3Com WX3000 Series manuals
WX3000 Series
Table of contents
- switching engine
- About This Manual
- Table Of Contents
- Login
- Table Of Contents
- cli configuration
- switching user levels
- setting the level of a command in a specific view
- cli views
- cli features
- command history
- error prompts
- Table of Contents
- Table Of Contents
- Table Of Contents
- introduction to the user interface
- user interface index
- logging in through oap
- configuring the management ip address of the oap software system on the switching engine
- resetting the oap software system
- logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- configuration example
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to the switching engine
- telnetting to the switching engine from the access control engine
- setting up a web configuration environment
- configuring the login banner
- enabling/disabling the web server
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- user control
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip address
- controlling web users by source ip addresses
- configuration procedure
- Table of Contents
- Configuration File Management
- configuration file management
- management of configuration file
- erasing the startup configuration file
- specifying a configuration file for next startup
- VLAN
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- vlan interface
- protocol-based vlan
- procedure for the switch to judge packet protocol
- vlan configuration
- basic vlan interface configuration
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying and maintaining protocol-based vlan
- Table of Contents
- Auto Detect
- introduction to the auto detect function
- auto detect basic configuration
- auto detect implementation in static routing
- auto detect configuration examples
- configuration example for auto detect implementation in vlan interface backup
- Table of Contents
- Voice VLAN
- voice vlan configuration
- how the device identifies voice traffic
- support for voice vlan on various ports
- security mode of voice vlan
- configuring a voice vlan to operate in manual mode
- displaying and maintaining voice vlan
- voice vlan configuration example (manual mode)
- Table of Contents
- GVRP
- gvrp configuration
- protocol specifications
- configuring gvrp timers
- displaying and maintaining gvrp
- gvrp configuration example
- Table of Contents
- Basic Port Configuration
- basic port configuration
- link types of ethernet ports
- configuring ethernet ports
- configuring port auto-negotiation speed
- setting the ethernet port broadcast suppression ratio
- configuring access port attribute
- disabling up/down log output on a port
- configuring a port group
- setting loopback detection for an ethernet port
- Link Aggregation
- enabling the system to test connected cable
- ethernet port configuration example
- troubleshooting ethernet port configuration
- Table of Contents
- Table Of Contents
- link aggregation configuration
- operation key
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation
- link aggregation
- Port Isolation
- port isolation configuration
- port isolation configuration example
- Table of Contents
- Table Of Contents
- port security configuration
- port security modes
- enabling port security
- setting the maximum number of mac addresses allowed on a port
- configuring port security features
- ignoring the authorization information from the radius server
- port security configuration example
- port binding overview
- port binding configuration example
- Table of Contents
- DLDP
- dldp configuration
- dldp fundamentals
- precautions during dldp configuration
- resetting dldp status
- dldp network example
- Table of Contents
- MAC Address Table Management
- mac address table management
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the aging time of mac address entries
- disabling mac address learning for a vlan
- displaying and maintaining mac address table
- Table of Contents
- MSTP
- Table Of Contents
- mstp configuration
- mstp overview
- basic mstp terminologies
- principle of mstp
- mstp implementation on the device
- configuring root bridge
- configuring an mst region
- specifying the current device as a root bridge/secondary root bridge
- configuring the bridge priority of the current device
- configuring the mode a port recognizes and sends mstp packets
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the mstp time-related parameters
- configuring the timeout time factor
- configuring the maximum transmitting speed on the current port
- configuring the current port as an edge port
- specifying whether the link connected to a port is point-to-point link
- enabling mstp
- configuring leaf nodes
- configuring the path cost for a port
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring bpdu guard
- configuring loop guard
- configuring digest snooping
- configuring rapid transition
- stp maintenance configuration
- displaying and maintaining mstp
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- x configuration
- the mechanism of an 802.1x authentication system
- x authentication procedure
- timers used in 802.1x
- additional 802.1x features implemented
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring client version checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x
- quick ead deployment configuration
- displaying and maintaining quick ead deployment
- troubleshooting
- system-guard configuration
- displaying and maintaining system-guard
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- MAC Address Authentication
- creating a radius scheme
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius authentication server function
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- creating a hwtacacs scheme
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- displaying and maintaining aaa
- aaa configuration examples
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- ead configuration
- ead configuration example
- Table of Contents
- Table Of Contents
- mac authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- displaying and maintaining mac authentication
- Table of Contents
- Table Of Contents
- ip addressing overview
- special case ip addresses
- DHCP
- displaying and maintaining ip addressing
- ip address configuration example ii
- ip performance configuration
- disabling sending of icmp error packets
- displaying and maintaining ip performance configuration
- Table of Contents
- Table Of Contents
- dhcp overview
- obtaining ip addresses dynamically
- dhcp packet format
- protocols and standards
- dhcp relay agent configuration
- dhcp relay agent support for option
- configuring the dhcp relay agent
- configuring dhcp relay agent security functions
- configuring the dhcp relay agent to support option
- displaying and maintaining dhcp relay agent configuration
- troubleshooting dhcp relay agent configuration
- dhcp snooping configuration
- overview of dhcp snooping option
- overview of ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- dhcp snooping configuration example
- ip filtering configuration example
- displaying and maintaining dhcp snooping configuration
- introduction to dhcp client
- dhcp client configuration example
- displaying and maintaining dhcp/bootp client configuration
- Table of Contents
- Table Of Contents
- acl configuration
- ways to apply an acl on a device
- configuring time range
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl globally
- assigning an acl to a port group
- assigning an acl to a port
- examples for upper-layer software referencing acls
- basic acl configuration example
- layer 2 acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos configuration
- major traffic control techniques
- priority trust mode
- priority marking
- vlan mapping
- flow-based traffic accounting
- configuring priority trust mode
- configuring priority mapping
- setting the priority of protocol packets
- marking packet priority
- configuring traffic policing
- configuring traffic shaping
- configuring traffic redirecting
- configuring vlan mapping
- collecting/clearing traffic statistics
- configuring traffic mirroring
- displaying and maintaining qos
- qos configuration example
- qos profile configuration
- qos profile configuration task list
- displaying and maintaining qos profile
- qos profile configuration example
- Table of Contents
- Table Of Contents
- mirroring configuration
- local port mirroring
- mac-based mirroring
- configuring local port mirroring
- configuring remote port mirroring
- configuring mac-based mirroring
- configuring vlan-based mirroring
- mirroring configuration example
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- arp configuration
- arp table
- introduction to arp attack detection
- configuring arp
- configuring arp attack detection
- configuring gratuitous arp
- displaying and maintaining arp
- Table of Contents
- Table Of Contents
- snmp configuration
- supported mibs
- configuring basic snmp functions
- configuring trap parameters
- configuring extended trap
- enabling logging for network management
- rmon configuration
- commonly used rmon groups
- displaying and maintaining rmon
- Table of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- information transmission in the multicast mode
- roles in multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- rpf check
- igmp snooping configuration
- work mechanism of igmp snooping
- igmp snooping configuration task list
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- configuring a port as a simulated group member
- QoS-QoS Profile
- displaying and maintaining igmp snooping
- configuring multicast vlan
- troubleshooting igmp snooping
- common multicast configuration
- configuring dropping unknown multicast packets
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring the ntp symmetric peer mode
- configuring access control right
- configuring optional ntp parameters
- ntp configuration examples
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- asymmetric key algorithm
- configuring the ssh server
- ssh server configuration tasks
- generating/destroying a rsa or dsa key pair
- exporting the rsa or dsa public key
- specifying a service type for an ssh user
- configuring the client public key on the server
- assigning a public key to an ssh user
- configuring the ssh client
- configuring the ssh client on an ssh2-capable device
- specifying a source ip address/interface for the ssh client
- ssh configuration examples
- when the device acts as an ssh server and the authentication type is publickey
- when the switch acts as an ssh client and the authentication type is password
- when the device acts as an ssh client and the authentication type is publickey
- when the device acts as an ssh client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system configuration
- file operations
- flash memory operations
- file system configuration example
- file attribute configuration
- configuring file attributes
- Table of Contents
- Table Of Contents
- introduction to ftp and sftp
- ftp configuration
- configuration example: the device operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: the device operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: the device operating as a tftp client
- tftp configuration example
- Table of Contents
- Table Of Contents
- information center
- system information format
- information center configuration
- configuring synchronous information output
- setting to output system information to the console
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the snmp nms
- displaying and maintaining information center
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- introduction to loading approaches
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- device management
- scheduling a reboot on the device
- identifying and diagnosing pluggable transceivers
- displaying and maintaining the device management configuration
- Table of Contents
- Table Of Contents
- implementation of vlan-vpn
- enabling the vlan-vpn feature for a port
- tpid adjusting configuration
- vlan-vpn configuration example
- selective qinq configuration
- inner-to-outer tag priority mapping
- selective qinq configuration example
- Table of Contents
- Table Of Contents
- hwping configuration
- test types supported by hwping
- configuration on a hwping server
- hwping client configuration
- displaying and maintaining hwping
- dhcp test
- ftp test
- http test
- jitter test
- network diagram
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- dns configuration
- configuring domain name resolution
- dns configuration example
- dynamic domain name resolution configuration example
- displaying and maintaining dns
- Table of Contents
- Table Of Contents
- smart link overview
- configuring smart link
- configuring a smart link device
- Mirroring
- smart link configuration example
- introduction to monitor link
- how monitor link works
- configuring monitor link
- configuring a downlink port
- monitor link configuration example
- Table of Contents
- Table Of Contents
- poe configuration
- poe features supported by the device
- enabling the poe feature on a port
- setting poe management mode and poe priority of a port
- configuring the pd compatibility detection function
- poe configuration example
- poe profile configuration
- displaying and maintaining poe profile configuration
- poe profile configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- ip routing protocol overview
- routing protocol overview
- load sharing and route backup
- displaying and maintaining a routing table
- static route configuration
- default route
- displaying and maintaining static routes
- troubleshooting a static route
- rip configuration
- rip startup and operation
- rip configuration task list
- rip route control
- configuring rip route control
- rip network adjustment and optimization
- configuration tasks
- displaying and maintaining rip configuration
- troubleshooting rip configuration
- ip route policy configuration
- ip route policy configuration task list
- defining a route policy
- displaying and maintaining ip route policy
- troubleshooting ip route policy
- Table Of Contents
- udp helper configuration
- configuring udp helper
- displaying and maintaining udp helper
Related products
5500 Series8800 SERIES2800 Series5500G 1000 Series5500-EI SeriesAS Series ASM400AS Series ASM200AX Series AXM80040x0 Series7750 Series3Com categories
Switch
Network Router
Network Hardware
Wireless Access Point
Network Card
Modem
Computer Hardware
Software
Telephone
Gateway
manualsdatabase
Your AI-powered manual search engine