3Com WX3008 manuals
WX3008
Table of contents
- switching engine
- About This Manual
- Table Of Contents
- Login
- Table Of Contents
- cli configuration
- switching user levels
- setting the level of a command in a specific view
- cli views
- cli features
- command history
- error prompts
- Table of Contents
- Table Of Contents
- Table Of Contents
- introduction to the user interface
- user interface index
- logging in through oap
- configuring the management ip address of the oap software system on the switching engine
- resetting the oap software system
- logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- configuration example
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to the switching engine
- telnetting to the switching engine from the access control engine
- setting up a web configuration environment
- configuring the login banner
- enabling/disabling the web server
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- user control
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip address
- controlling web users by source ip addresses
- configuration procedure
- Table of Contents
- Configuration File Management
- configuration file management
- management of configuration file
- erasing the startup configuration file
- specifying a configuration file for next startup
- VLAN
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- vlan interface
- protocol-based vlan
- procedure for the switch to judge packet protocol
- vlan configuration
- basic vlan interface configuration
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying and maintaining protocol-based vlan
- Table of Contents
- Auto Detect
- introduction to the auto detect function
- auto detect basic configuration
- auto detect implementation in static routing
- auto detect configuration examples
- configuration example for auto detect implementation in vlan interface backup
- Table of Contents
- Voice VLAN
- voice vlan configuration
- how the device identifies voice traffic
- support for voice vlan on various ports
- security mode of voice vlan
- configuring a voice vlan to operate in manual mode
- displaying and maintaining voice vlan
- voice vlan configuration example (manual mode)
- Table of Contents
- GVRP
- gvrp configuration
- protocol specifications
- configuring gvrp timers
- displaying and maintaining gvrp
- gvrp configuration example
- Table of Contents
- Basic Port Configuration
- basic port configuration
- link types of ethernet ports
- configuring ethernet ports
- configuring port auto-negotiation speed
- setting the ethernet port broadcast suppression ratio
- configuring access port attribute
- disabling up/down log output on a port
- configuring a port group
- setting loopback detection for an ethernet port
- Link Aggregation
- enabling the system to test connected cable
- ethernet port configuration example
- troubleshooting ethernet port configuration
- Table of Contents
- Table Of Contents
- link aggregation configuration
- operation key
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation
- link aggregation
- Port Isolation
- port isolation configuration
- port isolation configuration example
- Table of Contents
- Table Of Contents
- port security configuration
- port security modes
- enabling port security
- setting the maximum number of mac addresses allowed on a port
- configuring port security features
- ignoring the authorization information from the radius server
- port security configuration example
- port binding overview
- port binding configuration example
- Table of Contents
- DLDP
- dldp configuration
- dldp fundamentals
- precautions during dldp configuration
- resetting dldp status
- dldp network example
- Table of Contents
- MAC Address Table Management
- mac address table management
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the aging time of mac address entries
- disabling mac address learning for a vlan
- displaying and maintaining mac address table
- Table of Contents
- MSTP
- Table Of Contents
- mstp configuration
- mstp overview
- basic mstp terminologies
- principle of mstp
- mstp implementation on the device
- configuring root bridge
- configuring an mst region
- specifying the current device as a root bridge/secondary root bridge
- configuring the bridge priority of the current device
- configuring the mode a port recognizes and sends mstp packets
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the mstp time-related parameters
- configuring the timeout time factor
- configuring the maximum transmitting speed on the current port
- configuring the current port as an edge port
- specifying whether the link connected to a port is point-to-point link
- enabling mstp
- configuring leaf nodes
- configuring the path cost for a port
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring bpdu guard
- configuring loop guard
- configuring digest snooping
- configuring rapid transition
- stp maintenance configuration
- displaying and maintaining mstp
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- x configuration
- the mechanism of an 802.1x authentication system
- x authentication procedure
- timers used in 802.1x
- additional 802.1x features implemented
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring client version checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x
- quick ead deployment configuration
- displaying and maintaining quick ead deployment
- troubleshooting
- system-guard configuration
- displaying and maintaining system-guard
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- MAC Address Authentication
- creating a radius scheme
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius authentication server function
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- creating a hwtacacs scheme
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- displaying and maintaining aaa
- aaa configuration examples
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- ead configuration
- ead configuration example
- Table of Contents
- Table Of Contents
- mac authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- displaying and maintaining mac authentication
- Table of Contents
- Table Of Contents
- ip addressing overview
- special case ip addresses
- DHCP
- displaying and maintaining ip addressing
- ip address configuration example ii
- ip performance configuration
- disabling sending of icmp error packets
- displaying and maintaining ip performance configuration
- Table of Contents
- Table Of Contents
- dhcp overview
- obtaining ip addresses dynamically
- dhcp packet format
- protocols and standards
- dhcp relay agent configuration
- dhcp relay agent support for option
- configuring the dhcp relay agent
- configuring dhcp relay agent security functions
- configuring the dhcp relay agent to support option
- displaying and maintaining dhcp relay agent configuration
- troubleshooting dhcp relay agent configuration
- dhcp snooping configuration
- overview of dhcp snooping option
- overview of ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- dhcp snooping configuration example
- ip filtering configuration example
- displaying and maintaining dhcp snooping configuration
- introduction to dhcp client
- dhcp client configuration example
- displaying and maintaining dhcp/bootp client configuration
- Table of Contents
- Table Of Contents
- acl configuration
- ways to apply an acl on a device
- configuring time range
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl globally
- assigning an acl to a port group
- assigning an acl to a port
- examples for upper-layer software referencing acls
- basic acl configuration example
- layer 2 acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos configuration
- major traffic control techniques
- priority trust mode
- priority marking
- vlan mapping
- flow-based traffic accounting
- configuring priority trust mode
- configuring priority mapping
- setting the priority of protocol packets
- marking packet priority
- configuring traffic policing
- configuring traffic shaping
- configuring traffic redirecting
- configuring vlan mapping
- collecting/clearing traffic statistics
- configuring traffic mirroring
- displaying and maintaining qos
- qos configuration example
- qos profile configuration
- qos profile configuration task list
- displaying and maintaining qos profile
- qos profile configuration example
- Table of Contents
- Table Of Contents
- mirroring configuration
- local port mirroring
- mac-based mirroring
- configuring local port mirroring
- configuring remote port mirroring
- configuring mac-based mirroring
- configuring vlan-based mirroring
- mirroring configuration example
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- arp configuration
- arp table
- introduction to arp attack detection
- configuring arp
- configuring arp attack detection
- configuring gratuitous arp
- displaying and maintaining arp
- Table of Contents
- Table Of Contents
- snmp configuration
- supported mibs
- configuring basic snmp functions
- configuring trap parameters
- configuring extended trap
- enabling logging for network management
- rmon configuration
- commonly used rmon groups
- displaying and maintaining rmon
- Table of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- information transmission in the multicast mode
- roles in multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- rpf check
- igmp snooping configuration
- work mechanism of igmp snooping
- igmp snooping configuration task list
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- configuring a port as a simulated group member
- QoS-QoS Profile
- displaying and maintaining igmp snooping
- configuring multicast vlan
- troubleshooting igmp snooping
- common multicast configuration
- configuring dropping unknown multicast packets
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring the ntp symmetric peer mode
- configuring access control right
- configuring optional ntp parameters
- ntp configuration examples
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- asymmetric key algorithm
- configuring the ssh server
- ssh server configuration tasks
- generating/destroying a rsa or dsa key pair
- exporting the rsa or dsa public key
- specifying a service type for an ssh user
- configuring the client public key on the server
- assigning a public key to an ssh user
- configuring the ssh client
- configuring the ssh client on an ssh2-capable device
- specifying a source ip address/interface for the ssh client
- ssh configuration examples
- when the device acts as an ssh server and the authentication type is publickey
- when the switch acts as an ssh client and the authentication type is password
- when the device acts as an ssh client and the authentication type is publickey
- when the device acts as an ssh client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system configuration
- file operations
- flash memory operations
- file system configuration example
- file attribute configuration
- configuring file attributes
- Table of Contents
- Table Of Contents
- introduction to ftp and sftp
- ftp configuration
- configuration example: the device operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: the device operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: the device operating as a tftp client
- tftp configuration example
- Table of Contents
- Table Of Contents
- information center
- system information format
- information center configuration
- configuring synchronous information output
- setting to output system information to the console
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the snmp nms
- displaying and maintaining information center
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- introduction to loading approaches
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- device management
- scheduling a reboot on the device
- identifying and diagnosing pluggable transceivers
- displaying and maintaining the device management configuration
- Table of Contents
- Table Of Contents
- implementation of vlan-vpn
- enabling the vlan-vpn feature for a port
- tpid adjusting configuration
- vlan-vpn configuration example
- selective qinq configuration
- inner-to-outer tag priority mapping
- selective qinq configuration example
- Table of Contents
- Table Of Contents
- hwping configuration
- test types supported by hwping
- configuration on a hwping server
- hwping client configuration
- displaying and maintaining hwping
- dhcp test
- ftp test
- http test
- jitter test
- network diagram
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- dns configuration
- configuring domain name resolution
- dns configuration example
- dynamic domain name resolution configuration example
- displaying and maintaining dns
- Table of Contents
- Table Of Contents
- smart link overview
- configuring smart link
- configuring a smart link device
- Mirroring
- smart link configuration example
- introduction to monitor link
- how monitor link works
- configuring monitor link
- configuring a downlink port
- monitor link configuration example
- Table of Contents
- Table Of Contents
- poe configuration
- poe features supported by the device
- enabling the poe feature on a port
- setting poe management mode and poe priority of a port
- configuring the pd compatibility detection function
- poe configuration example
- poe profile configuration
- displaying and maintaining poe profile configuration
- poe profile configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- ip routing protocol overview
- routing protocol overview
- load sharing and route backup
- displaying and maintaining a routing table
- static route configuration
- default route
- displaying and maintaining static routes
- troubleshooting a static route
- rip configuration
- rip startup and operation
- rip configuration task list
- rip route control
- configuring rip route control
- rip network adjustment and optimization
- configuration tasks
- displaying and maintaining rip configuration
- troubleshooting rip configuration
- ip route policy configuration
- ip route policy configuration task list
- defining a route policy
- displaying and maintaining ip route policy
- troubleshooting ip route policy
- Table Of Contents
- udp helper configuration
- configuring udp helper
- displaying and maintaining udp helper
WX3008
Table of contents
- about this manual
- related documentation
- Table Of Contents
- Table Of Contents
- Table Of Contents
- front panel
- rear panel
- system specifications
- power input system
- fixed interfaces
- transceiver modules
- dc power cables
- interface numbering
- preparing for installation
- esd prevention
- emi prevention
- installation tools
- installing the device
- introduction to mounting brackets
- introduction to slide rails
- installing the device using front and rear mounting brackets
- installing the device using front mounting brackets and a tray
- installing the device using front mounting brackets and slide rails
- wall mounting
- magnet mounting
- connecting the ground cable
- connecting the power cables
- connecting the rps cable
- connecting the interface cables
- connecting the ethernet cables
- installing and removing optional interface modules
- xenpak module
- installation verification
- starting and configuring the device
- powering on the device
- maintaining software
- application files
- web files
- software update flow
- bootware submenus
- updating software through a serial connection
- modifying serial communication parameters
- updating bootware through a serial connection
- updating applications through a serial connection
- updating applications using tftp
- updating and backing up an application using tftp through the cli
- updating applications using ftp
- updating an application using ftp through the bootware menu
- ping command
- updating web files on the switching engine
- maintaining the application and configuration files
- deleting a file
- dealing with password loss
- super password loss
- backing up and restoring bootware
- troubleshooting
- network interfaces
- register your product
Related products
WX3024WX3010WX3008 AC POE 8GETWX3000 SeriesWX3010 AC POE 8GET 2SFPWX3024,4SFPCOMBO SLOT POEPLUSDX Series DX2008WXR100 3CRWXR10095AWX2200 3CRWX220095AOfficeConnect WXR1003Com categories
Switch
Network Router
Network Hardware
Wireless Access Point
Network Card
Modem
Computer Hardware
Software
Telephone
Gateway
manualsdatabase
Your AI-powered manual search engine