OneStart

3Com Switch 4210 52-Port manuals

Switch 4210 52-Port first page preview

Switch 4210 52-Port

Brand: 3Com | Category: Switch
Table of contents
Switch 4210 52-Port first page preview

Switch 4210 52-Port

Brand: 3Com | Category: Switch
Switch 4210 52-Port first page preview

Switch 4210 52-Port

Brand: 3Com | Category: Network Hardware
Table of contents
  1. about this manual
  2. Table of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. logging in to an ethernet switch
  6. relationship between a user and a user interface
  7. logging in through the console port
  8. console port login configuration
  9. console port login configurations for different authentication modes
  10. console port login configuration with authentication mode being none
  11. console port login configuration with authentication mode being password
  12. console port login configuration with authentication mode being scheme
  13. configuration example
  14. logging in through telnet
  15. telnet configurations for different authentication modes
  16. telnet configuration with authentication mode being none
  17. telnet configuration with authentication mode being password
  18. telnet configuration with authentication mode being scheme
  19. telnetting to a switch
  20. telnetting to another switch from the current switch
  21. logging in using a modem
  22. switch configuration
  23. cli configuration
  24. modifying the command level
  25. switching user level
  26. cli views
  27. cli features
  28. terminal display
  29. error prompts
  30. establishing an http connection
  31. configuring the login banner
  32. enabling/disabling the web server
  33. logging in through nms
  34. user control
  35. controlling telnet users by acl
  36. controlling web users by source ip address
  37. logging out a web user
  38. Table of Contents
  39. Table Of Contents
  40. configuration file management
  41. management of configuration file
  42. erasing the startup configuration file
  43. specifying a configuration file for next startup
  44. displaying device configuration
  45. Table of Contents
  46. Table Of Contents
  47. vlan overview
  48. advantages of vlans
  49. vlan interface
  50. link types of ethernet ports
  51. vlan configuration
  52. basic vlan interface configuration
  53. displaying vlan configuration
  54. configuring a hybrid-port-based vlan
  55. displaying and maintaining port-based vlan
  56. Table of Contents
  57. Table Of Contents
  58. configuring the management vlan
  59. displaying and maintaining management vlan configuration
  60. Table Of Contents
  61. ip addressing configuration
  62. special case ip addresses
  63. configuring ip addresses
  64. ip address configuration examples
  65. ip performance configuration
  66. disabling icmp to send error packets
  67. Table of Contents
  68. Table Of Contents
  69. dns configuration
  70. configuring domain name resolution
  71. configuring dynamic domain name resolution
  72. dns configuration example
  73. dynamic domain name resolution configuration example
  74. troubleshooting dns
  75. Table of Contents
  76. Table Of Contents
  77. how switch s4210 identify voice traffic
  78. configuring voice vlan assignment mode of a port
  79. security mode of voice vlan
  80. configuring the voice vlan to operate in automatic voice vlan assignment mode
  81. configuring the voice vlan to operate in manual voice vlan assignment mode
  82. displaying and maintaining voice vlan
  83. voice vlan configuration example
  84. voice vlan configuration example (manual voice vlan assignment mode)
  85. Table of Contents
  86. Table Of Contents
  87. protocol specifications
  88. configuring gvrp timers
  89. configuring gvrp port registration mode
  90. displaying and maintaining gvrp
  91. Table of Contents
  92. Table Of Contents
  93. port basic configuration
  94. initially configuring a port
  95. limiting traffic on individual ports
  96. enabling flow control on a port
  97. configuring loopback detection for an ethernet port
  98. configuring loopback detection for ethernet port(s)
  99. enabling loopback test
  100. configuring the interval to perform statistical analysis on port traffic
  101. configuring storm control on a port
  102. setting the port state change delay
  103. displaying and maintaining basic port configuration
  104. Table of Contents
  105. Table Of Contents
  106. operational key
  107. static lacp aggregation group
  108. dynamic lacp aggregation group
  109. aggregation group categories
  110. configuring a manual aggregation group
  111. configuring a static lacp aggregation group
  112. configuring a dynamic lacp aggregation group
  113. displaying and maintaining link aggregation configuration
  114. Table Of Contents
  115. port isolation configuration
  116. displaying port isolation configuration
  117. Table Of Contents
  118. port security configuration
  119. port security configuration task list
  120. enabling port security
  121. setting the port security mode
  122. configuring port security features
  123. configuring guest vlan for a port in macaddressoruserloginsecure mode
  124. ignoring the authorization information from the radius server
  125. configuring security mac addresses
  126. displaying and maintaining port security configuration
  127. port security configuration example
  128. guest vlan configuration example
  129. port binding configuration
  130. displaying and maintaining port binding configuration
  131. Table of Contents
  132. Table Of Contents
  133. dldp fundamentals
  134. dldp status
  135. dldp operating mode
  136. dldp implementation
  137. dldp neighbor state
  138. performing basic dldp configuration
  139. resetting dldp state
  140. dldp configuration example
  141. Table of Contents
  142. Table Of Contents
  143. managing mac address table
  144. mac address table management configuration task list
  145. setting the mac address aging timer
  146. setting the maximum number of mac addresses a port can learn
  147. adding a static mac address entry manually
  148. Table of Contents
  149. Table Of Contents
  150. Table Of Contents
  151. mstp configuration
  152. rapid spanning tree protocol overview
  153. mstp implementation on switches
  154. configuring root bridge
  155. specifying the current switch as a root bridge/secondary root bridge
  156. configuring the bridge priority of the current switch
  157. configuring the mstp operation mode
  158. configuring the maximum hop count of an mst region
  159. configuring the network diameter of the switched network
  160. configuring the current port as an edge port
  161. configuring leaf nodes
  162. configuring port priority
  163. performing mcheck operation
  164. configuring guard functions
  165. configuring root guard
  166. configuring loop guard
  167. configuring tc-bpdu attack guard
  168. configuring bpdu dropping
  169. configuring digest snooping
  170. configuring vlan-vpn tunnel
  171. mstp maintenance configuration
  172. enabling trap messages conforming to 802.1d standard
  173. mstp configuration example
  174. vlan-vpn tunnel configuration example
  175. Table of Contents
  176. Table Of Contents
  177. multicast overview
  178. information transmission in the broadcast mode
  179. roles in multicast
  180. advantages and applications of multicast
  181. multicast architecture
  182. multicast address
  183. multicast protocols
  184. multicast packet forwarding mechanism
  185. rpf check
  186. work mechanism of igmp snooping
  187. enabling igmp snooping
  188. configuring timers
  189. configuring a multicast group filter
  190. configuring the maximum number of multicast groups on a port
  191. configuring igmp snooping querier
  192. suppressing flooding of unknown multicast traffic in a vlan
  193. configuring static member port for a multicast group
  194. configuring a static router port
  195. configuring a vlan tag for query messages
  196. displaying and maintaining igmp snooping
  197. igmp snooping configuration examples
  198. configuration procedure
  199. troubleshooting igmp snooping
  200. common multicast configuration
  201. configuring a multicast mac address entry
  202. Table of Contents
  203. Table Of Contents
  204. x configuration
  205. the mechanism of an 802.1x authentication system
  206. encapsulation of eapol messages
  207. x authentication procedure
  208. timers used in 802.1x
  209. x implementation on an s4210 series switch
  210. introduction to 802.1x configuration
  211. configuring basic 802.1x functions
  212. timer and maximum user number configuration
  213. advanced 802.1x configuration
  214. configuring proxy checking
  215. enabling dhcp-triggered authentication
  216. configuring 802.1x re-authentication
  217. displaying and debugging 802.1x
  218. x mandatory authentication domain configuration example
  219. habp configuration
  220. habp client configuration
  221. system-guard configuration
  222. displaying and maintaining system-guard
  223. Table of Contents
  224. Table Of Contents
  225. Table Of Contents
  226. aaa overview
  227. introduction to isp domain
  228. introduction to aaa services
  229. introduction to hwtacacs
  230. aaa configuration
  231. creating an isp domain and configuring its attributes
  232. configuring an aaa scheme for an isp domain
  233. configuring dynamic vlan assignment
  234. configuring the attributes of a local user
  235. cutting down user connections forcibly
  236. creating a radius scheme
  237. configuring radius authentication/authorization servers
  238. configuring the sending mode of accounting start requests
  239. configuring radius accounting servers
  240. configuring shared keys for radius messages
  241. configuring the maximum number of radius request transmission attempts
  242. configuring the status of radius servers
  243. configuring the attributes of data to be sent to radius servers
  244. configuring the local radius authentication server function
  245. configuring timers for radius servers
  246. enabling sending trap message when a radius server goes down
  247. hwtacacs configuration task list
  248. configuring tacacs authorization servers
  249. configuring tacacs accounting servers
  250. configuring the attributes of data to be sent to tacacs servers
  251. configuring the timers regarding tacacs servers
  252. aaa configuration examples
  253. remote radius authentication of telnet/ssh users
  254. local authentication of ftp/telnet users
  255. hwtacacs authentication and authorization of telnet users
  256. troubleshooting aaa
  257. Table of Contents
  258. Table Of Contents
  259. mac authentication configuration
  260. related concepts
  261. mac address authentication enhanced function configuration
  262. configuring a guest vlan
  263. configuring the maximum number of mac address authentication users allowed to access a port
  264. configuring the quiet mac function on a port
  265. mac authentication configuration example
  266. Table of Contents
  267. Table Of Contents
  268. arp table
  269. arp process
  270. introduction to arp attack detection
  271. introduction to arp packet rate limit
  272. configuring arp attack detection
  273. configuring the arp packet rate limit function
  274. gratuitous arp packet configuration
  275. arp configuration example
  276. Table of Contents
  277. Table Of Contents
  278. Table Of Contents
  279. dhcp overview
  280. obtaining ip addresses dynamically
  281. dhcp packet format
  282. protocol specification
  283. dhcp server configuration
  284. dhcp ip address preferences
  285. configuring the global address pool based dhcp server
  286. enabling the global address pool mode on interface(s)
  287. configuring gateways for the dhcp client
  288. configuring the interface address pool based dhcp server
  289. enabling the interface address pool mode on interface(s)
  290. configuring an address allocation mode for an interface address pool
  291. configuring dhcp server security functions
  292. configuring ip address detecting
  293. dhcp accounting configuration
  294. displaying and maintaining the dhcp server
  295. dhcp server configuration examples
  296. dhcp server with option 184 support configuration example
  297. dhcp accounting configuration example
  298. troubleshooting a dhcp server
  299. overview of dhcp-snooping option
  300. overview of ip filtering
  301. configuring dhcp snooping
  302. configuring dhcp snooping to support option
  303. configuring ip filtering
  304. displaying dhcp snooping configuration
  305. ip filtering configuration example
  306. dhcp packet rate limit configuration
  307. configuring dhcp packet rate limit
  308. dhcp/bootp client configuration
  309. how automatic configuration works
  310. introduction to bootp client
  311. configuring a dhcp/bootp client
  312. dhcp client configuration example
  313. Table of Contents
  314. Table Of Contents
  315. acl configuration
  316. ways to apply an acl on a switch
  317. types of acls supported by switch 4210 series
  318. configuring basic acl
  319. configuring advanced acl
  320. configuring layer 2 acl
  321. acl assignment
  322. assigning an acl to a vlan
  323. displaying acl configuration
  324. example for upper-layer software referencing acls
  325. example for applying acls to hardware
  326. advanced acl configuration example
  327. network diagram
  328. Table of Contents
  329. Table Of Contents
  330. qos configuration
  331. major traffic control techniques
  332. qos supported by the 4210 series ethernet switches
  333. priority trust mode
  334. priority marking
  335. port rate limiting
  336. flow-based traffic accounting
  337. traffic mirroring
  338. configuring priority mapping
  339. marking packet priority
  340. configuring traffic policing
  341. configuring port rate limiting
  342. configuring traffic redirecting
  343. configuring queue scheduling
  344. configuring traffic accounting
  345. enabling the burst function
  346. configuring traffic mirroring
  347. displaying qos
  348. qos configuration example
  349. qos profile configuration
  350. configuring a qos profile
  351. displaying qos profile configuration
  352. qos profile configuration example
  353. Table of Contents
  354. Table Of Contents
  355. configuring local port mirroring
  356. configuring remote port mirroring
  357. displaying port mirroring
  358. remote port mirroring configuration example
  359. Table of Contents
  360. Table Of Contents
  361. cluster overview
  362. roles in a cluster
  363. how a cluster works
  364. cluster configuration tasks
  365. configuring the management device
  366. configuring member devices
  367. managing a cluster through the management device
  368. configuring the enhanced cluster features
  369. configuring the cluster synchronization function
  370. displaying and maintaining cluster configuration
  371. cluster configuration example
  372. enhanced cluster feature configuration example
  373. Table of Contents
  374. Table Of Contents
  375. poe configuration tasks
  376. setting the maximum output power on a port
  377. setting the poe mode on a port
  378. configuring poe over-temperature protection on the switch
  379. displaying poe configuration
  380. poe profile configuration
  381. displaying poe profile configuration
  382. Table of Contents
  383. Table Of Contents
  384. snmp configuration
  385. configuring basic snmp functions
  386. configuring trap parameters
  387. configuring extended trap
  388. displaying snmp
  389. commonly used rmon groups
  390. displaying rmon
  391. Table of Contents
  392. Table Of Contents
  393. ntp configuration
  394. implementation principle of ntp
  395. ntp implementation modes
  396. ntp configuration tasks
  397. configuring access control right
  398. configuring ntp authentication
  399. configuring optional ntp parameters
  400. disabling an interface from receiving ntp messages
  401. configuring ntp symmetric peer mode
  402. configuring ntp server/client mode with authentication
  403. Table of Contents
  404. Table Of Contents
  405. ssh configuration
  406. asymmetric key algorithm
  407. ssh server and client configuration task list
  408. configuring the user interfaces for ssh clients
  409. configuring the ssh management functions
  410. configuring the ssh server to be compatible with ssh1 clients
  411. creating an ssh user and specifying an authentication type
  412. specifying a service type for an ssh user
  413. assigning a public key to an ssh user
  414. exporting the rsa or dsa public key
  415. configuring the ssh client
  416. configuring an ssh client assumed by an ssh2-capable switch
  417. displaying and maintaining ssh configuration
  418. ssh configuration examples
  419. when switch acts as server for password and radius authentication
  420. when switch acts as server for password and hwtacacs authentication
  421. when switch acts as server for publickey authentication
  422. when switch acts as client for password authentication
  423. when switch acts as client for publickey authentication
  424. when switch acts as client and first-time authentication is not supported
  425. Table of Contents
  426. Table Of Contents
  427. file system management configuration
  428. file operations
  429. flash memory operations
  430. file system configuration example
  431. file attribute configuration
  432. booting with the startup file
  433. Table of Contents
  434. Table Of Contents
  435. ftp and sftp configuration
  436. ftp configuration
  437. configuration example: a switch operating as an ftp server
  438. ftp banner display configuration example
  439. sftp configuration
  440. sftp configuration: a switch operating as an sftp server
  441. sftp configuration: a switch operating as an sftp client
  442. sftp configuration example
  443. tftp configuration
  444. tftp configuration: a switch operating as a tftp client
  445. Table of Contents
  446. Table Of Contents
  447. information center
  448. system information format
  449. information center configuration
  450. configuring to display the time stamp with the utc time zone
  451. setting to output system information to a monitor terminal
  452. setting to output system information to a log host
  453. setting to output system information to the log buffer
  454. displaying and maintaining information center
  455. information center configuration examples
  456. log output to a linux log host
  457. log output to the console
  458. Table of Contents
  459. Table Of Contents
  460. boot rom and host software loading
  461. boot menu
  462. loading by xmodem through console port
  463. loading by tftp through ethernet port
  464. loading by ftp through ethernet port
  465. remote boot rom and software loading
  466. remote loading using tftp
  467. basic system configuration and debugging
  468. debugging the system
  469. displaying debugging status
  470. command alias configuration
  471. network connectivity test
  472. device management
  473. scheduling a reboot on the switch
  474. upgrading the boot rom
  475. displaying the device management configuration
  476. remote switch app upgrade configuration example
  477. scheduled task configuration
  478. Table of Contents
  479. Table Of Contents
  480. test types supported by remote-ping
  481. remote-ping server configuration
  482. remote-ping client configuration
  483. displaying remote-ping configuration
  484. dhcp test
  485. http test
  486. jitter test
  487. snmp test
  488. tcp test (tcpprivate test) on the specified ports
  489. udp test (udpprivate test) on the specified ports
  490. dns test
  491. Table of Contents
  492. Table Of Contents
  493. ipv6 configuration
  494. introduction to ipv6 address
  495. introduction to ipv6 neighbor discovery protocol
  496. introduction to ipv6 dns
  497. configuring an ipv6 unicast address
  498. configuring ipv6 ndp
  499. configuring a static ipv6 route
  500. configuring the maximum number of ipv6 icmp error packets sent within a specified time
  501. configuring ipv6 dns
  502. displaying and maintaining ipv
  503. ipv6 configuration example
  504. ipv6 application configuration
  505. ipv6 tftp
  506. ipv6 telnet
  507. ipv6 application configuration example
  508. troubleshooting ipv6 application
  509. unable to run traceroute
  510. Table of Contents
  511. Table Of Contents
  512. password control configuration operations
  513. password control configuration
  514. configuring the limitation of minimum password length
  515. configuring history password recording
  516. configuring a user login password in interactive mode
  517. configuring the password authentication timeout time
  518. configuring password composition policies
  519. displaying password control
  520. Table of Contents
  521. Table Of Contents
  522. smart link configuration
  523. operating mechanism of smart link
  524. configuring smart link
  525. configuring associated devices
  526. displaying and debugging smart link
  527. monitor link configuration
  528. how monitor link works
  529. creating a monitor link group
  530. configuring a downlink port
  531. monitor link configuration example
  532. Table of Contents
  533. Table Of Contents
  534. arp and ip attack defense configuration
  535. configuring the maximum number of dynamic arp entries a vlan interface can learn
  536. arp/ip attack defense based on 802.1x
  537. configuring 802.1x-based arp/ip attack defense
  538. enabling arp source mac address consistency check
  539. arp attack defense configuration example ii
  540. arp/ip attack defense configuration example iii
  541. Table of Contents
  542. Table Of Contents
  543. lldp configuration
  544. operating modes of lldp
  545. how lldp works
  546. performing basic lldp configuration
  547. enabling lldp polling
  548. setting other lldp parameters
  549. setting an encapsulation format for lldpdus
  550. configuring lldp trapping
  551. displaying and maintaining lldp
  552. cdp-compatible lldp configuration example
  553. Table of Contents
  554. Table Of Contents
  555. pki configuration
  556. architecture of pki
  557. applications of pki
  558. pki configuration task list
  559. configuring a pki domain
  560. submitting a pki certificate request
  561. submitting a certificate request in manual mode
  562. retrieving a certificate manually
  563. configuring pki certificate verification
  564. destroying a local rsa key pair
  565. configuring an access control policy
  566. pki configuration examples
  567. requesting a certificate from a ca running windows 2003 server
  568. failed to request a local certificate
  569. Table of Contents
  570. Table Of Contents
  571. ssl configuration
  572. ssl protocol stack
  573. ssl server policy configuration example
  574. configuring an ssl client policy
  575. displaying and maintaining ssl
  576. Table Of Contents
  577. https configuration
  578. associating the https service with an ssl server policy
  579. associating the https service with a certificate attribute access control policy
  580. https configuration example