3Com Switch 4210 52-Port manuals
Switch 4210 52-Port
Table of contents
- getting started
- Table Of Contents
- Table Of Contents
- Download the Latest Software and Documentation for Your 3Com Switch
- Related Documentation
- Overview
- Introduction to the Switch 4210 Family PWR Switches
- Introduction to the Switch 4210 Family Non-PWR Models
- Technical Specifications
- SFP Modules Supported for the Switch 4210
- Rack-Mounting the Switch
- Mounting the Switch on a Desktop
- Connecting a Redundant Power Supply
- Using Power over Ethernet
- Connecting the Console Cable
- Methods of Managing a Switch
- Setting Up Your Switch
- Viewing Automatically Configured IP Information
- Manually Configuring IP Information
- Setting Up Switch with IP Information
- Setting Up Command Line Interface Management
- Setting Up Web Interface Management
- Web management over network
- Default Users and Passwords
- Problem Solving
- Solving Problems Indicated by LEDs
- Solving Hardware Problems
- Solving Communication Problems
- Solving Fabric Formation Problems
- Null Modem Cable
- Modem Cable
- Register Your Product to Gain Service Benefits
- Contact Us
- Com Network Supervisor
- Com Network Access Manager
- Com Enterprise Management Suite
- Important Safety Information
- L'information de Sécurité Importante
- Información de Seguridad Importante
- Importanti Informazioni di Sicurezza
- Regulatory Notices
Switch 4210 52-Port
Brand: 3Com | Category: Network Hardware
Table of contents
- about this manual
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- relationship between a user and a user interface
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- configuration example
- logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- logging in using a modem
- switch configuration
- cli configuration
- modifying the command level
- switching user level
- cli views
- cli features
- terminal display
- error prompts
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- logging in through nms
- user control
- controlling telnet users by acl
- controlling web users by source ip address
- logging out a web user
- Table of Contents
- Table Of Contents
- configuration file management
- management of configuration file
- erasing the startup configuration file
- specifying a configuration file for next startup
- displaying device configuration
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- vlan interface
- link types of ethernet ports
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- configuring a hybrid-port-based vlan
- displaying and maintaining port-based vlan
- Table of Contents
- Table Of Contents
- configuring the management vlan
- displaying and maintaining management vlan configuration
- Table Of Contents
- ip addressing configuration
- special case ip addresses
- configuring ip addresses
- ip address configuration examples
- ip performance configuration
- disabling icmp to send error packets
- Table of Contents
- Table Of Contents
- dns configuration
- configuring domain name resolution
- configuring dynamic domain name resolution
- dns configuration example
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Table Of Contents
- how switch s4210 identify voice traffic
- configuring voice vlan assignment mode of a port
- security mode of voice vlan
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- Table of Contents
- Table Of Contents
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- Table of Contents
- Table Of Contents
- port basic configuration
- initially configuring a port
- limiting traffic on individual ports
- enabling flow control on a port
- configuring loopback detection for an ethernet port
- configuring loopback detection for ethernet port(s)
- enabling loopback test
- configuring the interval to perform statistical analysis on port traffic
- configuring storm control on a port
- setting the port state change delay
- displaying and maintaining basic port configuration
- Table of Contents
- Table Of Contents
- operational key
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation configuration
- Table Of Contents
- port isolation configuration
- displaying port isolation configuration
- Table Of Contents
- port security configuration
- port security configuration task list
- enabling port security
- setting the port security mode
- configuring port security features
- configuring guest vlan for a port in macaddressoruserloginsecure mode
- ignoring the authorization information from the radius server
- configuring security mac addresses
- displaying and maintaining port security configuration
- port security configuration example
- guest vlan configuration example
- port binding configuration
- displaying and maintaining port binding configuration
- Table of Contents
- Table Of Contents
- dldp fundamentals
- dldp status
- dldp operating mode
- dldp implementation
- dldp neighbor state
- performing basic dldp configuration
- resetting dldp state
- dldp configuration example
- Table of Contents
- Table Of Contents
- managing mac address table
- mac address table management configuration task list
- setting the mac address aging timer
- setting the maximum number of mac addresses a port can learn
- adding a static mac address entry manually
- Table of Contents
- Table Of Contents
- Table Of Contents
- mstp configuration
- rapid spanning tree protocol overview
- mstp implementation on switches
- configuring root bridge
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the current port as an edge port
- configuring leaf nodes
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring root guard
- configuring loop guard
- configuring tc-bpdu attack guard
- configuring bpdu dropping
- configuring digest snooping
- configuring vlan-vpn tunnel
- mstp maintenance configuration
- enabling trap messages conforming to 802.1d standard
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- roles in multicast
- advantages and applications of multicast
- multicast architecture
- multicast address
- multicast protocols
- multicast packet forwarding mechanism
- rpf check
- work mechanism of igmp snooping
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring static member port for a multicast group
- configuring a static router port
- configuring a vlan tag for query messages
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- configuration procedure
- troubleshooting igmp snooping
- common multicast configuration
- configuring a multicast mac address entry
- Table of Contents
- Table Of Contents
- x configuration
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s4210 series switch
- introduction to 802.1x configuration
- configuring basic 802.1x functions
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring proxy checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and debugging 802.1x
- x mandatory authentication domain configuration example
- habp configuration
- habp client configuration
- system-guard configuration
- displaying and maintaining system-guard
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to isp domain
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- creating a radius scheme
- configuring radius authentication/authorization servers
- configuring the sending mode of accounting start requests
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius authentication server function
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- aaa configuration examples
- remote radius authentication of telnet/ssh users
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- Table of Contents
- Table Of Contents
- mac authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- configuring a guest vlan
- configuring the maximum number of mac address authentication users allowed to access a port
- configuring the quiet mac function on a port
- mac authentication configuration example
- Table of Contents
- Table Of Contents
- arp table
- arp process
- introduction to arp attack detection
- introduction to arp packet rate limit
- configuring arp attack detection
- configuring the arp packet rate limit function
- gratuitous arp packet configuration
- arp configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- dhcp overview
- obtaining ip addresses dynamically
- dhcp packet format
- protocol specification
- dhcp server configuration
- dhcp ip address preferences
- configuring the global address pool based dhcp server
- enabling the global address pool mode on interface(s)
- configuring gateways for the dhcp client
- configuring the interface address pool based dhcp server
- enabling the interface address pool mode on interface(s)
- configuring an address allocation mode for an interface address pool
- configuring dhcp server security functions
- configuring ip address detecting
- dhcp accounting configuration
- displaying and maintaining the dhcp server
- dhcp server configuration examples
- dhcp server with option 184 support configuration example
- dhcp accounting configuration example
- troubleshooting a dhcp server
- overview of dhcp-snooping option
- overview of ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- displaying dhcp snooping configuration
- ip filtering configuration example
- dhcp packet rate limit configuration
- configuring dhcp packet rate limit
- dhcp/bootp client configuration
- how automatic configuration works
- introduction to bootp client
- configuring a dhcp/bootp client
- dhcp client configuration example
- Table of Contents
- Table Of Contents
- acl configuration
- ways to apply an acl on a switch
- types of acls supported by switch 4210 series
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl to a vlan
- displaying acl configuration
- example for upper-layer software referencing acls
- example for applying acls to hardware
- advanced acl configuration example
- network diagram
- Table of Contents
- Table Of Contents
- qos configuration
- major traffic control techniques
- qos supported by the 4210 series ethernet switches
- priority trust mode
- priority marking
- port rate limiting
- flow-based traffic accounting
- traffic mirroring
- configuring priority mapping
- marking packet priority
- configuring traffic policing
- configuring port rate limiting
- configuring traffic redirecting
- configuring queue scheduling
- configuring traffic accounting
- enabling the burst function
- configuring traffic mirroring
- displaying qos
- qos configuration example
- qos profile configuration
- configuring a qos profile
- displaying qos profile configuration
- qos profile configuration example
- Table of Contents
- Table Of Contents
- configuring local port mirroring
- configuring remote port mirroring
- displaying port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration tasks
- configuring the management device
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- configuring the cluster synchronization function
- displaying and maintaining cluster configuration
- cluster configuration example
- enhanced cluster feature configuration example
- Table of Contents
- Table Of Contents
- poe configuration tasks
- setting the maximum output power on a port
- setting the poe mode on a port
- configuring poe over-temperature protection on the switch
- displaying poe configuration
- poe profile configuration
- displaying poe profile configuration
- Table of Contents
- Table Of Contents
- snmp configuration
- configuring basic snmp functions
- configuring trap parameters
- configuring extended trap
- displaying snmp
- commonly used rmon groups
- displaying rmon
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration tasks
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- disabling an interface from receiving ntp messages
- configuring ntp symmetric peer mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- asymmetric key algorithm
- ssh server and client configuration task list
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user
- assigning a public key to an ssh user
- exporting the rsa or dsa public key
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system management configuration
- file operations
- flash memory operations
- file system configuration example
- file attribute configuration
- booting with the startup file
- Table of Contents
- Table Of Contents
- ftp and sftp configuration
- ftp configuration
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp server
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: a switch operating as a tftp client
- Table of Contents
- Table Of Contents
- information center
- system information format
- information center configuration
- configuring to display the time stamp with the utc time zone
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the log buffer
- displaying and maintaining information center
- information center configuration examples
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- boot rom and host software loading
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration and debugging
- debugging the system
- displaying debugging status
- command alias configuration
- network connectivity test
- device management
- scheduling a reboot on the switch
- upgrading the boot rom
- displaying the device management configuration
- remote switch app upgrade configuration example
- scheduled task configuration
- Table of Contents
- Table Of Contents
- test types supported by remote-ping
- remote-ping server configuration
- remote-ping client configuration
- displaying remote-ping configuration
- dhcp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- introduction to ipv6 dns
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the maximum number of ipv6 icmp error packets sent within a specified time
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- ipv6 application configuration
- ipv6 tftp
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table of Contents
- Table Of Contents
- password control configuration operations
- password control configuration
- configuring the limitation of minimum password length
- configuring history password recording
- configuring a user login password in interactive mode
- configuring the password authentication timeout time
- configuring password composition policies
- displaying password control
- Table of Contents
- Table Of Contents
- smart link configuration
- operating mechanism of smart link
- configuring smart link
- configuring associated devices
- displaying and debugging smart link
- monitor link configuration
- how monitor link works
- creating a monitor link group
- configuring a downlink port
- monitor link configuration example
- Table of Contents
- Table Of Contents
- arp and ip attack defense configuration
- configuring the maximum number of dynamic arp entries a vlan interface can learn
- arp/ip attack defense based on 802.1x
- configuring 802.1x-based arp/ip attack defense
- enabling arp source mac address consistency check
- arp attack defense configuration example ii
- arp/ip attack defense configuration example iii
- Table of Contents
- Table Of Contents
- lldp configuration
- operating modes of lldp
- how lldp works
- performing basic lldp configuration
- enabling lldp polling
- setting other lldp parameters
- setting an encapsulation format for lldpdus
- configuring lldp trapping
- displaying and maintaining lldp
- cdp-compatible lldp configuration example
- Table of Contents
- Table Of Contents
- pki configuration
- architecture of pki
- applications of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in manual mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- failed to request a local certificate
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl protocol stack
- ssl server policy configuration example
- configuring an ssl client policy
- displaying and maintaining ssl
- Table Of Contents
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- https configuration example