maintaining IPv6 Basics Configuration
  191. IPv6 Configuration Example
  192. Troubleshooting IPv6 Basics Configuration
  193. Dual Stack Overview
  194. Introduction to Tunneling
  195. Tunneling Configuration Task List
  196. Configuring 6to4 Tunnel
  197. Configuring ISATAP Tunnel
  198. Displaying and Maintaining Tunneling Configuration
  199. Introduction to Multicast
  200. Multicast Models
  201. Multicast Architecture
  202. Multicast Packet Forwarding Mechanism
  203. IGMP Snooping Overview
  204. IGMP Snooping Configuration Task List
  205. Configuring Basic Functions of IGMP Snooping
  206. Configuring IGMP Snooping Port Functions
  207. Configuring IGMP Snooping Querier
  208. Configuring an IGMP Snooping Policy
  209. Displaying and Maintaining IGMP Snooping
  210. IGMP Snooping Configuration Examples
  211. Troubleshooting IGMP Snooping Configuration
  212. MLD Snooping Overview
  213. MLD Snooping Configuration Task List
  214. Configuring Basic Functions of MLD Snooping
  215. Configuring MLD Snooping Port Functions
  216. Configuring MLD Snooping Querier
  217. Configuring an MLD Snooping Policy
  218. Displaying and Maintaining MLD Snooping
  219. MLD Snooping Configuration Examples
  220. Troubleshooting MLD Snooping
  221. Introduction to Multicast VLAN
  222. Displaying and Maintaining Multicast VLAN
  223. Introduction to IPv6 Multicast VLAN
  224. Displaying and Maintaining IPv6 Multicast VLAN
  225. IGMP Overview
  226. IGMP Configuration Task List
  227. Configuring Basic Functions of IGMP
  228. Adjusting IGMP Performance
  229. Displaying and Maintaining IGMP
  230. IGMP Configuration Example
  231. Troubleshooting IGMP
  232. PIM Overview
  233. Configuring PIM-DM
  234. Configuring PIM-SM
  235. Configuring PIM-SSM
  236. Configuring PIM Common Information
  237. Displaying and Maintaining PIM
  238. PIM Configuration Examples
  239. Troubleshooting PIM Configuration
  240. MSDP Overview
  241. MSDP Configuration Task List
  242. Configuring an MSDP Peer Connection
  243. Configuring SA Messages Related Parameters
  244. Displaying and Maintaining MSDP
  245. Troubleshooting MSDP
  246. Multicast Routing and Forwarding Overview
  247. Configuring Multicast Routing and Forwarding
  248. Displaying and Maintaining Multicast Routing and Forwarding
  249. Troubleshooting Multicast Routing and Forwarding
  250. x Overview
  251. Configuring 802.1x
  252. Configuring a Guest VLAN
  253. Displaying and Maintaining 802.1x
  254. Guest VLAN Configuration Example
  255. ACL Assignment Configuration Example
  256. Introduction to HABP
  257. Displaying and Maintaining HABP
  258. MAC Authentication Overview
  259. Related Concepts
  260. Configuring MAC Authentication
  261. Displaying and Maintaining MAC Authentication
  262. AAA/RADIUS/HWTACACS Overview
  263. AAA/RADIUS/HWTACACS Configuration Task List
  264. Configuring AAA
  265. Configuring RADIUS
  266. Configuring HWTACACS
  267. Displaying and Maintaining AAA/RADIUS/HWTACACS
  268. AAA/RADIUS/HWTACACS Configuration Examples
  269. Troubleshooting AAA/RADIUS/HWTACACS
  270. ARP Overview
  271. Configuring ARP
  272. Configuring Gratuitous ARP
  273. Displaying and Maintaining ARP
  274. Proxy ARP Overview
  275. Proxy ARP Configuration Examples
  276. Introduction to DHCP
  277. DHCP Address Allocation
  278. DHCP Message Format
  279. DHCP Options
  280. Protocols and Standards
  281. Introduction to DHCP Server
  282. DHCP Server Configuration Task List
  283. Configuring an Address Pool for the DHCP Server
  284. Configuring the DHCP Server Security Functions
  285. Configuring the Handling Mode for Option 82
  286. DHCP Server Configuration Examples
  287. Troubleshooting DHCP Server Configuration
  288. Introduction to DHCP Relay Agent
  289. Configuring the DHCP Relay Agent
  290. Displaying and Maintaining DHCP Relay Agent Configuration
  291. DHCP Relay Agent Configuration Example
  292. Troubleshooting DHCP Relay Agent Configuration
  293. Introduction to DHCP Client
  294. Displaying and Maintaining the DHCP Client
  295. DHCP Snooping Overview
  296. Configuring DHCP Snooping Basic Functions
  297. Displaying and Maintaining DHCP Snooping
  298. Introduction to BOOTP Client
  299. Configuring an Interface to Dynamically Obtain an IP Address Through BOOTP
  300. Introduction to ACL
  301. Introduction to IPv4 ACL
  302. Introduction to IPv6 ACL
  303. Creating a Time Range
  304. Configuring a Basic IPv4 ACL
  305. Configuring an Advanced IPv4 ACL
  306. Configuring an Ethernet Frame Header ACL
  307. Copying an IPv4 ACL
  308. Displaying and Maintaining IPv4 ACLs
  309. Configuring a Basic IPv6 ACL
  310. Configuring an Advanced IPv6 ACL
  311. Copying an IPv6 ACL
  312. Traditional Packet Forwarding Service
  313. Occurrence and Influence of Congestion and the Countermeasures
  314. Major Traffic Management Techniques
  315. Traffic Classification Overview
  316. TP and LR Overview
  317. LR Configuration
  318. Displaying and Maintaining LR
  319. Configuring QoS Policy
  320. Displaying and Maintaining QoS Policy
  321. Congestion Management Policy
  322. Configuring an SP Queue
  323. Configuring a WRR Queue
  324. Configuring SP+WRR Queues
  325. Displaying and Maintaining Congestion Management
  326. Priority Mapping Overview
  327. Configuring a Priority Mapping Table
  328. Configuring the Port Priority
  329. Configuring Port Priority Trust Mode
  330. Displaying and Maintaining Priority Mapping
  331. Applying a QoS Policy to VLANs
  332. Displaying and Maintaining QoS Policies Applied to VLANs
  333. Configuring Traffic Mirroring
  334. Displaying and Maintaining Traffic Mirroring
  335. Introduction to Port Mirroring
  336. Configuring Local Port Mirroring
  337. Configuring Remote Port Mirroring
  338. Displaying and Maintaining Port Mirroring
  339. Port Mirroring Configuration Examples
  340. Cluster Management Overview
  341. Cluster Configuration Task List
  342. Configuring the Management Device
  343. Configuring the Member Devices
  344. Configuring Access Between the Management Device and Its Member Devices
  345. Adding a Candidate Device to a Cluster
  346. Displaying and Maintaining Cluster Management
  347. Introduction to UDP Helper
  348. Displaying and Maintaining UDP Helper
  349. SNMP Overview
  350. SNMP Configuration
  351. Configuring SNMP Logging
  352. Trap Configuration
  353. Displaying and Maintaining SNMP
  354. SNMP Configuration Example
  355. SNMP Logging Configuration Example
  356. RMON Overview
  357. Configuring RMON
  358. Displaying and Maintaining RMON
  359. RMON Configuration Example
  360. NTP Overview
  361. NTP Configuration Task list
  362. Configuring Optional Parameters of NTP
  363. Configuring Access-Control Rights
  364. Configuring NTP Authentication
  365. Displaying and Maintaining NTP
  366. DNS Overview
  367. Configuring the DNS Client
  368. Configuring the DNS Proxy
  369. DNS Configuration Examples
  370. Troubleshooting DNS Configuration
  371. File System Management
  372. Configuration File Management
  373. Displaying and Maintaining Device Configuration
  374. FTP Overview
  375. Configuring the FTP Client
  376. Configuring the FTP Server
  377. Displaying and Maintaining FTP
  378. TFTP Overview
  379. Configuring the TFTP Client
  380. Displaying and Maintaining the TFTP Client
  381. Information Center Overview
  382. Configuring Information Center
  383. Displaying and Maintaining Information Center
  384. Basic Configurations
  385. CLI Features
  386. System Maintaining and Debugging Overview
  387. System Maintaining and Debugging
  388. System Maintaining Example
  389. Device Management Overview
  390. Displaying and Maintaining Device Management Configuration
  391. NQA Overview
  392. NQA Configuration Task List
  393. Enabling the NQA Client
  394. Configuring the Collaboration Function
  395. Configuring Optional Parameters Common to an NQA Test Group
  396. Scheduling an NQA Test Group
  397. Displaying and Maintaining NQA
  398. Introduction to VRRP
  399. Configuring VRRP for IPv4
  400. Configuring VRRP for IPv6
  401. IPv4-Based VRRP Configuration Examples
  402. IPv6-Based VRRP Configuration Examples
  403. Troubleshooting VRRP
  404. SSH2.0 Overview
  405. Configuring the Device as an SSH Server
  406. Configuring the Device as an SSH Client
  407. Displaying and Maintaining SSH
  408. SSH Server Configuration Examples
  409. SSH Client Configuration Examples
  410. SFTP Overview
  411. Configuring an SFTP Client
  412. SFTP Configuration Example
  413. RRPP Overview
  414. RRPP Configuration Task List
  415. Configuring Master Node
  416. Configuring Transit Node
  417. Configuring Edge Node
  418. Configuring Assistant Edge Node
  419. Displaying and Maintaining RRPP
  420. configuration considerations
  421. networking requirements
  422. rrpp typical configuration examples
  423. Introduction to Port Security
  424. Port Security Configuration Task List
  425. Setting the Maximum Number of Secure MAC Addresses
  426. Configuring Port Security Features
  427. Configuring Secure MAC Addresses
  428. Displaying and Maintaining Port Security
  429. Troubleshooting Port Security
  430. Introduction to LLDP
  431. LLDP Configuration Tasks List
  432. Configuring LLDP Trap
  433. LLDP Configuration Example
  434. lldp configuration example
  435. PoE Overview
  436. PoE Configuration Task List
  437. Configuring PD Power Management
  438. Configuring a Power Alarm Threshold for the PSE
  439. Configuring a PD Disconnection Detection Mode
  440. Displaying and Maintaining PoE
  441. Troubleshooting PoE
  442. sFlow Overview
  443. Configuring sFlow
  444. Troubleshooting sFlow Configuration
  445. SSL Overview
  446. SSL Configuration Task List
  447. Configuring an SSL Client Policy
  448. Displaying and Maintaining SSL
  449. HTTPS Overview
  450. Associating the HTTPS Service with an SSL Server Policy
  451. Associating the HTTPS Service with a Certificate Attribute Access Control Policy
  452. Introduction to PKI
  453. PKI Configuration Task List
  454. Configuring a PKI Domain
  455. Submitting a PKI Certificate Request
  456. Retrieving a Certificate Manually
  457. Configuring PKI Certificate Validation
  458. Destroying a Local RSA Key Pair
  459. Deleting a Certificate
  460. PKI Configuration Examples
  461. Troubleshooting PKI
  462. Track Overview
  463. Track Configuration Task List
  464. Configuring Collaboration Between the Track Module and the Application Modules
  465. Displaying and Maintaining Track Object(s)
Switch 4800G PWR 24-Port first page preview

Switch 4800G PWR 24-Port

Brand: 3Com | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. related documentation
  4. Login
  5. logging in through the console port
  6. console port login configuration
  7. console port login configurations for different authentication modes
  8. console port login configuration with authentication mode being none
  9. console port login configuration with authentication mode being password
  10. console port login configuration with authentication mode being scheme
  11. logging in through telnet
  12. telnet configuration with authentication mode being none
  13. telnet configuration with authentication mode being password
  14. telnet configuration with authentication mode being scheme
  15. telnetting to a switch
  16. telnetting to another switch from the current switch
  17. logging in using a modem
  18. modem connection establishment
  19. cli configuration
  20. modifying the command level
  21. switching user level
  22. cli views
  23. cli features
  24. terminal display
  25. command edit
  26. management interface
  27. configuring the login banner
  28. connection establishment using nms
  29. configuring source ip address for telnet service packets
  30. displaying source ip address configuration
  31. user control
  32. controlling network management users by source ip addresses
  33. controlling web users by source ip address
  34. logging out a web user
  35. Configuration File Management
  36. introduction to configuration file
  37. configuration task list
  38. VLAN
  39. Static Routing
  40. static routing configuration
  41. static route
  42. configuring a static route
  43. static route configuration example
  44. Voice VLAN
  45. security mode of voice vlan
  46. displaying and maintaining voice vlan
  47. voice vlan configuration example
  48. GVRP
  49. configuring gvrp timers
  50. displaying and maintaining gvrp
  51. Port Basic Configuration
  52. ethernet port configuration
  53. Link Aggregation
  54. configuring a port group
  55. link aggregation classification
  56. static lacp aggregation group
  57. aggregation group categories
  58. displaying and maintaining link aggregation configuration
  59. Port Isolation
  60. port isolation configuration example
  61. port security configuration
  62. port security configuration task list
  63. configuring security mac addresses
  64. displaying and maintaining port security configuration
  65. port binding overview
  66. MAC Address Table Management
  67. managing mac address table
  68. configuring mac address table management
  69. displaying mac address table information
  70. MSTP
  71. mstp configuration
  72. mstp overview
  73. basic mstp terminologies
  74. configuring root bridge
  75. configuring leaf nodes
  76. configuring port priority
  77. performing mcheck operation
  78. configuring guard functions
  79. configuring loop guard
  80. configuring digest snooping
  81. configuring rapid transition
  82. stp maintenance configuration
  83. displaying and maintaining mstp
  84. x authentication procedure
  85. quick ead deployment configuration
  86. MAC Address Authentication
  87. quick ead deployment configuration example
  88. troubleshooting
  89. introduction to habp
  90. habp client configuration
  91. system guard configuration
  92. aaa overview
  93. introduction to aaa services
  94. introduction to hwtacacs
  95. aaa configuration
  96. configuring an aaa scheme for an isp domain
  97. configuring the attributes of a local user
  98. radius configuration task list
  99. configuring the status of radius servers
  100. configuring timers for radius servers
  101. hwtacacs configuration task list
  102. aaa configuration examples
  103. hwtacacs authentication and authorization of telnet users
  104. troubleshooting aaa
  105. ead configuration example
  106. mac address authentication configuration
  107. related concepts
  108. mac address authentication enhanced function configuration
  109. displaying and maintaining mac address authentication configuration
  110. ip addressing overview
  111. DHCP
  112. displaying ip addressing configuration
  113. ip performance overview
  114. displaying and maintaining ip performance optimization configuration
  115. arp configuration
  116. arp table
  117. configuring arp
  118. configuring gratuitous arp
  119. arp configuration examples
  120. dhcp overview
  121. updating ip address lease
  122. protocol specification
  123. dhcp relay agent configuration
  124. configuring the dhcp relay agent
  125. configuring the dhcp relay agent to support option
  126. displaying and maintaining dhcp relay agent configuration
  127. troubleshooting dhcp relay agent configuration
  128. introduction to dhcp client
  129. bootp client configuration example
  130. dns configuration
  131. configuring domain name resolution
  132. displaying and maintaining dns
  133. dns configuration examples
  134. dynamic domain name resolution configuration example
  135. troubleshooting dns
  136. configuring time range
  137. configuring basic acl
  138. configuring advanced acl
  139. configuring layer 2 acl
  140. acl assignment
  141. assigning an acl to a port group
  142. displaying acl configuration
  143. example for controlling telnet login users by source ip
  144. basic acl configuration example
  145. advanced acl configuration example
  146. example for applying an acl to a vlan
  147. introduction to qos features
  148. queue scheduling
  149. configuring priority mapping
  150. configuring traffic policing
  151. configuring traffic shaping
  152. enabling the burst function
  153. qos configuration examples
  154. Mirroring
  155. remote port mirroring
  156. configuring local port mirroring
  157. configuring remote port mirroring
  158. displaying port mirroring
  159. remote port mirroring configuration example
  160. stack function overview
  161. main switch configuration
  162. slave switch configuration
  163. displaying and debugging a stack
  164. cluster overview
  165. cluster configuration tasks
  166. SNMP-RMON
  167. displaying and maintaining cluster configuration
  168. cluster configuration example
  169. enhanced cluster feature configuration example
  170. snmp configuration
  171. configuring basic snmp functions
  172. enabling logging for network management
  173. rmon configuration
  174. Multicast
  175. displaying rmon
  176. roles in multicast
  177. multicast models
  178. multicast architecture
  179. multicast protocols
  180. multicast packet forwarding mechanism
  181. work mechanism of igmp snooping
  182. displaying and maintaining igmp snooping
  183. configuring multicast vlan
  184. troubleshooting igmp snooping
  185. displaying common multicast configuration
  186. ntp configuration
  187. ntp implementation modes
  188. ntp configuration task list
  189. configuring access control right
  190. configuring ntp authentication
  191. configuring optional ntp parameters
  192. displaying ntp configuration
  193. configuring ntp symmetric peer mode
  194. ssh configuration
  195. ssh server and client
  196. configuring the ssh server
  197. creating an ssh user and specifying an authentication type
  198. configuring the ssh client
  199. displaying and maintaining ssh configuration
  200. comparison of ssh commands with the same functions
  201. ssh configuration examples
  202. when switch acts as server for password and hwtacacs authentication
  203. when switch acts as client for password authentication
  204. when switch acts as client for publickey authentication
  205. file system configuration
  206. flash memory operations
  207. file system configuration example
  208. file attribute configuration
  209. booting with the startup file
  210. introduction to ftp and sftp
  211. ftp configuration
  212. ftp banner display configuration example
  213. sftp configuration
  214. sftp configuration example
  215. tftp configuration example
  216. information center
  217. system information format
  218. information center configuration
  219. displaying and maintaining information center
  220. information center configuration examples
  221. log output to a linux log host
  222. log output to the console
  223. introduction to loading approaches
  224. boot menu
  225. loading by xmodem through console port
  226. loading by tftp through ethernet port
  227. loading by ftp through ethernet port
  228. remote boot rom and software loading
  229. remote loading using tftp
  230. basic system configuration
  231. displaying the system status
  232. device management
  233. displaying the device management configuration
  234. dhcp test
  235. ftp test
  236. http test
  237. jitter test
  238. snmp test
  239. dns test
  240. poe configuration
  241. poe configuration example
  242. displaying poe profile configuration
  243. poe profile configuration example
  244. smart link overview
  245. configuring smart link
  246. configuring associated devices
  247. displaying and maintaining smart link
  248. monitor link configuration
  249. configuring monitor link
  250. displaying monitor link configuration
  251. ipv6 configuration
  252. introduction to ipv6 address
  253. ipv6 configuration task list
  254. configuring ipv6 tcp properties
  255. ipv6 configuration example
  256. ipv6 application configuration
  257. ipv6 telnet
  258. ipv6 application configuration example
  259. troubleshooting ipv6 application
  260. udp helper configuration
  261. configuring udp helper
  262. udp helper configuration example
  263. access management configuration
  264. configuring access management
  265. combining access management with port isolation
Switch 4800G PWR 24-Port first page preview

Switch 4800G PWR 24-Port

Brand: 3Com | Category: Switch
Table of contents
  1. configuration guide
  2. about this manual
  3. Table of Contents
  4. Table Of Contents
  5. product features
  6. access volume
  7. ip services volume
  8. ip routing volume
  9. qos volume
  10. security volume
  11. high availability volume
  12. system volume
  13. manual version
  14. Table of Contents
  15. Table Of Contents
  16. ethernet port configuration
  17. configuring an auto-negotiation transmission rate
  18. configuring flow control on an ethernet port
  19. configuring the suppression time of physical-link-state change on an ethernet port
  20. configuring a port group
  21. setting the interval for collecting ethernet port statistics
  22. enabling forwarding of jumbo frames
  23. configuring the mdi mode for an ethernet port
  24. testing the cable on an ethernet port
  25. displaying and maintaining an ethernet port
  26. Table of Contents
  27. Table Of Contents
  28. ethernet link aggregation configuration
  29. aggregating links in static mode
  30. aggregating links in dynamic mode
  31. load sharing criteria for link aggregation groups
  32. ethernet link aggregation configuration task list
  33. configuring a static aggregation group
  34. configuring an aggregate interface
  35. enabling link state trapping for an aggregate interface
  36. displaying and maintaining ethernet link aggregation
  37. static aggregation configuration example
  38. dynamic aggregation configuration example
  39. aggregation load sharing configuration example
  40. Table of Contents
  41. Table Of Contents
  42. port isolation configuration
  43. port isolation configuration example
  44. Table Of Contents
  45. mstp configuration
  46. protocol packets of stp
  47. how stp works
  48. introduction to rstp
  49. introduction to mstp
  50. basic concepts in mstp
  51. how mstp works
  52. implementation of mstp on devices
  53. configuring mstp
  54. configuring the root bridge or a secondary root bridge
  55. configuring the work mode of an mstp device
  56. configuring the maximum hops of an mst region
  57. configuring timers of mstp
  58. configuring the timeout factor
  59. configuring the maximum port rate
  60. configuring path costs of ports
  61. configuring port priority
  62. configuring the link type of ports
  63. enabling the output of port state transition information
  64. enabling the mstp feature
  65. configuring digest snooping
  66. configuring no agreement check
  67. configuring protection functions
  68. displaying and maintaining mstp
  69. Table of Contents
  70. Table Of Contents
  71. lldp configuration
  72. how lldp works
  73. lldp configuration task list
  74. performing basic lldp configuration
  75. setting the lldp re-initialization delay
  76. configuring the management address and its encoding format
  77. setting other lldp parameters
  78. configuring cdp compatibility
  79. configuring lldp trapping
  80. displaying and maintaining lldp
  81. configuration procedure
  82. cdp-compatible lldp configuration example
  83. Table of Contents
  84. Table Of Contents
  85. vlan configuration
  86. vlan fundamentals
  87. types of vlan
  88. configuring basic settings of a vlan interface
  89. port-based vlan configuration
  90. assigning an access port to a vlan
  91. assigning a trunk port to a vlan
  92. assigning a hybrid port to a vlan
  93. mac-based vlan configuration
  94. protocol-based vlan configuration
  95. configuring a protocol-based vlan
  96. ip subnet-based vlan configuration
  97. displaying and maintaining vlan
  98. isolate-user-vlan configuration
  99. displaying and maintaining isolate-user-vlan
  100. voice vlan configuration
  101. voice vlan assignment modes
  102. security mode and normal mode of voice vlans
  103. configuring a voice vlan
  104. setting a port to operate in manual voice vlan assignment mode
  105. displaying and maintaining voice vlan
  106. manual voice vlan assignment mode configuration example
  107. gvrp configuration
  108. gvrp configuration task list
  109. configuring garp timers
  110. displaying and maintaining gvrp
  111. gvrp configuration examples
  112. gvrp configuration example ii
  113. gvrp configuration example iii
  114. Table of Contents
  115. Table Of Contents
  116. qinq configuration
  117. how qinq works
  118. implementations of qinq
  119. configuring basic qinq
  120. configuring the tpid value in vlan tags
  121. comprehensive selective qinq configuration example
  122. Table of Contents
  123. Table Of Contents
  124. introduction to bpdu tunneling
  125. bpdu tunneling implementation
  126. configuring bpdu tunneling
  127. configuring destination multicast mac address for bpdus
  128. bpdu tunneling for pvst configuration example
  129. Table of Contents
  130. Table Of Contents
  131. port mirroring configuration
  132. configuring local port mirroring
  133. configuring remote port mirroring
  134. configuring a remote destination mirroring group (on the destination device)
  135. displaying and maintaining port mirroring
  136. remote port mirroring configuration example
  137. configuring traffic mirroring
  138. mirroring traffic to the cpu
  139. applying a qos policy
  140. displaying and maintaining traffic mirroring
  141. Table of Contents
  142. Table Of Contents
  143. ip addressing overview
  144. special ip addresses
  145. configuring ip addresses
  146. ip addressing configuration example
  147. displaying and maintaining ip addressing
  148. Table of Contents
  149. Table Of Contents
  150. arp configuration
  151. arp message format
  152. arp table
  153. configuring arp
  154. enabling the arp entry check
  155. arp configuration example
  156. configuring gratuitous arp
  157. proxy arp configuration
  158. enabling proxy arp
  159. displaying and maintaining proxy arp
  160. local proxy arp configuration example in case of port isolation
  161. local proxy arp configuration example in isolate-user-vlan
  162. Table of Contents
  163. Table Of Contents
  164. Table Of Contents
  165. dhcp overview
  166. dhcp address allocation
  167. ip address lease extension
  168. dhcp options
  169. self-defined options
  170. protocols and standards
  171. dhcp relay agent configuration
  172. dhcp relay agent support for option
  173. dhcp relay agent configuration task list
  174. enabling the dhcp relay agent on an interface
  175. configuring the dhcp relay agent security functions
  176. configuring the dhcp relay agent to send a dhcp-release request
  177. displaying and maintaining dhcp relay agent configuration
  178. dhcp relay agent option 82 support configuration example
  179. troubleshooting dhcp relay agent configuration
  180. dhcp client configuration
  181. displaying and maintaining the dhcp client
  182. dhcp snooping configuration
  183. application environment of trusted ports
  184. dhcp snooping support for option
  185. configuring dhcp snooping basic functions
  186. configuring dhcp snooping to support option 82
  187. displaying and maintaining dhcp snooping
  188. dhcp snooping option 82 support configuration example
  189. bootp client configuration
  190. configuring an interface to dynamically obtain an ip address through bootp
  191. displaying and maintaining bootp client configuration
  192. Table of Contents
  193. Table Of Contents
  194. dns configuration
  195. dns proxy
  196. configuring the dns client
  197. configuring the dns proxy
  198. dynamic domain name resolution configuration example
  199. dns proxy configuration example
  200. troubleshooting dns configuration
  201. Table of Contents
  202. Table Of Contents
  203. ip performance overview
  204. enabling forwarding of directed broadcasts to a directly connected network
  205. configuring tcp optional parameters
  206. configuring icmp to send error packets
  207. displaying and maintaining ip performance optimization
  208. Table of Contents
  209. Table Of Contents
  210. udp helper configuration
  211. displaying and maintaining udp helper
  212. Table Of Contents
  213. ipv6 overview
  214. introduction to ipv6 address
  215. introduction to ipv6 neighbor discovery protocol
  216. ipv6 pmtu discovery
  217. ipv6 basics configuration task list
  218. configuring basic ipv6 functions
  219. configuring ipv6 ndp
  220. configuring the maximum number of neighbors dynamically learned
  221. configuring pmtu discovery
  222. configuring ipv6 tcp properties
  223. enable sending of multicast echo replies
  224. configuring ipv6 dns client
  225. displaying and maintaining ipv6 basics configuration
  226. ipv6 configuration example
  227. troubleshooting ipv6 basics configuration
  228. Table Of Contents
  229. dual stack overview
  230. Table Of Contents
  231. sflow configuration
  232. configuring sflow
  233. sflow configuration example
  234. troubleshooting sflow configuration
  235. ip routing overview
  236. routing protocol overview
  237. displaying and maintaining a routing table
  238. Table of Contents
  239. Table Of Contents
  240. static routing configuration
  241. configuring a static route
  242. detecting reachability of the static route's nexthop
  243. displaying and maintaining static routes
  244. static route configuration example
  245. Table of Contents
  246. Table Of Contents
  247. rip configuration
  248. rip version
  249. rip message format
  250. configuring rip basic functions
  251. configuring rip route control
  252. configuring ripv2 route summarization
  253. disabling host route reception
  254. configuring inbound/outbound route filtering
  255. configuring rip network optimization
  256. configuring rip timers
  257. enabling zero field check on incoming ripv1 messages
  258. configuring ripv2 message authentication
  259. displaying and maintaining rip
  260. rip configuration examples
  261. configuring an additional metric for a rip interface
  262. troubleshooting rip
  263. route oscillation occurred
  264. ipv6 static routing configuration
  265. displaying and maintaining ipv6 static routes
  266. Table of Contents
  267. Table Of Contents
  268. ripng configuration
  269. ripng packet format
  270. configuring ripng basic functions
  271. configuring ripng route control
  272. configuring ripng route summarization
  273. configuring a ripng route filtering policy
  274. tuning and optimizing the ripng network
  275. configuring zero field check on ripng packets
  276. displaying and maintaining ripng
  277. Table of Contents
  278. Table Of Contents
  279. route policy configuration
  280. route policy configuration task list
  281. defining filters
  282. configuring a route policy
  283. creating a route policy
  284. defining apply clauses
  285. displaying and maintaining the route policy
  286. applying a route policy to ipv6 route redistribution
  287. troubleshooting route policy configuration
  288. ipv6 routing information filtering failure
  289. Table of Contents
  290. Table Of Contents
  291. multicast overview
  292. features of multicast
  293. multicast models
  294. multicast architecture
  295. multicast addresses
  296. multicast protocols
  297. multicast packet forwarding mechanism
  298. Table of Contents
  299. Table Of Contents
  300. igmp snooping configuration
  301. basic concepts in igmp snooping
  302. how igmp snooping works
  303. igmp snooping configuration task list
  304. configuring basic functions of igmp snooping
  305. configuring igmp snooping port functions
  306. configuring simulated joining
  307. configuring igmp snooping querier
  308. configuring igmp queries and responses
  309. configuring an igmp snooping policy
  310. configuring a multicast group filter
  311. configuring the function of dropping unknown multicast data
  312. configuring igmp report suppression
  313. configuring multicast group replacement
  314. displaying and maintaining igmp snooping
  315. igmp snooping configuration examples
  316. network diagram
  317. igmp snooping querier configuration
  318. troubleshooting igmp snooping configuration
  319. Table of Contents
  320. Table Of Contents
  321. multicast vlan configuration
  322. multicast vlan configuration task list
  323. configuring port-based multicast vlan
  324. configuring multicast vlan ports
  325. displaying and maintaining multicast vlan
  326. port-based multicast vlan configuration
  327. Table of Contents
  328. Table Of Contents
  329. mld snooping configuration
  330. basic concepts in mld snooping
  331. how mld snooping works
  332. mld snooping configuration task list
  333. configuring basic functions of mld snooping
  334. configuring mld snooping port functions
  335. configuring mld snooping querier
  336. configuring mld queries and responses
  337. configuring source ipv6 addresses of mld queries
  338. configuring an mld snooping policy
  339. configuring ipv6 multicast source port filtering
  340. configuring mld report suppression
  341. configuring ipv6 multicast group replacement
  342. displaying and maintaining mld snooping
  343. mld snooping configuration examples
  344. mld snooping querier configuration
  345. troubleshooting mld snooping
  346. configured ipv6 multicast group policy fails to take effect
  347. Table of Contents
  348. Table Of Contents
  349. introduction to ipv6 multicast vlan
  350. ipv6 multicast vlan configuration task list
  351. configuring port-based ipv6 multicast vlan
  352. configuring ipv6 multicast vlan ports
  353. displaying and maintaining ipv6 multicast vlan
  354. port-based multicast vlan configuration example
  355. Table of Contents
  356. Table Of Contents
  357. Table Of Contents
  358. qos overview
  359. diffserv service model
  360. qos configuration approaches
  361. configuring a qos policy
  362. defining a traffic behavior
  363. applying the qos policy
  364. displaying and maintaining qos policies
  365. priority mapping overview
  366. priority trust mode on a port
  367. priority mapping configuration tasks
  368. configuring priority mapping
  369. displaying and maintaining priority mapping
  370. traffic policing and line rate configuration
  371. traffic policing
  372. line rate
  373. configuration example
  374. configuring the line rate
  375. congestion management configuration
  376. congestion management configuration approaches
  377. configuring congestion management
  378. configuring wfq queuing
  379. configuring sp+wrr queues
  380. displaying and maintaining congestion management
  381. traffic filtering configuration
  382. traffic filtering configuration example
  383. configuring priority marking
  384. priority marking configuration example
  385. traffic redirecting configuration
  386. class-based accounting configuration
  387. displaying and maintaining traffic accounting
  388. appendix a acronym
  389. appendix b default priority mapping tables
  390. appendix c introduction to packet precedences
  391. p priority
  392. Table of Contents
  393. Table Of Contents
  394. user profile configuration
  395. creating a user profile
  396. enabling a user profile
  397. Table of Contents
  398. Table Of Contents
  399. Table Of Contents
  400. aaa configuration
  401. introduction to radius
  402. security and authentication mechanisms
  403. radius packet format
  404. extended radius attributes
  405. introduction to hwtacacs
  406. aaa configuration task list
  407. radius configuration task list
  408. configuring aaa
  409. configuring isp domain attributes
  410. configuring aaa authentication methods for an isp domain
  411. configuring aaa authorization methods for an isp domain
  412. configuring aaa accounting methods for an isp domain
  413. configuring local user attributes
  414. displaying and maintaining aaa
  415. configuring radius
  416. specifying the radius authentication/authorization servers
  417. setting the shared key for radius packets
  418. setting the upper limit of radius request retransmission attempts
  419. setting the status of radius servers
  420. configuring attributes related to data to be sent to the radius server
  421. setting timers regarding radius servers
  422. configuring radius accounting-on
  423. specifying a security policy server
  424. configuring hwtacacs
  425. specifying the hwtacacs authentication servers
  426. specifying the hwtacacs accounting servers
  427. setting the shared key for hwtacacs packets
  428. setting timers regarding hwtacacs servers
  429. aaa configuration examples
  430. aaa for telnet users by separate servers
  431. aaa for ssh users by a radius server
  432. troubleshooting aaa
  433. troubleshooting hwtacacs
  434. Table of Contents
  435. Table Of Contents
  436. x configuration
  437. architecture of 802.1x
  438. eap over lans
  439. eap over radius
  440. authentication process of 802.1x
  441. x timers
  442. extensions to 802.1x
  443. configuring 802.1x
  444. configuring 802.1x for a port
  445. configuring an 802.1x guest vlan
  446. x configuration example
  447. guest vlan and vlan assignment configuration example
  448. acl assignment configuration example
  449. x-based ead fast deployment configuration
  450. configuring ead fast deployment
  451. displaying and maintaining ead fast deployment
  452. troubleshooting ead fast deployment
  453. Table of Contents
  454. Table Of Contents
  455. introduction to habp
  456. configuring habp
  457. displaying and maintaining habp
  458. Table Of Contents
  459. mac authentication configuration
  460. related concepts
  461. configuring mac authentication
  462. configuring a guest vlan
  463. displaying and maintaining mac authentication
  464. radius-based mac authentication configuration example
  465. Table of Contents
  466. Table Of Contents
  467. port security configuration
  468. port security modes
  469. port security configuration task list
  470. setting the maximum number of secure mac addresses
  471. setting the port security mode
  472. configuring port security features
  473. configuring intrusion protection
  474. configuring secure mac addresses
  475. displaying and maintaining port security
  476. configuring the userloginwithoui mode
  477. configuring the macaddresselseuserloginsecure mode
  478. configuration information
  479. troubleshooting port security
  480. cannot change port security mode when a user is online
  481. Table of Contents
  482. Table Of Contents
  483. ip source guard configuration
  484. configuring a static binding entry
  485. ip source guard configuration examples
  486. dynamic binding function configuration example
  487. troubleshooting ip source guard
  488. Table of Contents
  489. Table Of Contents
  490. ssh2.0 configuration
  491. configuring the device as an ssh server
  492. enabling ssh server
  493. configuring a client public key
  494. configuring an ssh user
  495. setting the ssh management parameters
  496. configuring the device as an ssh client
  497. configuring whether first-time authentication is supported
  498. displaying and maintaining ssh
  499. when switch acts as server for publickey authentication
  500. ssh client configuration examples
  501. when switch acts as client for publickey authentication
  502. sftp service
  503. configuring an sftp client
  504. working with the sftp directories
  505. working with sftp files
  506. terminating the connection to the remote sftp server
  507. sftp server configuration example
  508. Table of Contents
  509. Table Of Contents
  510. pki configuration
  511. architecture of pki
  512. pki configuration task list
  513. configuring an entity dn
  514. configuring a pki domain
  515. submitting a pki certificate request
  516. retrieving a certificate manually
  517. configuring pki certificate verification
  518. destroying a local rsa key pair
  519. deleting a certificate
  520. pki configuration examples
  521. requesting a certificate from a ca running windows 2003 server
  522. configuring a certificate attribute-based access control policy
  523. troubleshooting pki
  524. failed to retrieve crls
  525. Table of Contents
  526. Table Of Contents
  527. ssl configuration
  528. ssl configuration task list
  529. configuring an ssl server policy
  530. ssl server policy configuration example
  531. configuring an ssl client policy
  532. troubleshooting ssl
  533. Table of Contents
  534. Table Of Contents
  535. public key configuration
  536. configuring the local asymmetric key pair
  537. displaying or exporting the local rsa or dsa host public key
  538. displaying and maintaining public keys
  539. public key configuration examples
  540. importing the public key of a peer from a public key file
  541. Table of Contents
  542. Table Of Contents
  543. Table Of Contents
  544. acl overview
  545. introduction to ipv4 acl
  546. ipv4 acl naming
  547. ipv4 acl step
  548. introduction to ipv6 acl
  549. ipv6 acl step
  550. ipv4 acl configuration
  551. configuring a basic ipv4 acl
  552. configuring an advanced ipv4 acl
  553. configuring an ethernet frame header acl
  554. copying an ipv4 acl
  555. displaying and maintaining ipv4 acls
  556. ipv6 acl configuration
  557. configuring an advanced ipv6 acl
  558. copying an ipv6 acl
  559. displaying and maintaining ipv6 acls
  560. acl application for packet filtering
  561. filtering ipv6 packets
  562. acl application example
  563. applying an acl to a vlan interface
  564. Table of Contents
  565. Table Of Contents
  566. arp attack protection configuration
  567. configuring arp defense against ip packet attacks
  568. enabling arp black hole routing
  569. configuring source mac address based arp attack detection
  570. configuring arp packet source mac address consistency check
  571. configuring arp detection
  572. configuring arp detection based on specified objects
  573. arp detection configuration example i
  574. arp detection configuration example ii
  575. Table of Contents
  576. Table Of Contents
  577. smart link overview
  578. how smart link works
  579. smart link configuration task list
  580. configuring protected vlans for a smart link group
  581. configuring role preemption for a smart link group
  582. smart link device configuration example
  583. configuring an associated device
  584. displaying and maintaining smart link
  585. multiple smart link groups load sharing configuration example
  586. Table of Contents
  587. Table Of Contents
  588. monitor link configuration
  589. configuring monitor link
  590. configuring monitor link group member ports
  591. monitor link configuration example
  592. Table of Contents
  593. Table Of Contents
  594. rrpp overview
  595. basic concepts in rrpp
  596. rrpp timers
  597. typical rrpp networking
  598. rrpp configuration task list
  599. creating an rrpp domain
  600. configuring control vlans
  601. configuring rrpp rings
  602. configuring rrpp nodes
  603. activating an rrpp domain
  604. configuring an rrpp ring group
  605. displaying and maintaining rrpp
  606. intersecting ring configuration example
  607. intersecting-ring load balancing configuration example
  608. troubleshooting
  609. Table of Contents
  610. Table Of Contents
  611. dldp configuration
  612. how dldp works
  613. dldp configuration task list
  614. enabling dldp
  615. setting the interval for sending advertisement packets
  616. setting the port shutdown mode
  617. configuring dldp authentication
  618. displaying and maintaining dldp
  619. Table of Contents
  620. Table Of Contents
  621. ethernet oam configuration
  622. how ethernet oam works
  623. standards and protocols
  624. configuring link monitoring
  625. configuring errored frame seconds event detection
  626. displaying and maintaining ethernet oam configuration
  627. ethernet oam configuration example
  628. Table of Contents
  629. Table Of Contents
  630. cfd configuration
  631. cfd functions
  632. basic configuration tasks
  633. configuring mep
  634. configuring cc on meps
  635. configuring lb on meps
  636. finding the path between a source mep and a target mep
  637. cfd configuration examples
  638. configuring mep and enabling cc on it
  639. configuring the rules for generating mips
  640. Table of Contents
  641. Table Of Contents
  642. track overview
  643. track configuration task list
  644. configuring collaboration between the track module and the application modules
  645. displaying and maintaining track object(s)
  646. Table of Contents
  647. Table Of Contents
  648. Table Of Contents
  649. logging in to an ethernet switch
  650. users and user interfaces
  651. logging in through the console port
  652. console port login configuration
  653. console port login configuration with authentication mode being none
  654. console port login configuration with authentication mode being password
  655. console port login configuration with authentication mode being scheme
  656. logging in through telnet
  657. telnet login configuration task list
  658. telnet login configuration with authentication mode being password
  659. telnet login configuration with authentication mode being scheme
  660. logging in through ssh
  661. user interface configuration examples
  662. command authorization configuration example
  663. command accounting configuration example
  664. web server configuration
  665. displaying web users
  666. connection establishment using nms
  667. specifying source for telnet packets
  668. displaying the source ip address/interface specified for telnet packets
  669. controlling telnet users
  670. controlling telnet users by source and destination ip addresses
  671. controlling telnet users by source mac addresses
  672. controlling network management users by source ip addresses
  673. controlling web users by source ip addresses
  674. Table of Contents
  675. Table Of Contents
  676. basic configurations
  677. entering system view
  678. configuring the system clock
  679. displaying the system clock
  680. enabling/disabling the display of copyright information
  681. configuring a banner
  682. configuring cli hotkeys
  683. configuring command alias
  684. configuring user privilege levels and command levels
  685. configuring user privilege level
  686. switching user privilege level
  687. modifying command level
  688. cli features
  689. synchronous information output
  690. editing features
  691. cli display
  692. display functions
  693. saving history commands
  694. Table of Contents
  695. Table Of Contents
  696. device management
  697. rebooting a device
  698. configuring the scheduled automatic execution function
  699. upgrading device software
  700. upgrading the boot file through command lines
  701. configuring a detection interval
  702. identifying and diagnosing pluggable transceivers
  703. displaying and maintaining device management configuration
  704. device management configuration examples
  705. Table of Contents
  706. Table Of Contents
  707. file system management
  708. directory operations
  709. file operations
  710. batch operations
  711. setting file system prompt modes
  712. configuration file management
  713. saving the current configuration
  714. specifying a startup configuration file for the next system startup
  715. backing up the startup configuration file
  716. displaying and maintaining device configuration
  717. ftp configuration
  718. configuring the ftp client
  719. ftp client configuration example
  720. configuring the ftp server
  721. configuring authentication and authorization on the ftp server
  722. ftp server configuration example
  723. displaying and maintaining ftp
  724. tftp configuration
  725. configuring the tftp client
  726. displaying and maintaining the tftp client
  727. Table of Contents
  728. Table Of Contents
  729. http configuration
  730. configuring the port number of the http service
  731. displaying and maintaining http
  732. https configuration
  733. associating the https service with an ssl server policy
  734. associating the https service with a certificate attribute access control policy
  735. associating the https service with an acl
  736. Table of Contents
  737. Table Of Contents
  738. snmp configuration
  739. snmp protocol version
  740. configuring snmp logging
  741. snmp trap configuration
  742. configuring trap parameters
  743. displaying and maintaining snmp
  744. snmp configuration example
  745. snmp logging configuration example
  746. mib style configuration
  747. Table of Contents
  748. Table Of Contents
  749. rmon configuration
  750. rmon groups
  751. configuring rmon
  752. displaying and maintaining rmon
  753. Table of Contents
  754. Table Of Contents
  755. mac address table configuration
  756. types of mac address table entries
  757. configuring mac address table
  758. configuring the aging timer for dynamic mac address entries
  759. mac address table configuration example
  760. mac information configuration
  761. enabling mac information on an interface
  762. Table of Contents
  763. Table Of Contents
  764. system maintaining and debugging
  765. introduction to system debugging
  766. system maintaining
  767. system maintaining example
  768. Table Of Contents
  769. information center configuration
  770. system information format
  771. configuring information center
  772. outputting system information to a monitor terminal
  773. outputting system information to a log host
  774. outputting system information to the trap buffer
  775. outputting system information to the log buffer
  776. outputting system information to the snmp module
  777. disabling a port from generating link up/down logging information
  778. displaying and maintaining information center
  779. outputting log information to a linux log host
  780. outputting log information to the console
  781. Table of Contents
  782. Table Of Contents
  783. poe configuration
  784. poe configuration task list
  785. configuring a poe interface through the command line
  786. configuring poe power management
  787. upgrading pse processing software online
  788. configuring a pd disconnection detection mode
  789. displaying and maintaining poe
  790. troubleshooting poe
  791. Table of Contents
  792. Table Of Contents
  793. hotfix configuration
  794. hotfix configuration task list
  795. one-step patch installation
  796. step-by-step patch installation
  797. activating patches
  798. step-by-step patch uninstallation
  799. displaying and maintaining hotfix
  800. Table of Contents
  801. Table Of Contents
  802. nqa configuration
  803. basic concepts of nqa
  804. nqa configuration task list
  805. configuring the nqa server
  806. configuring an nqa test group
  807. configuring a dhcp test
  808. configuring an ftp test
  809. configuring an http test
  810. configuring a udp jitter test
  811. configuring an snmp test
  812. configuring a tcp test
  813. configuring a udp echo test
  814. configuring a voice test
  815. configuring a dlsw test
  816. configuring the collaboration function
  817. configuring trap delivery
  818. configuring optional parameters common to an nqa test group
  819. scheduling an nqa test group
  820. displaying and maintaining nqa
  821. dhcp test configuration example
  822. ftp test configuration example
  823. http test configuration example
  824. udp jitter test configuration example
  825. snmp test configuration example
  826. tcp test configuration example
  827. udp echo test configuration example
  828. voice test configuration example
  829. dlsw test configuration example
  830. nqa collaboration configuration example
  831. Table of Contents
  832. Table Of Contents
  833. ntp configuration
  834. advantages of ntp
  835. ntp message format
  836. operation modes of ntp
  837. ntp configuration task list
  838. configuring the operation modes of ntp
  839. configuring the ntp symmetric peers mode
  840. configuring optional parameters of ntp
  841. disabling an interface from receiving ntp messages
  842. configuring access-control rights
  843. configuring ntp authentication
  844. displaying and maintaining ntp
  845. configuring the ntp symmetric mode
  846. configuring ntp broadcast mode
  847. configuring ntp client/server mode with authentication
  848. configuring ntp broadcast mode with authentication
  849. Table of Contents
  850. Table Of Contents
  851. cluster management configuration
  852. how a cluster works
  853. cluster configuration task list
  854. configuring the management device
  855. configuring ndp parameters
  856. manually collecting topology information
  857. enabling the cluster function
  858. enabling management vlan auto-negotiation
  859. cluster member management
  860. configuring the member devices
  861. adding a candidate device to a cluster
  862. configuring advanced cluster functions
  863. configuring interaction for a cluster
  864. snmp configuration synchronization function
  865. configuring web user accounts in batches
  866. displaying and maintaining cluster management
  867. Table of Contents
  868. Table Of Contents
  869. stack configuration
  870. establishing a stack
  871. configuring the master device of a stack
  872. configuring stack ports of a slave device
  873. displaying and maintaining stack configuration
  874. Table Of Contents
  875. automatic configuration
  876. how automatic configuration works
  877. obtaining an ip address
  878. obtaining the configuration file from the tftp server
  879. executing the configuration file
Related products
Switch 4800G 24-PortSwitch 4800G PWR 48-PortSwitch 4800G 48-PortSwitch 4500 PWR 26-PortSwitch 4500 PWR 50-PortSwitch 4500 26-PortBASELINE SWITCH 2026SuperStackII Switch 9300SuperStackII Switch 39003CBLUG16A - Baseline Switch 2816
3Com categories
More 3Com categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine