OneStart

H3C S3100-SI Series manuals

S3100-SI Series first page preview

S3100-SI Series

Brand: H3C | Category: Switch
Table of contents
  1. about this manual
  2. Table Of Contents
  3. Table Of Contents
  4. Software Release Notes
  5. Chapter 2 Correspondence Between Documentation and Software
  6. software features
  7. Chapter 4 Network Design
  8. Multi-Service Carrier VLAN Solution
  9. Table Of Contents
  10. introduction to the cli
  11. modifying the command level
  12. switching user level
  13. cli views
  14. cli features
  15. command history
  16. error prompts
  17. command edit
  18. Table of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. logging into an ethernet switch
  22. user interface index
  23. logging in through the console port
  24. console port login configuration
  25. console port login configurations for different authentication modes
  26. console port login configuration with authentication mode being none
  27. configuration example
  28. console port login configuration with authentication mode being password
  29. console port login configuration with authentication mode being scheme
  30. chapter 3 logging in through telnet
  31. telnet configurations for different authentication modes
  32. telnet configuration with authentication mode being none
  33. telnet configuration with authentication mode being password
  34. telnet configuration with authentication mode being scheme
  35. telnetting to a switch
  36. telnetting to another switch from the current switch
  37. configuration on the switch side
  38. switch configuration
  39. establishing an http connection
  40. configuring the login banner
  41. enabling/disabling the web server
  42. connection establishment using nms
  43. controlling telnet users
  44. controlling telnet users by source ip addresses
  45. controlling telnet users by source mac addresses
  46. controlling network management users by source ip addresses
  47. controlling web users by source ip address
  48. controlling web users by source ip addresses
  49. Table Of Contents
  50. introduction to configuration file
  51. management of configuration file
  52. erasing the startup configuration file
  53. displaying device configuration
  54. Table of Contents
  55. Table Of Contents
  56. vlan overview
  57. vlan fundamentals
  58. vlan interface
  59. vlan classification
  60. assigning an ethernet port to specified vlans
  61. protocol-based vlan
  62. encapsulation format of ethernet data
  63. encapsulation formats
  64. vlan configuration
  65. basic vlan interface configuration
  66. displaying vlan configuration
  67. configuring a hybrid-port-based vlan
  68. configuring a trunk-port-based vlan
  69. displaying and maintaining port-based vlan
  70. configuring a protocol-based vlan
  71. associating a port with a protocol-based vlan
  72. displaying protocol-based vlan configuration
  73. Table Of Contents
  74. management vlan
  75. default route
  76. displaying and maintaining management vlan configuration
  77. Table of Contents
  78. Table Of Contents
  79. ip addressing overview
  80. special case ip addresses
  81. configuring ip addresses
  82. displaying ip addressing configuration
  83. ip address configuration examples
  84. ip performance overview
  85. disabling icmp to send error packets
  86. displaying and maintaining ip performance configuration
  87. Table of Contents
  88. Table Of Contents
  89. voice vlan overview
  90. how s3100 series switches identify voice traffic
  91. setting the voice traffic transmission priority
  92. support for voice vlan on various ports
  93. voice vlan configuration
  94. configuring the voice vlan to operate in automatic voice vlan assignment mode
  95. configuring the voice vlan to operate in manual voice vlan assignment mode
  96. displaying and maintaining voice vlan
  97. voice vlan configuration example
  98. voice vlan configuration example (manual voice vlan assignment mode)
  99. Table Of Contents
  100. chapter 1 gvrp configuration
  101. protocol specifications
  102. configuring gvrp timers
  103. configuring gvrp port registration mode
  104. displaying and maintaining gvrp
  105. Table of Contents
  106. Table Of Contents
  107. ethernet port configuration
  108. limiting traffic on individual ports
  109. enabling flow control on a port
  110. configuring loopback detection for an ethernet port
  111. configuring loopback detection for ethernet port(s)
  112. configuring a port group
  113. enabling the system to test connected cable
  114. configuring the interval to perform statistical analysis on port traffic
  115. ethernet port configuration example
  116. troubleshooting ethernet port configuration
  117. Table of Contents
  118. Table Of Contents
  119. introduction to link aggregation
  120. link aggregation classification
  121. static lacp aggregation group
  122. dynamic lacp aggregation group
  123. aggregation group categories
  124. link aggregation configuration
  125. configuring a static lacp aggregation group
  126. configuring a dynamic lacp aggregation group
  127. configuring a description for an aggregation group
  128. displaying and maintaining link aggregation configuration
  129. link aggregation configuration example
  130. Table Of Contents
  131. port isolation overview
  132. displaying port isolation configuration
  133. Table Of Contents
  134. port security overview
  135. port security modes
  136. port security configuration task list
  137. setting the maximum number of mac addresses allowed on a port
  138. setting the port security mode
  139. configuring port security features
  140. ignoring the authorization information from the radius server
  141. displaying and maintaining port security configuration
  142. port security configuration example
  143. port binding overview
  144. displaying and maintaining port binding configuration
  145. Table Of Contents
  146. chapter 1 dldp configuration
  147. dldp fundamentals
  148. dldp status
  149. dldp timers
  150. dldp operating mode
  151. link auto-recovery mechanism
  152. dldp configuration
  153. resetting dldp state
  154. displaying and maintaining dldp
  155. Table Of Contents
  156. introduction to mac address table
  157. introduction to mac address learning
  158. managing mac address table
  159. configuring mac address table management
  160. configuring a mac address entry
  161. setting the mac address aging timer
  162. disabling mac address learning for a vlan
  163. assigning mac addresses for ethernet ports
  164. displaying mac address table information
  165. adding a static mac address entry manually
  166. Table of Contents
  167. Table Of Contents
  168. Table Of Contents
  169. stp overview
  170. mstp overview
  171. basic mstp terminologies
  172. principle of mstp
  173. mstp implementation on switches
  174. configuring root bridge
  175. configuring an mst region
  176. specifying the current switch as a root bridge/secondary root bridge
  177. configuring the bridge priority of the current switch
  178. configuring the mode a port recognizes and sends mstp packets
  179. configuring the maximum hop count of an mst region
  180. configuring the network diameter of the switched network
  181. configuring the mstp time-related parameters
  182. configuring the timeout time factor
  183. configuring the maximum transmitting speed on the current port
  184. configuring the current port as an edge port
  185. specifying whether the link connected to a port is point-to-point link
  186. enabling mstp
  187. configuring leaf nodes
  188. configuring the mst region
  189. configuring port priority
  190. specifying whether the link connected to a port is a point-to-point link
  191. performing mcheck operation
  192. configuring guard functions
  193. configuring bpdu guard
  194. configuring root guard
  195. configuring loop guard
  196. configuring digest snooping
  197. configuring rapid transition
  198. configuring vlan-vpn tunnel
  199. stp maintenance configuration
  200. displaying and maintaining mstp
  201. mstp configuration example
  202. vlan-vpn tunnel configuration example
  203. Table of Contents
  204. Table Of Contents
  205. Table Of Contents
  206. multicast overview
  207. information transmission in the broadcast mode
  208. information transmission in the multicast mode
  209. roles in multicast
  210. multicast models
  211. multicast architecture
  212. multicast protocols
  213. multicast packet forwarding mechanism
  214. rpf check
  215. igmp snooping overview
  216. basic concepts in igmp snooping
  217. work mechanism of igmp snooping
  218. igmp snooping configuration
  219. configuring the version of igmp snooping
  220. configuring timers
  221. configuring a multicast group filter
  222. configuring the maximum number of multicast groups on a port
  223. configuring igmp snooping querier
  224. configuring static member port for a multicast group
  225. configuring a static router port
  226. configuring a vlan tag for query messages
  227. displaying and maintaining igmp snooping
  228. igmp snooping configuration examples
  229. configuring multicast vlan
  230. troubleshooting igmp snooping
  231. common multicast configuration
  232. configuring a multicast mac address entry
  233. configuring dropping unknown multicast packets
  234. Table of Contents
  235. Table Of Contents
  236. Table Of Contents
  237. chapter 1 802.1x configuration
  238. the mechanism of an 802.1x authentication system
  239. x authentication procedure
  240. timers used in 802.1x
  241. x implementation on an s3100 series switch
  242. introduction to 802.1x configuration
  243. basic 802.1x configuration
  244. timer and maximum user number configuration
  245. advanced 802.1x configuration
  246. configuring client version checking
  247. enabling dhcp-triggered authentication
  248. configuring 802.1x re-authentication
  249. displaying and debugging 802.1x
  250. x configuration example
  251. chapter 2 quick ead deployment configuration
  252. configuring quick ead deployment
  253. displaying and maintaining quick ead deployment
  254. troubleshooting
  255. introduction to habp
  256. habp client configuration
  257. displaying and maintaining system-guard
  258. system-guard configuration
  259. configuring system-guard-related parameters
  260. displaying and maintaining the system-guard function
  261. Table of Contents
  262. Table Of Contents
  263. Table Of Contents
  264. introduction to aaa
  265. introduction to aaa services
  266. introduction to hwtacacs
  267. aaa configuration task list
  268. creating an isp domain and configuring its attributes
  269. configuring an aaa scheme for an isp domain
  270. configuring dynamic vlan assignment
  271. configuring the attributes of a local user
  272. cutting down user connections forcibly
  273. radius configuration task list
  274. creating a radius scheme
  275. configuring radius accounting servers
  276. configuring shared keys for radius messages
  277. configuring the maximum number of radius request transmission attempts
  278. configuring the type of radius servers to be supported
  279. configuring the attributes of data to be sent to radius servers
  280. configuring the local radius authentication server function
  281. configuring timers for radius servers
  282. enabling sending trap message when a radius server goes down
  283. hwtacacs configuration task list
  284. configuring tacacs authentication servers
  285. configuring tacacs accounting servers
  286. configuring shared keys for hwtacacs messages
  287. configuring the attributes of data to be sent to tacacs servers
  288. displaying and maintaining aaa
  289. aaa configuration examples
  290. local authentication of ftp/telnet users
  291. hwtacacs authentication and authorization of telnet users
  292. troubleshooting aaa
  293. troubleshooting hwtacacs configuration
  294. introduction to ead
  295. ead configuration
  296. ead configuration example
  297. Table of Contents
  298. Table Of Contents
  299. mac authentication overview
  300. related concepts
  301. configuring basic mac authentication functions
  302. mac address authentication enhanced function configuration
  303. configuring a guest vlan
  304. configuring the maximum number of mac address authentication users allowed to access a port
  305. displaying and debugging mac authentication
  306. mac authentication configuration example
  307. Table of Contents
  308. Table Of Contents
  309. chapter 1 arp configuration
  310. arp table
  311. arp process
  312. introduction to arp attack detection
  313. introduction to arp packet rate limit
  314. introduction to gratuitous arp
  315. configuring arp source mac address consistency check
  316. configuring the arp packet rate limit function
  317. displaying and debugging arp
  318. arp configuration example
  319. arp attack detection and packet rate limit configuration example
  320. Table of Contents
  321. Table Of Contents
  322. introduction to dhcp
  323. obtaining ip addresses dynamically
  324. dhcp packet format
  325. protocol specification
  326. introduction to dhcp snooping
  327. introduction to dhcp snooping trusted/untrusted ports
  328. overview of dhcp-snooping option
  329. overview of ip filtering
  330. dhcp snooping configuration
  331. configuring unauthorized dhcp server detection
  332. configuring dhcp snooping to support option
  333. configuring ip filtering
  334. displaying dhcp snooping configuration
  335. dhcp snooping configuration example
  336. unauthorized dhcp server detection configuration example
  337. ip filtering configuration example
  338. chapter 3 dhcp packet rate limit configuration
  339. configuring dhcp packet rate limit
  340. rate limit configuration example
  341. introduction to dhcp client
  342. dhcp client configuration example
  343. Table of Contents
  344. Table Of Contents
  345. acl overview
  346. ways to apply an acl on a switch
  347. types of acls supported by s3100 series ethernet switches
  348. acl configuration
  349. configuring basic acl
  350. configuring advanced acl
  351. configuring layer 2 acl
  352. acl assignment
  353. assigning an acl to a vlan
  354. assigning an acl to a port group
  355. displaying acl configuration
  356. example for upper-layer software referencing acls
  357. basic acl configuration example
  358. advanced acl configuration example
  359. layer 2 acl configuration example
  360. example for applying an acl to a port group
  361. Table of Contents
  362. Table Of Contents
  363. Table Of Contents
  364. introduction to qos
  365. major traffic control techniques
  366. qos supported by the s3100 series ethernet switches
  367. traffic classification
  368. priority trust mode
  369. priority marking
  370. port rate limiting
  371. queue scheduling
  372. flow-based traffic accounting
  373. traffic mirroring
  374. configuring priority mapping
  375. marking packet priority
  376. configuring traffic policing
  377. configuring traffic shaping
  378. configuring traffic redirecting
  379. configuring queue scheduling
  380. configuring traffic accounting
  381. enabling the burst function
  382. configuring traffic mirroring
  383. displaying qos
  384. qos configuration example
  385. chapter 2 qos profile configuration
  386. qos profile configuration
  387. applying a qos profile
  388. displaying qos profile configuration
  389. qos profile configuration example
  390. Table Of Contents
  391. mirroring overview
  392. remote port mirroring
  393. mirroring configuration
  394. configuring remote port mirroring
  395. displaying port mirroring
  396. mirroring configuration example
  397. remote port mirroring configuration example
  398. Table of Contents
  399. Table Of Contents
  400. creating a stack
  401. main switch configuration
  402. maintaining slave switches
  403. slave switch configuration
  404. stack configuration example
  405. cluster overview
  406. roles in a cluster
  407. how a cluster works
  408. cluster configuration tasks
  409. configuring member devices
  410. managing a cluster through the management device
  411. configuring the enhanced cluster features
  412. displaying and maintaining cluster configuration
  413. cluster configuration example
  414. enhanced cluster feature configuration example
  415. Table of Contents
  416. Table Of Contents
  417. poe overview
  418. poe configuration
  419. setting the maximum output power on a port
  420. setting the poe mode on a port
  421. configuring the pd compatibility detection function
  422. displaying poe configuration
  423. poe configuration example
  424. introduction to poe profile
  425. displaying poe profile configuration
  426. poe profile configuration example
  427. Table of Contents
  428. Table Of Contents
  429. snmp overview
  430. supported mibs
  431. configuring basic snmp functions
  432. configuring trap parameters
  433. configuring extended trap
  434. enabling logging for network management
  435. snmp configuration examples
  436. introduction to rmon
  437. commonly used rmon groups
  438. rmon configuration
  439. displaying rmon
  440. rmon configuration examples
  441. Table of Contents
  442. Table Of Contents
  443. introduction to ntp
  444. implementation principle of ntp
  445. ntp implementation modes
  446. ntp configuration tasks
  447. configuring ntp implementation modes
  448. configuring the ntp symmetric peer mode
  449. configuring access control right
  450. configuring ntp authentication
  451. configuration prerequisites
  452. configuration procedure
  453. configuring optional ntp parameters
  454. configuring an interface on the local switch to send ntp messages
  455. displaying ntp configuration
  456. configuring ntp symmetric peer mode
  457. configuring ntp broadcast mode
  458. configuring ntp multicast mode
  459. configuring ntp server/client mode with authentication
  460. Table of Contents
  461. Table Of Contents
  462. ssh overview
  463. asymmetric key algorithm
  464. configuring the ssh server
  465. configuring the user interfaces for ssh clients
  466. configuring the ssh server to be compatible with ssh1 clients
  467. generating/destroying key pairs
  468. creating an ssh user and specifying an authentication type
  469. specifying a service type for an ssh user
  470. configuring the public key of a client on the server
  471. assigning a public key to an ssh user
  472. configuring the ssh client
  473. configuring an ssh client that runs ssh client software
  474. configuring an ssh client assumed by an ssh2-capable switch
  475. displaying and maintaining ssh configuration
  476. ssh configuration examples
  477. when switch acts as server for password and radius authentication
  478. when switch acts as server for password and hwtacacs authentication
  479. when switch acts as server for publickey authentication
  480. when switch acts as client for password authentication
  481. when switch acts as client for publickey authentication
  482. when switch acts as client and first-time authentication is not supported
  483. Table Of Contents
  484. file system configuration
  485. file operations
  486. flash memory operations
  487. prompt mode configuration
  488. file attribute configuration
  489. booting with the startup file
  490. configuring file attributes
  491. Table of Contents
  492. Table Of Contents
  493. introduction to ftp and sftp
  494. ftp configuration
  495. configuration example: a switch operating as an ftp server
  496. ftp banner display configuration example
  497. sftp configuration
  498. sftp configuration: a switch operating as an sftp client
  499. sftp configuration example
  500. introduction to tftp
  501. tftp configuration
  502. Table of Contents
  503. Table Of Contents
  504. information center overview
  505. system information format
  506. information center configuration
  507. configuring to display the time stamp with the utc time zone
  508. setting to output system information to the console
  509. setting to output system information to a monitor terminal
  510. setting to output system information to a log host
  511. setting to output system information to the trap buffer
  512. setting to output system information to the snmp nms
  513. displaying and maintaining information center
  514. log output to a linux log host
  515. log output to the console
  516. Table of Contents
  517. Table Of Contents
  518. introduction to loading approaches
  519. boot menu
  520. loading by xmodem through console port
  521. loading by tftp through ethernet port
  522. loading by ftp through ethernet port
  523. remote boot rom and software loading
  524. remote loading using tftp
  525. basic system configuration
  526. displaying the system status
  527. displaying debugging status
  528. network connectivity test
  529. introduction to device management
  530. scheduling a reboot on the switch
  531. specifying the app to be used at reboot
  532. displaying the device management configuration
  533. remote switch app upgrade configuration example
  534. Table of Contents
  535. Table Of Contents
  536. Table Of Contents
  537. chapter 1 vlan-vpn configuration
  538. implementation of vlan-vpn
  539. vlan-vpn configuration
  540. configuring the tpid value for vlan-vpn packets
  541. displaying and maintaining vlan-vpn configuration
  542. selective qinq overview
  543. selective qinq configuration
  544. configuring global tag mapping rules for selective qinq
  545. selective qinq configuration example
  546. vlan mapping overview
  547. configuring vlan mapping
  548. enabling the vlan mapping function based on a port-level vlan mapping rule
  549. vlan mapping configuration example
  550. bpdu tunnel overview
  551. bpdu tunnel configuration
  552. configuring a bpdu tunnel
  553. bpdu tunnel configuration example
  554. Table of Contents
  555. Table Of Contents
  556. chapter 1 hwping configuration
  557. test types supported by hwping
  558. hwping configuration
  559. hwping client configuration
  560. displaying hwping configuration
  561. dhcp test
  562. ftp test
  563. http test
  564. jitter test
  565. snmp test
  566. tcp test (tcpprivate test) on the specified ports
  567. udp test (udpprivate test) on the specified ports
  568. dns test
  569. Table of Contents
  570. Table Of Contents
  571. ipv6 overview
  572. introduction to ipv6 address
  573. introduction to ipv6 neighbor discovery protocol
  574. introduction to ipv6 dns
  575. protocols and standards
  576. configuring ipv6 ndp
  577. configuring a static ipv6 route
  578. configuring the hop limit of icmpv6 reply packets
  579. configuring ipv6 dns
  580. displaying and maintaining ipv
  581. ipv6 configuration example
  582. introduction to ipv6 application
  583. ipv6 traceroute
  584. ipv6 telnet
  585. ipv6 application configuration example
  586. troubleshooting ipv6 application
  587. unable to run traceroute
  588. Table Of Contents
  589. dns overview
  590. configuring domain name resolution
  591. displaying and maintaining dns
  592. dynamic domain name resolution configuration example
  593. troubleshooting dns
  594. Table of Contents
  595. Table Of Contents
  596. smart link overview
  597. operating mechanism of smart link
  598. configuring smart link
  599. configuring associated devices
  600. displaying and debugging smart link
  601. introduction to monitor link
  602. how monitor link works
  603. configuring monitor link
  604. configuring the uplink port
  605. displaying monitor link configuration
  606. monitor link configuration example
S3100-SI Series first page preview

S3100-SI Series

Brand: H3C | Category: Switch