3Com WX3000 Series Unified Switches Switching Engine
Manual Version 6W100
Environmental Statement
About This Manual
Part Contents
Organization
Convention Description Boldface
Conventions
Italic
Create Folder
Related Documentation
Convention Description
Manual Description
Obtaining Documentation
Table of Contents
Command Hierarchy
CLI Configuration
Introduction to the CLI
Setting a user level switching password
Switching User Levels
Switching to a specific user level
Configuration example
Setting the Level of a Command in a Specific View
Setting the level of a command in a specific view
Quit
CLI Views
Display Execute Operation
Quit or return
Region-configuration
Gigabitethernet command
Vlan-interface command
Peer-public-key command
Public-key-code begin
Public-key-c
Ode end
Execute the radius scheme
Execute Command should be first
CLI Features
Vlan-vpn enable
Online Help
Partial online help
Command History
Terminal Display
Press Ctrl+C
Error Prompts
Command Edit
Press… To…
Tab
Table of Contents
Page
Introduction to the User Interface
Logging In to the Switching Engine
Logging In to the Switching Engine
Supported User Interfaces
Common User Interface Configuration
User Interface Index
Type number number
Display users all
Display user-interface
Display web users
Logging In Through OAP
Logging In to the Switching Engine Through OAP
Press Enter to enter user view of the switching engine
OAP Overview
Oap management-ip
Configure the management IP
Not configured by default
Address of an OAP module
Reset the OAP software
Resetting the OAP Software System
Oap reboot slot
Logging In Through Telnet
Common Configuration
Configuration Description
Introduction
Telnet Configurations for Different Authentication Modes
Authentication Telnet configuration Description Mode
Telnet Configuration with Authentication Mode Being None
Configuration Procedure
Configuration procedure
Configuration Example
Network requirements
Auto-execute command
Password Set authentication
Password cipher
User privilege level level
Command buffer can store up to
Set the history command buffer
Default history command
Commands by default
Telnet Configuration with Authentication Mode Being Scheme
History-command max-size
Scheme command
Authorization
Protocol inbound all ssh
User privilege level level command is Level level
Service-type
Privilege
# Create a local user named guest and enter local user view
Telnetting to the Switching Engine
Telnetting to the Switching Engine from a Terminal
Deviceoap connect slot Connected to OAP
Page
Device telnet
Network management system are configured
Vlan interface of the switching engine is assigned an IP
User name and password for logging in to the Web-based
Logging In from the Web-Based Network Management System
Setting Up a Web Configuration Environment
Configuring the Login Banner
3The login page of the Web-based network management system
By default, no login banner is
Header login text
Through Web Configured
Enabling/Disabling the WEB Server
Follow these steps to enable/disable the WEB server
Enable the Web server
Ip http shutdown
Logging In from NMS
Connection Establishment Using NMS
Related information
Configuration in user view
Configuring Source IP Address for Telnet Service Packets
Configuring Source IP Address for Telnet Service Packets
Configuration in system view
Displaying Source IP Address Configuration
Interface-number
Controlling Telnet Users
Login mode Control method Implementation Reference
User Control
Prerequisites
Rule rule-id deny permit
Match-order config auto
Acl number acl-number
Acl acl-number inbound
Rule rule-id deny
Controlling Telnet Users by Source MAC Addresses
Permit rule-string
Controlling Network Management Users by Source IP Addresses
Controlling Network Management Users by Source IP Addresses
2Network diagram for controlling Snmp users using ACLs
Controlling Web Users by Source IP Address
Ip http acl acl-number
Disconnecting a Web User by Force
Controlling Web Users by Source IP Addresses
Free web-users all user-id
Device ip http acl
Table of Contents
Types of configuration
Configuration File Management
Introduction to Configuration File
Format of configuration file
Startup with the configuration file
Management of Configuration File
Saving the Current Configuration
Modes in saving the configuration
Erasing the Startup Configuration File
Three attributes of the configuration file
Assign backup attribute to the startup configuration file
Specifying a Configuration File for Next Startup
Assign main attribute to the startup configuration file
Startup saved-configuration
Displaying and Maintaining Device Configuration
Table of Contents
Vlan Overview
Vlan Overview
Introduction to Vlan
How Vlan Works
Advantages of VLANs
Vlan tag
MAC address learning mechanism of VLANs
2Encapsulation format of traditional Ethernet frames
Vlan Interface
Port-Based Vlan
Vlan Classification
Encapsulation Format of Ethernet Data
Protocol-Based Vlan
Introduction to Protocol-Based Vlan
Ethernet II and 802.2/802.3 encapsulation
Extended encapsulation formats of 802.2/802.3 packets
6802.3 raw encapsulation format
Implementation of Protocol-Based Vlan
Procedure for the Switch to Judge Packet Protocol
Encapsulation Formats
Encapsulation Ethernet 802.3 raw 802.2 LLC Snap Protocol
Page
Configuration Task List
Vlan Configuration
Vlan Configuration
Basic Vlan Configuration
Configuration prerequisites
Basic Vlan Interface Configuration
Displaying and Maintaining Vlan
Protocol-Based Vlan Configuration Example
Configuring a Port-Based Vlan
Configuring a Port-Based Vlan
Port interface-list
# Create Vlan 201, and add GigabitEthernet 1/0/2 to Vlan
# Configure GigabitEthernet 1/0/10 of Switch B
# Create Vlan 201, and add GigabitEthernet 1/0/12 to Vlan
Configuring a Protocol-Based Vlan
Configuring a Protocol Template for a Protocol-Based Vlan
Port hybrid protocol-vlan
Associating a Port with a Protocol-Based Vlan
Interface interface-type Interface-number
Vlan vlan-id protocol-index
Dynamic static
Displaying and Maintaining Protocol-Based Vlan
Display vlan vlan-id to vlan-id all
Display protocol-vlan vlan vlan id
Vlan
Protocol-Type
Table of Contents
Auto Detect Configuration
Introduction to the Auto Detect Function
Auto Detect Configuration
Auto Detect Basic Configuration
Ip route-static ip-address mask
Auto Detect Implementation in Vlan Interface Backup
Auto Detect Implementation in Static Routing
Preference-value reject blackhole
Vlan -id
Auto Detect Configuration Examples
Standby detect-group
Is reachable
# Configure a static route to Switch a
# Create auto detected group
Table of Contents
Voice Vlan Overview
Voice Vlan Configuration
How an IP Phone Works
1Network diagram for IP phones
Agent
How the Device Identifies Voice Traffic
Configuring Operation Mode for Voice Vlan
Number OUI address Vendor
Processing mode of tagged packets sent by IP voice devices
Support for Voice Vlan on Various Ports
Port type Supported or not Traffic type Mode
Security Mode of Voice Vlan
Port voice Voice
Configuration Prerequisites
Voice Vlan Configuration
Configuring a Voice Vlan to Operate in Automatic Mode
Undo voice vlan mode
Configuring a Voice Vlan to Operate in Manual Mode
Enable
Voice vlan security
Tagged untagged
Port trunk permit vlan
Port hybrid vlan vlan-id
Port trunk pvid vlan
Voice Vlan Configuration Example Automatic Mode
Voice Vlan Configuration Example
Displaying and Maintaining Voice Vlan
# Configure GigabitEthernet 1/0/1 as a hybrid port
Voice Vlan Configuration Example Manual Mode
# Enable the voice Vlan function globally
# Enable the voice Vlan function on GigabitEthernet 1/0/1
Verification
# Create Vlan 2 and configure it as a voice Vlan
# Configure GigabitEthernet 1/0/1 to operate in manual mode
# Display the status of the current voice Vlan
Table of Contents
Garp messages and timers
Gvrp Configuration
Introduction to Gvrp
Garp message format
Operating mechanism of Garp
Garp packets are in the following format
1Format of Garp packets
Field Description Value
Configuration Prerequisite
Gvrp Configuration
Protocol Specifications
Enabling Gvrp
Garp timer hold join
Configuring Gvrp Timers
Garp timer leaveall
Gvrp
Configuring Gvrp Port Registration Mode
Displaying and Maintaining Gvrp
Configure Switch a # Enable Gvrp globally
Gvrp Configuration Example
Gvrp Configuration Example
# Enable Gvrp on GigabitEthernet 1/0/1
# Enable Gvrp on GigabitEthernet 1/0/3
SwitchE-GigabitEthernet1/0/1 gvrp registration fixed
Table of Contents
Types and Numbers of Ethernet Ports
Basic Port Configuration
Ethernet Port Overview
Combo Ports Mapping Relations
Configuring the Default Vlan ID for an Ethernet Port
Link Types of Ethernet Ports
Adding an Ethernet Port to Specified VLANs
Configuring Ethernet Ports
Making Basic Port Configuration
Vlan tag
Configuring Port Auto-Negotiation Speed
Speed auto 10 100
Setting the Ethernet Port Broadcast Suppression Ratio
Enabling Flow Control on a Port
Broadcast-suppression
Configuring Hybrid Port Attribute
Configuring Access Port Attribute
Configuring Trunk Port Attribute
Configuration tasks
Disabling Up/Down Log Output on a Port
System-view Copy configuration source interface-type
Copying Port Configuration to Other Ports
Configuring a Port Group
Aggregation-group destination-agg-id
Setting Loopback Detection for an Ethernet Port
Loopback-detection per-vlan
Configuring the Ethernet Port to Run Loopback Test
Configure the Ethernet port to run
Loopback detection only on VLANs for the trunk and hybrid
Virtual-cable-test
Enabling the System to Test Connected Cable
Flow-interval interval
Ethernet Port Configuration Example
Displaying and Maintaining Ethernet Ports
Troubleshooting Ethernet Port Configuration
# Configure the default Vlan ID of GigabitEthernet 1/0/1 as
Table of Contents
Introduction to Link Aggregation
Link Aggregation Configuration
Introduction to Lacp
Introduction to manual aggregation group
Operation Key
Manual Aggregation Group
Port status in manual aggregation group
Introduction to static Lacp aggregation
Static Lacp Aggregation Group
Port status of static aggregation group
Introduction to dynamic Lacp aggregation group
Configuring system priority
Dynamic Lacp Aggregation Group
Port status of dynamic aggregation group
Configuring port priority
Aggregation Group Categories
Link Aggregation Configuration
Configuring a Manual Aggregation Group
Port link-aggregation group
Configuring a Static Lacp Aggregation Group
Description agg-name
Agg-id
Lacp system -priority
Configuring a Dynamic Lacp Aggregation Group
System-priority
Link Aggregation Configuration Example
Displaying and Maintaining Link Aggregation
Switch a Link aggregation Switch B
Page
Table of Contents
Port Isolation Overview
Port Isolation Configuration
Port Isolation Configuration
Introduction to Port Isolation
Port Isolation Configuration Example
Displaying and Maintaining Port Isolation
Device-GigabitEthernet1/0/4 quit device
Table of Contents
Port Security Overview
Port Security Configuration
Port Security Features
Introduction
Port Security Modes
Security mode Description Feature
This mode
Neither
Security mode Description Feature
Follow these steps to enable port security
Port Security Configuration
Complete the following tasks to configure port security
Enabling Port Security
Port-security max-mac-count
Setting the Port Security Mode
Port-security oui OUI-value UserLoginWithOUI mode, a
Count-value
Configuring Port Security Features
Configuring the NTK feature
Configuring intrusion protection
Configuring the Trap feature
Configuring Security MAC Addresses
Displaying and Maintaining Port Security Configuration
Port Security Configuration Example
# Set the port security mode to autolearn
HostSwitch
# Enable port security
# Enter GigabitEthernet 1/0/1 port view
Configuring Port Binding
Port Binding Configuration
Displaying and Maintaining Port Binding Configuration
Port Binding Overview
Port Binding Configuration Example
Configure switch a as follows # Enter system view
Table of Contents
Dldp Configuration
Dldp Overview
Dldp status
Dldp Fundamentals
Status Description
Timer Description
Dldp timers
Dldp works with the following timers 2DLDP timers
Interval of sending advertisement packets, which can be
Mode During neighbor
Dldp operating mode
Enhanced timer then sends one probe packets every one
Entry aging Timer expire
4Types of packets sent by Dldp
Packet type Processing procedure
No Echo packet received from Processing procedure Neighbor
Dldp status Packet types
Dldp Configuration Tasks
Dldp Configuration
Precautions During Dldp Configuration
Dldp neighbor state
Resetting Dldp Status
This command only applies to the ports in Dldp down status
Reset the Dldp status of a port Dldp reset
Dldp Network Example
# Set the interval of sending Dldp packets to 15 seconds
# Enable Dldp globally
# Configure Dldp to work in enhanced mode
# Display the Dldp status
Table of Contents
Introduction to MAC Address Table
MAC Address Table Management
Introduction to MAC Address Learning
1MAC address learning diagram
Managing MAC Address Table
Aging of MAC address table
Configuring MAC Address Table Management
Entries in a MAC address table
Adding a MAC address entry in Ethernet port view
Configuring a MAC Address Entry
Adding a MAC address entry in system view
System-view Mac-address static dynamic
Mac-address timer aging
Setting the Aging Time of MAC Address Entries
Age no-aging
Max-mac-count count
Disabling MAC Address learning for a Vlan
Mac-address
Max-mac-count
Adding a Static MAC Address Entry Manually
Configuration Example
Displaying and Maintaining MAC Address Table
Display mac-address
Table of Contents
Page
STP Overview
Mstp Configuration
STP Overview
Classification Designated bridge Designated port
All the ports on the root bridge are designated ports
How STP works
Step Description
Step Description
Device Port name Bpdu of port
5Comparison process and result on each device
Device Comparison process Bpdu of port after
Device Comparison process Bpdu of port after
3The final calculated spanning tree
Background of Mstp
Features of Mstp
Mstp Overview
Disadvantages of STP and Rstp
Basic Mstp Terminologies
MST region
Common root bridge
Vlan mapping table
Region root
Port role
Port state
MSTP, a port can be in one of the following three states
Calculate an Msti
Principle of Mstp
Calculate the Cist
Implement STP algorithm
Mstp Implementation on the Device
STP-related Standards
Configuring Root Bridge
Complete the following tasks to configure a root bridge
Bpdu guard Loop guard TC-BPDU attack guard Bpdu packet drop
Configuring an MST Region
# Verify the above configuration
Centi-seconds
Stp instance instance-id root secondary
Set the bridge priority for
Configuring the Bridge Priority of the Current Device
Required Default bridge priority of a Current device
Stp instance instance-id
Interface-number compliance
Stp interface interface-type
Auto dot1s legacy
Stp compliance auto dot1s
Configuring the Mstp Operation Mode
Stp mode stp rstp mstp
Legacy
Configuring the Network Diameter of the Switched Network
Configuring the Maximum Hop Count of an MST Region
Stp max-hops hops
Stp timer hello
Configuring the Mstp Time-related Parameters
Stp timer forward-delay
Stp timer max-age
Configuring the Timeout Time Factor
Transmit-limit packetnum
Stp interface interface-list
Stp transmit-limit packetnum
Configure a port as an edge port in Ethernet port view
Configuring the Current Port as an Edge Port
Configure a port as an edge port in system view
Edged-port enable
Point-to-point force-true
Force-false auto
Enabling Mstp
Stp enable
Disable
Stp point-to-point force-true
Stp disable
Configuring Leaf Nodes
Task Remarks
Configuring the MST Region
Configuring a Port as an Edge Port
Stp pathcost-standard
Configuring the Path Cost for a Port
Standards for calculating path costs of ports
Dot1d-1998 dot1t legacy
Configuration example a
Configure the path cost for specific ports
Configuration example B
Configure port priority in Ethernet port view
Configuring Port Priority
Configure port priority in system view
Instance instance-id port
Perform the mCheck operation in Ethernet port view
Performing mCheck Operation
Perform the mCheck operation in system view
Stp interface interface-list mcheck
Root guard
Configuring Guard Functions
Bpdu guard
Stp mcheck
TC-BPDU attack guard
Loop guard
Bpdu dropping
Root-protection
Configuring Bpdu Guard
Configuring Root Guard
Stp root-protection
Stp loop-protection
Configuring Loop Guard
Configuring TC-BPDU Attack Guard
Stp tc-protection
Interface interface-name
Configuring Digest Snooping
Configuring Bpdu Dropping
Bpdu-drop any
Configuring Digest Snooping
Stp config-digest-snooping
Configuring Rapid Transition
6The Rstp rapid transition mechanism
No-agreement-check
Configuring Rapid Transition
Stp no-agreement-check
Configuring VLAN-VPN tunnel
Configuring VLAN-VPN Tunnel
Vlan-vpn tunnel
Stp instance instance id
STP Maintenance Configuration
Enabling Log/Trap Output for Ports of Mstp Instance
Portlog
Enabling Trap Messages Conforming to 802.1d Standard
Displaying and Maintaining Mstp
Configure Switch a # Enter MST region view
Mstp Configuration Example
# Activate the settings of the MST region manually
# Configure the MST region
Configure Switch B # Enter MST region view
Configure Switch C # Enter MST region view
Configure Switch D # Enter MST region view
Configure Switch B # Enable Mstp
VLAN-VPN tunnel Configuration Example
Configure Switch a # Enable Mstp
Configure Switch C # Enable Mstp
Configure Switch D # Enable Mstp
# Enable the VLAN-VPN tunnel function
# Configure GigabitEthernet 1/0/2 as a trunk port
# Configure GigabitEthernet 1/0/1 as a trunk port
Table of Contents
Architecture of 802.1x Authentication
802.1x Configuration
Introduction to
Controlled port and uncontrolled port
Port access entity
Port access control method
Valid direction of a controlled port
Encapsulation of EAPoL Messages
Mechanism of an 802.1x Authentication System
Format of an EAPoL packet
Format of an EAP packet
Fields added for EAP authentication
802.1x Authentication Procedure
EAP relay mode
Describes the basic EAP-MD5 authentication procedure
EAP terminating mode
Timers Used
9802.1x authentication procedure in EAP terminating mode
Additional 802.1x Features Implemented
Checking the supplicant system
Checking the client version
Guest Vlan function
Introduction to 802.1x Configuration
Enabling 802.1x re-authentication
Configuring Basic 802.1x Functions
Basic 802.1x Configuration
Dot1x
Dot1x interface interface-list
Dot1x authentication-method chap
Dot1x handshake enable
Dot1x port-control authorized-force
Dot1x max-user user-number
Timer and Maximum User Number Configuration
Dot1x retry max-retry-value
Advanced 802.1x Configuration
Configuring Proxy Checking
Configuring Client Version Checking
Dot1x dhcp-launch
Enabling DHCP-triggered Authentication
Configuring Guest Vlan
Dot1x port-method portbased
Configuring the 802.1x Re-Authentication Timer
Configuring 802.1x Re-Authentication
Dot1x re-authenticate
802.1x Configuration Example
Displaying and Maintaining
# Enable 802.1x globally
# Enable 802.1x on GigabitEthernet 1/0/1 port
# Create a local access user account
# Set the default user domain to be aabbcc.net
# Create the domain named aabbcc.net and enter its view
Introduction to Quick EAD Deployment
Quick EAD Deployment Configuration
Configuring Quick EAD Deployment
Quick EAD Deployment Overview
Dot1x url url-string
Configuring a free IP range
Setting the ACL timeout period
Dot1x free-ip ip-address
Displaying and Maintaining Quick EAD Deployment
Quick EAD Deployment Configuration Example
Period is 30 minutes
Troubleshooting
Solution
Configuring the System-Guard Feature
System-Guard Configuration
Configuring the System-Guard Feature
System-Guard Overview
Displaying and Maintaining System-Guard
Table of Contents
Page
AAA Overview
Authentication
Authorization
Introduction to AAA
Accounting
Introduction to AAA Services
What is Radius
Introduction to ISP Domain
Basic message exchange procedure in Radius
1Databases in a Radius server
Direction client-server
Radius message format
Code Message type Message description
Client transmits this message to the server to determine if
Type field value Attribute type
What is Hwtacacs
Introduction to Hwtacacs
Basic message exchange procedure in Hwtacacs
5Network diagram for a typical Hwtacacs application
6AAA implementation procedure for a telnet user
Page
AAA Configuration Task List
AAA Configuration
Configuration Introduction
Creating an ISP Domain and Configuring Its Attributes
Messenger time enable limit
Configuring an AAA Scheme for an ISP Domain
Configuring a combined AAA scheme
Self-service-url disable
Radius-scheme-name local
Configuring separate AAA schemes
Domain isp-name
Hwtacacs-scheme
Local local none Authorization none
Configuring Dynamic Vlan Assignment
Accounting none
Vlan-assignment-mode
Configuring the Attributes of a Local User
Domain isp-name
Integer string
Authorization vlan string
Password-display-mode
Service-type ftp lan-access
Access-limit
Follow these steps to cut down user connections forcibly
Radius Configuration Task List
Cutting Down User Connections Forcibly
Cut down user
Configuring
Servers
Creating a Radius Scheme
Configuring Radius Authentication/Authorization Servers
Radius client enable
Radius scheme
Secondary authentication
Configuring Radius Accounting Servers
Primary authentication
Ip-address port-number
Stop-accounting-buffer
Configuring Shared Keys for Radius Messages
Secondary accounting
Retry stop-accounting
Key authentication string
Configuring the Type of Radius Servers to be Supported
Key accounting string
Server-type extended
Configuring the Status of Radius Servers
Optional Servers to be supported
Calling-station-id mode
State primary authentication
Authentication block
Block active
Key password
Configuring the Local Radius Authentication Server Function
Local-server enable
Local-server nas-ip ip-address
Configuring Timers for Radius Servers
Enabling the User Re-Authentication at Restart Function
Accounting-on enable send
Hwtacacs Configuration Task List
Times interval interval
Creating a Hwtacacs Scheme
Configuring Tacacs Authentication Servers
Hwtacacs scheme
Secondary authorization
Configuring Tacacs Authorization Servers
Primary authorization
Ip-address port
Follow these steps to configure Tacacs accounting servers
Configuring Tacacs Accounting Servers
Configuring Shared Keys for Hwtacacs Messages
Function is enabled Number of transmission
Mega-byte
Authentication string
Key accounting
Data-flow-format packet
Optional By default, the response timeout Tacacs servers
Configuring the Timers Regarding Tacacs Servers
Scheme exists Set the response timeout time
Optional By default, the real-time Interval
Displaying and maintaining AAA information
Displaying and Maintaining AAA
Displaying and maintaining Radius protocol information
Remote Radius Authentication of Telnet/SSH Users
AAA Configuration Examples
Displaying and maintaining Hwtacacs protocol information
# Configure a Radius scheme
# Adopt AAA authentication for Telnet users
# Configure an ISP domain
# Associate the ISP domain with the Radius scheme
Local Authentication of FTP/Telnet Users
# Create and configure a local user named telnet
Hwtacacs Authentication and Authorization of Telnet Users
# Configure the domain name of the Hwtacacs scheme to hwtac
Troubleshooting Hwtacacs Configuration
Troubleshooting AAA
Troubleshooting Radius Configuration
Possible reasons and solutions
Introduction to EAD
EAD Configuration
Typical Network Application of EAD
Security-policy-server
EAD Configuration
EAD Configuration Example
Ip-address
# Configure the IP address of the security policy server
# Associate the domain with the Radius scheme
Table of Contents
Performing MAC Authentication on a Radius Server
MAC Authentication Configuration
MAC Authentication Overview
Performing MAC Authentication Locally
Mac-authentication
Configuring Basic MAC Authentication Functions
MAC Authentication Timers
Related Concepts
Mac-authentication authmode
Mac-authentication interface
Mac-authentication Quit
Uppercase fixedpassword password
MAC Address Authentication Enhanced Function Configuration
Configuring a Guest Vlan
Guest-vlan vlan-id
Mac-authentication timer
Guest-vlan-reauth interval
MAC address authentication Number of MAC address
Configure the maximum number
Max-auth-num user-number
Display mac-authentication
Displaying and Maintaining MAC Authentication
MAC Authentication Configuration Example
Reset mac-authentication statistics
# Specify to perform local authentication
# Add a local user Specify the username and password
Set the service type to lan-access
# Add an ISP domain named aabbcc.net
Table of Contents
IP Address Classes
IP Addressing Configuration
IP Addressing Overview
Net-id
Subnetting and Masking
Special Case IP Addresses
Class Address range Remarks
Ip address ip-address mask
Configuring IP Addresses
Mask-length sub
Displaying and Maintaining IP Addressing
IP Address Configuration Examples
IP Address Configuration Example
Network requirement
4Network diagram for IP address configuration
Page
Configuring IP Performance
IP Performance Configuration
IP Performance Overview
Disabling Sending of Icmp Error Packets
Displaying and Maintaining IP Performance Configuration
Table of Contents
Dhcp IP Address Assignment
Dhcp Overview
Introduction to Dhcp
IP Address Assignment Policy
Obtaining IP Addresses Dynamically
Dhcp Packet Format
Updating IP Address Lease
Protocols and Standards
Usage of Dhcp Relay Agent
Dhcp Relay Agent Configuration
Introduction to Dhcp Relay Agent
Dhcp Relay Agent Fundamentals
Dhcp Relay Agent Support for Option
Padding content of Option
Introduction to Option
2Padding contents for sub-option 1 of Option
Mechanism of Option 82 supported on Dhcp relay agent
Dhcp-server groupNo ip
Configuring the Dhcp Relay Agent
Dhcp Relay Agent Configuration Task List
Ip-address &1-8
Configuring Dhcp Relay Agent Security Functions
Configuring address checking
Dhcp-security static ip-address
Address-check enable
Dhcp relay hand enable
Mac-address
Enabling unauthorized Dhcp server detection
Configuring the Dhcp Relay Agent to Support Option
Configuring the Dhcp relay agent to support Option
Prerequisites
Displaying and Maintaining Dhcp Relay Agent Configuration
Dhcp Relay Agent Configuration Example
Solution
Troubleshooting Dhcp Relay Agent Configuration
Symptom
Analysis
Page
Dhcp Snooping Overview
Dhcp Snooping Configuration
Function of Dhcp Snooping
Padding content and frame format of Option
Overview of Dhcp Snooping Option
Mechanism of DHCP-snooping Option
2Extended format of the circuit ID sub-option
Dhcp-snooping information format command or the default HEX
Dhcp-snooping information format command or
Sub-option configuration Dhcp snooping device will…
Overview of IP Filtering
DHCP-snooping table
Dhcp Snooping Configuration
Configuring Dhcp Snooping
IP static binding table
Enable DHCP-snooping Option 82 support
Configuring Dhcp Snooping to Support Option
DHCP-Snooping Option 82 Support Configuration Task List
Required Specify the current port as a
Dhcp-snooping information
Configure a handling policy for Dhcp packets with Option
Configure the storage format of Option
Strategy drop keep replace
Vlan vlan-id circuit-id string
Configure the circuit ID sub-option
Configure the remote ID sub-option
String
Remote-id sysname string
Configuring IP Filtering
Configure the padding format for Option
Vlan vlan-id remote-id
Dhcp Snooping Configuration Example
DHCP-Snooping Option 82 Support Configuration Example
# Enable DHCP-snooping Option 82 support
IP Filtering Configuration Example
# Enable Dhcp snooping on Switch
# Specify GigabitEthernet 1/0/5 as the trusted port
7Network diagram for IP filtering configuration
# Specify GigabitEthernet 1/0/1 as the trusted port
Trust
Displaying and Maintaining Dhcp Snooping Configuration
Display dhcp-snooping
Display ip source static
Configuring a DHCP/BOOTP Client
DHCP/BOOTP Client Configuration
Introduction to Bootp Client
Follow these steps to configure a DHCP/BOOTP client
Ip address bootp-alloc
Dhcp Client Configuration Example
Dhcp-alloc
Bootp client
Displaying and Maintaining DHCP/BOOTP Client Configuration
Display bootp client interface
Display related information on a
Table of Contents
ACL Overview
ACL Configuration
ACL Matching Order
Depth-first match order for rules of an advanced ACL
Ways to Apply an ACL on a Device
Depth-first match order for rules of a basic ACL
Being applied to the hardware directly
Configuring Time Range
ACL Configuration
Types of ACLs Supported by Devices
End-time end-date from start-time start-date to
Time-range time-name start-time to end-time
Days-of-the-week from start-time start-date to
End-time end-date to end-time end-date
Auto config
Configuring Basic ACL
Rule-string Rule-string , refer to ACL Command
Rule-string , refer to ACL Command
Configuring Advanced ACL
Match-order auto config
Rule rule-id permit deny
Configuring Layer 2 ACL
Rule-string Refer to ACL Command
ACL Assignment
Assigning an ACL to a Vlan
Configure procedure
Assigning an ACL Globally
Packet-filter inbound acl-rule
System-view Packet-filter vlan vlan-id
Assigning an ACL to a Port Group
Inbound acl-rule
Displaying and Maintaining ACL
Assigning an ACL to a Port
SwitchPC
Example for Controlling Telnet Login Users by Source IP
Example for Controlling Web Login Users by Source IP
Examples for Upper-layer Software Referencing ACLs
Advanced ACL Configuration Example
Basic ACL Configuration Example
Examples for Applying ACLs to Hardware
Layer 2 ACL Configuration Example
# Apply ACL 3000 on GigabitEthernet 1/0/1
Example for Applying an ACL to a Vlan
# Apply ACL 4000 on GigabitEthernet 1/0/1
# Apply ACL 3000 to Vlan
Table of Contents
Page
Introduction to QoS
QoS Configuration
Traditional Packet Forwarding Service
New Applications and New Requirements
Major Traffic Control Techniques
QoS Supported by Devices
Traffic Classification
IP precedence, ToS precedence, and Dscp precedence
Precedence
IP Precedence decimal IP Precedence binary Description
802.1p priority
Dscp value decimal Dscp value binary Description
Priority Trust Mode
802.1p priority decimal 802.1p priority binary Description
Trusting the 802.1p precedence
Trusting the Dscp precedence
Dscp precedence Target Dscp precedence
Traffic Policing and Traffic Shaping
Protocol Priority
Priority Marking
Token bucket
Traffic policing
Evaluating the traffic with the token bucket
Traffic shaping
Vlan Mapping
Traffic Redirecting
Queue Scheduling
7Diagram for SP queuing
SP queuing
Sdwrr
Flow-based Traffic Accounting
QoS Configuration
QoS Configuration Task List
Burst
Priority-trust cos automap
Configuring Priority Trust Mode
Priority priority-level
Priority-trust dscp automap
Qos cos-local-precedence-map
Configuring Priority Mapping
Qos cos-drop-precedence-map
Qos dscp-drop-precedence-map dscp-list
Qos cos-dscp-map cos0-map-dscp
Qos dscp-local-precedence-map dscp-list
Qos dscp-cos-map dscp-list cos-value
Page
Protocol-type
Setting the Priority of Protocol Packets
System-view Protocol-priority
Ip-precedence
Dscp-value cos cos-value
Marking Packet Priority
Traffic-priority inbound acl-rule dscp
Traffic-priority vlan vlan-id inbound acl-rule
Configuring Traffic Policing
Required Matching specific ACL rules
Traffic-limit inbound acl-rule target-rate
Reset traffic-limit inbound acl-rule
Reset traffic-limit vlan vlan-id inbound
Conform con-action exceed
By default, traffic policing is Policing
Configuring Traffic Shaping
View Configure traffic
Disabled Clear the traffic
Traffic-shape queue
Configuring Traffic Redirecting
Configuration examples
Traffic-redirect inbound acl-rule interface
Traffic-redirect vlan vlan-id inbound acl-rule
Traffic-remark-vlanid inbound
Configuring Vlan Mapping
Configuring Queue Scheduling
Acl-rule remark-vlan vlan-id
Undo queue-scheduler queue-id
Queue-id queue-weight &1-8
Group2 queue-id queue-weight
Queue-scheduler wrr group1
Collect the statistics on Packets matching specific ACL
Reset traffic-statistic inbound
Collecting/Clearing Traffic Statistics
Traffic-statistic inbound acl-rule
Reset traffic-statistic inbound acl-rule
Reset traffic-statistic vlan vlan-id
Traffic-statistic vlan vlan-id
Enabling the Burst Function
Configuring Traffic Mirroring
Follow these steps to enable the burst function
Refer to Burst for information about the burst function
Monitor-interface
Monitor-port
Mirrored-to inbound acl-rule
Mirrored-to vlan vlan-id
Required Destination port Exit current view
Traffic mirroring configuration
Required Mirroring for packets that
Displaying and Maintaining QoS
QoS Configuration Example
Configuration Example of Traffic Policing
Page
Dynamic application mode
QoS Profile Configuration
QoS Profile Application Mode
Manual application mode
Configuring a QoS Profile
QoS Profile Configuration
QoS Profile Configuration Task List
Applying a QoS Profile
Undo qos-profile port-based
Displaying and Maintaining QoS Profile
Qos-profile port-based
System-view Apply qos-profile
QoS Profile Configuration Example
1Network diagram for QoS profile configuration
# Enable
Table of Contents
Mirroring Configuration
Mirroring Overview
Local Port Mirroring
Remote Port Mirroring
VLAN-Based Mirroring
Switch Ports involved Function
MAC-Based Mirroring
1Ports involved in the mirroring operation
Mirroring Configuration
Configuring Local Port Mirroring
Configuring Remote Port Mirroring
Configuration on the device acting as a source switch
Configuration on the device acting as a destination switch
Remote-destination
Configuring MAC-Based Mirroring
Remote-probe-vlan-id
Monitor-port monitor-port
Local remote-source
Configuring VLAN-Based Mirroring
Mirroring-group group-id Mirroring-mac mac vlan
Displaying and Maintaining Port Mirroring
Mirroring Configuration Example
Local Port Mirroring Configuration Example
Mirroring-group group-id Mirroring-vlan vlan-id
Remote Port Mirroring Configuration Example
Configure Switch C # Create a local mirroring group
4Network diagram for remote port mirroring
# Configure Vlan 10 as the remote-probe Vlan
# Configure Vlan 10 as the remote-probe Vlan
Page
Table of Contents
ARP Function
ARP Configuration
Introduction to ARP
ARP Message Format
Experimental Ethernet
Field Description
Value Description
Proteon ProNET Token Ring
ARP Process
ARP entry Generation Method Maintenance Mode
ARP Table
Chaos
Man-in-the-middle attack
Introduction to ARP Attack Detection
ARP attack detection
Arp timer aging aging-time
Configuring ARP
Configuring ARP Basic Functions
Introduction to Gratuitous ARP
Arp detection enable
Configuring ARP Attack Detection
Arp check enable
Arp detection trust
Arp restricted-forwarding
Configuring Gratuitous ARP
Gratuitous-arp-learning
ARP Attack Detection Configuration Example
ARP Configuration Example
ARP Basic Configuration Example
Displaying and Maintaining ARP
# Enable Dhcp snooping on Switch a
# Enable ARP attack detection on all ports in Vlan
Table of Contents
Snmp Operation Mechanism
Snmp Configuration
Snmp Overview
Snmp Versions
MIB II based on TCP/IP network device RFC
MIB attribute MIB content Related RFC
Supported MIBs
Public MIB
Snmp-agent
Configuring Basic Snmp Functions
Configuring basic Snmp functions for SNMPv1 or SNMPv2c
Snmp-agent sys-info
Configuring basic Snmp functions for SNMPv3
Configuring Trap Parameters
Configuring Basic Trap
Configuring Extended Trap
Enabling Logging for Network Management
Snmp Configuration Examples
Snmp Configuration Examples
Displaying and Maintaining Snmp
Network procedure
2Network diagram for Snmp configuration
Configuring the NMS
Introduction to Rmon
Rmon Configuration
Working Mechanism of Rmon
Commonly Used Rmon Groups
Rmon Configuration
Configuration procedures
Rmon Configuration Examples
Displaying and Maintaining Rmon
# Display the Rmon extended alarm entry numbered
Table of Contents
Multicast Overview
Information Transmission in the Unicast Mode
Multicast Overview
Information Transmission in the Broadcast Mode
1Information transmission in the unicast mode
Information Transmission in the Multicast Mode
2Information transmission in the broadcast mode
3Information transmission in the multicast mode
Roles in Multicast
Advantages of multicast
Multicast Models
Advantages and Applications of Multicast
Application of multicast
SFM model
Multicast Architecture
ASM model
SSM model
Class D address range Description
IP multicast address
Reserved multicast addresses IP addresses for permanent
Ethernet multicast MAC address
Multicast Protocols
Layer 3 multicast protocols
Layer 2 multicast protocols
5Positions of Layer 3 multicast protocols
Multicast Packet Forwarding Mechanism
Implementation of the RPF Mechanism
RPF Check
7RPF check process
Page
Principle of Igmp Snooping
Igmp Snooping Configuration
Igmp Snooping Overview
Basic Concepts in Igmp Snooping
Timer Description Message before Action after expiry Expiry
Work Mechanism of Igmp Snooping
When receiving a membership report
When receiving a general query
When receiving a leave message
Igmp Snooping Configuration Task List
Igmp Snooping Configuration
Complete the following tasks to configure Igmp Snooping
Enabling Igmp Snooping
Configuring the Version of Igmp Snooping
Igmp-snooping enable
Igmp-snooping version
Configuring Fast Leave Processing
Configuring Timers
Enabling fast leave processing in system view
Required By default, the fast leave For specific VLANs
Configuring a Multicast Group Filter
Enable fast leave processing
Enabling fast leave processing in Ethernet port view
Igmp -snooping group -policy
Configuring a multicast group filter in system view
Configuring a multicast group filter in Ethernet port view
Acl-number vlan vlan-list
Igmp-snooping group-limit limit
Configuring Igmp Querier
Vlan vlan list overflow-replace
Configuring Static Member Port for a Multicast Group
Suppressing Flooding of Unknown Multicast Traffic in a Vlan
Vlan interface view
Configuring a Static Router Port
Ethernet port view
Multicast static-group
Igmp host-join group-address
Configuring a Port as a Simulated Group Member
Vlan view
Source-ip source-address
Configuring Multicast Vlan
Configuring a Vlan Tag for Query Messages
Vlan-mapping vlan
Hybrid Port hybrid vlan vlan-id-list
Igmp enable
Service-type multicast
Port trunk permit vlan vlan-list
Configuring Igmp Snooping
Igmp Snooping Configuration Examples
Displaying and Maintaining Igmp Snooping
3Network diagram for Igmp Snooping configuration
Configure Switch a # Enable Igmp Snooping globally
Interface IP address of Vlan 20 is
Device Device description Networking description
GigabitEthernet 1/0/1 is connected to the workstation
4Network diagram for multicast Vlan configuration
# Configure Vlan
Troubleshooting Igmp Snooping
Symptom Multicast function does not work on the device
Configuring a Multicast MAC Address Entry
Common Multicast Configuration
Common Multicast Configuration
Mac-address multicast
Unknown-multicast drop
Displaying and Maintaining Common Multicast Configuration
Configuring Dropping Unknown Multicast Packets
Display mac-address multicast
Table of Contents
Introduction to NTP
NTP Configuration
Applications of NTP
Implementation Principle of NTP
NTP Implementation Modes
1Implementation principle of NTP
Symmetric peer mode
Server/client mode
Broadcast mode
Multicast mode
NTP implementation Configuration on the device Mode
Configuring NTP Server/Client Mode
NTP Configuration Task List
Configuring NTP Implementation Modes
Complete the following tasks to configure NTP
Configuring the NTP Symmetric Peer Mode
Ntp-service broadcast-server
Configuring NTP Broadcast Mode
Configure the device to work
NTP broadcast server
Configuring the device to work in the multicast server mode
Configuring NTP Multicast Mode
Configuring the device to work in the multicast client mode
Ntp-service access peer
Configuring Access Control Right
Configuring NTP Authentication
Server synchronization
Configuring NTP authentication on the client
Role of device Working mode
Configuring NTP authentication on the server
Mode and NTP multicast Broadcast
Configuring Optional NTP Parameters
Configure on NTP Broadcast Server
While Configuring
Disabling an Interface from Receiving NTP messages
Displaying and Maintaining NTP Configuration
NTP Configuration Examples
Max-dynamic-sessions
# Set Device a as the NTP server of Device B
Configure Device C # Set Device a as the NTP server
Configuring NTP Symmetric Peer Mode
# Set Device C as the peer of Device B
8Network diagram for the NTP broadcast mode configuration
Configure Device C # Enter system view
# Set Device a as a broadcast client
9Network diagram for NTP multicast mode configuration
Configure Device B # Enter system view
Configuring NTP Server/Client Mode with Authentication
# Enable the NTP authentication function
# Specify the key 42 as a trusted key
Table of Contents
Introduction to SSH
SSH Configuration
SSH Overview
Algorithm and Key
SSH Operating Process
Asymmetric Key Algorithm
Stages Description
Version negotiation
Authentication negotiation
Key negotiation
Session request
Configuring the SSH Server
Data exchange
Authentication-mode scheme
SSH Server Configuration Tasks
Configuring the Protocol Support for the User Interface
Command-authorization
Generating/Destroying a RSA or DSA Key Pair
Creating an SSH User and Specify an Authentication Type
Exporting the RSA or DSA Public Key
Ssh user username service-type
Specifying a Service Type for an SSH User
Configuring SSH Management
Stelnet sftp all
Configuring the Client Public Key on the Server
Peer-public-key end
Public-key-code end
Rsa peer-public-key keyname
Ssh user username assign
Assigning a Public Key to an SSH User
Specifying a Source IP Address/Interface for the SSH Server
Publickey rsa-key keyname
SSH Client Configuration Tasks
Configuring the SSH Client
Configuring the SSH Client Using an SSH Client Software
Generate a client key
2Generate a client key
4Generate the client keys
Specify the IP address of the Server
Launch PuTTY.exe. The following window appears
Select an SSH version
Select a protocol for remote connection
As shown in -7, select SSH under Protocol
Open an SSH connection with publickey authentication
8SSH client configuration interface
10SSH client interface
Open an SSH connection with password authentication
Configuring the SSH Client on an SSH2-Capable Device
Configure whether first-time authentication is supported
Establish the connection between the SSH client and server
Ssh2 source-ip ip-address
Displaying and Maintaining SSH Configuration
Specifying a Source IP address/Interface for the SSH client
Ssh2 source-interface
# Enable the user interfaces to support SSH
SSH Configuration Examples
# Generate RSA and DSA key pairs
Page
14SSH client interface
# Set the client’s command privilege level to
# Assign the public key Switch001 to client client001
Page
18Generate a client key pair
Page
22SSH client interface
Device system-view Device interface vlan-interface
# Establish a connection to the server
# Assign the public key Switch001 to user client001
# Set the user command privilege level to
# Generate a DSA key pair
25Network diagram of SSH client configuration
# Configure the user interfaces to support SSH
# Set AAA authentication on user interfaces
# Assign public key Switch001 to user client001
# Specify the host public key pair name of the server
# Establish the SSH connection to server
Table of Contents
File System Configuration Tasks
File System Management Configuration
File System Configuration
Introduction to File System
File Operations
Execute filename
Prompt Mode Configuration
Flash Memory Operations
Format device
File System Configuration Example
File prompt alert quiet
Attribute Description Feature Identifier
File Attribute Configuration
Introduction to File Attributes
Configuring File Attributes
Table of Contents
Introduction to FTP
FTP and Sftp Configuration
Introduction to FTP and Sftp
Description Remarks
Service-type ftp
FTP Configuration
FTP Configuration The Device Operating as an FTP Server
Introduction to Sftp
Ftp timeout minutes
Configuring connection idle time
Enabling an FTP server
Ftp-server source-ip ip-address
Disconnecting a specified user
Ftp-server source-interface
Ftp disconnect user-name
Configuring the banner for an FTP server
Basic configurations on an FTP client
FTP Configuration The Device Operating as an FTP Client
Displaying FTP server information
Disconnect
Cdup
Lcd
Close
Configuration Example The Device Operating as an FTP Server
# Upload the config.cfg file. ftp put config.cfg
FTP Banner Display Configuration Example
4Network diagram for FTP banner display configuration
# Enter the authorized directory on the FTP server
Complete the following tasks to configure Sftp
Sftp Configuration
Sftp Configuration The Device Operating as an Sftp Server
Follow these steps to enable an Sftp server
Ftp timeout time-out-value
Sftp Configuration The Device Operating as an Sftp Client
Basic configurations on an Sftp client
Time for the Sftp server Minutes by default
Delete remotefile
Help all command-name
Sftp host-ip host-name
Remove remote-file
Sftp source-ip ip-address
Sftp Configuration Example
Sftp source-interface
Display sftp source-ip
# Enable the Sftp server
# Specify the SSH authentication mode as AAA
# Specify the service type as Sftp
# Create a local user client001
Sftp-client
# Exit Sftp
Complete the following tasks to configure Tftp
Tftp Configuration
Tftp Configuration
Introduction to Tftp
Tftp ascii binary
Tftp Configuration The Device Operating as a Tftp Client
Basic configurations on a Tftp client
Tftp-server acl acl-number
Tftp source-ip ip-address
Tftp Configuration Example
Tftp source-interface
Display tftp source-ip
Device tftp 1.1.1.2 get config.cfg config.cfg
Table of Contents
Introduction to Information Center
Information Center
Information Center Overview
Classification of system information
Ten channels and six output directions of system information
Outputting system information by source module
Module name Description
System Information Format
Timestamp
Priority
Sysname
Information Center Configuration
Introduction to the Information Center Configuration Tasks
Configuring Synchronous Information Output
Set for the system
Setting to Output System Information to the Console
Setting to output system information to the console
Terminal debugging
Enabling system information display on the console
Terminal monitor
Terminal logging
Enabling system information display on a monitor terminal
Setting to Output System Information to a Monitor Terminal
Setting to output system information to a monitor terminal
Info-center monitor channel
Info-center loghost
Setting to Output System Information to a Log Host
Info-center loghost source
Info-center trapbuffer
Setting to Output System Information to the Trap Buffer
Setting to Output System Information to the Log Buffer
Info-center source
Info-center logbuffer
Setting to Output System Information to the Snmp NMS
Info-center snmp channel
Displaying and Maintaining Information Center
Information Center Configuration Examples
Log Output to a Unix Log Host
# mkdir /var/log/Switch # touch /var/log/Switch/information
2Network diagram for log output to a Linux log host
Log Output to a Linux Log Host
3Network diagram for log output to the console
Log Output to the Console
# Enable terminal display
4Network diagram
Table of Contents
Loading procedure using FTP client
Host Configuration File Loading
Remote Loading Using FTP
Introduction to Loading Approaches
Loading procedure using FTP server
Restart Switch
2Remote loading using FTP server
Use the put command to upload the file config.cfg to Switch
Remote Loading Using Tftp
Basic System Configuration and Debugging
Basic System Configuration
Enabling/Disabling System Debugging
Displaying the System Status
Debugging the System
Display clock
Displaying Debugging Status
Displaying Operating Information about Modules in System
Ping
Network Connectivity Test
Network Connectivity Test
Tracert
Rebooting the Device
Device Management Configuration
Device Management Configuration Tasks
Device Management
Schedule reboot delay
Scheduling a Reboot on the Device
Schedule reboot at hhmm
Schedule reboot regularity
Introduction to pluggable transceivers
Identifying and Diagnosing Pluggable Transceivers
Identifying pluggable transceivers
Diagnosing pluggable transceivers
Table of Contents
VLAN-VPN Overview
VLAN-VPN Configuration
Introduction to VLAN-VPN
Adjusting the Tpid Values of VLAN-VPN Packets
Implementation of VLAN-VPN
Enabling the VLAN-VPN Feature for a Port
VLAN-VPN Configuration
Protocol type Value
Displaying and Maintaining VLAN-VPN
Tpid Adjusting Configuration
Vlan-vpn uplink enable
Vlan-vpn tpid value
VLAN-VPN Configuration Example
4Network diagram for VLAN-VPN configuration
SwitchA vlan-vpn tpid
Data transfer process
Page
Selective QinQ Overview
Selective QinQ Configuration
Selective QinQ Overview
Inner-to-Outer Tag Priority Mapping
Selective QinQ Configuration
Enabling the Selective QinQ Feature for a Port
Vlan-vpn vid vlan-id
Processing Private Network Packets by Their Types
Selective QinQ Configuration Example
Configuring the Inner-to-Outer Tag Priority Mapping Feature
Vlan-vpn priority
2Network diagram for selective QinQ configuration
# Enable the VLAN-VPN feature on GigabitEthernet 1/0/3
SwitchA-GigabitEthernet1/0/3 vlan-vpn enable
Page
Table of Contents
HWPing Overview
HWPing Configuration
Introduction to HWPing
Supported test types Description
Test Types Supported by HWPing
HWPing Test Parameters
Test parameter Description
Dns
Username and password
Dns-server
Configuration on a HWPing Server
HWPing Configuration
HWPing server configuration tasks
HWPing server configuration
HWPing Client Configuration
HWPing client configuration
Count times
Timeout time
Test-enable
Datasize size
Source-port port-number
Test-type dhcp
Test-type ftp
Username name
Password password
Ftp-operation get put
Filename file-name
Test-type http
Destination-ip command to
Dns-server ip-address
Http-operation get post
Destination-port
Test-type jitter
Jitter-interval interval
Jitter-packetnum number
Test-type snmpquery
Operation- tag
Configure the destination Configured on the HWPing
Server for listening services
This IP address and the one
Test-type tcpprivate
Hwping-server
Tcpconnect ip-address7
Tcppublic
Test-type udpprivate
Udppublic
Address is specified
Time Three seconds Optional Configure the service type
Test-type dns
Configuring HWPing client to send Trap messages
Displaying and Maintaining HWPing
HWPing Configuration Example
Administrator-name operation-tag
Icmp Test
Dhcp Test
# Display test results
# Configure the test type as dhcp
FTP Test
# Set the probe timeout time to 30 seconds
# Configure the source IP address
# Configure the IP address of the Http server as
# Configure the test type as http
Http Test
Jitter Test
# Configure the test type as jitter
Network diagram
Configure HWPing Client Switch a # Enable the HWPing client
# Configure the IP address of the HWPing server as
Snmp Test
7Network diagram for the Snmp test
# Configure the test type as snmp
8Network diagram for the Tcpprivate test
TCP Test Tcpprivate Test on the Specified Ports
# Configure the test type as tcpprivate
# Configure the test type as udpprivate
UDP Test Udpprivate Test on the Specified Ports
DNS Test
# Configure the test type as dns
# Configure the IP address of the DNS server as
Index
Table of Contents
Dynamic Domain Name Resolution
DNS Configuration
Static Domain Name Resolution
Resolution procedure
Configuring Static Domain Name Resolution
Configuring Domain Name Resolution
DNS suffixes
Configuring Dynamic Domain Name Resolution
DNS Configuration Example
Static Domain Name Resolution Configuration Example
Dynamic Domain Name Resolution Configuration Example
2Network diagram for static DNS configuration
# Configure the IP address 2.1.1.2 for the DNS server
# Configure com as the DNS suffix
Troubleshooting DNS Configuration
Displaying and Maintaining DNS
Table of Contents
Basic Concepts in Smart Link
Smart Link Configuration
Smart Link Overview
Smart Link group
Flush message
Master port
Slave port
Control Vlan for sending flush messages
Complete the following tasks to configure Smart Link
Configuring Smart Link
Operating Mechanism of Smart Link
Configuring a Smart Link Device
Flush enable control-vlan
Configuring Associated Devices
Precautions
Smart-link flush enable control-vlan vlan-id port
Implementing Link Redundancy Backup
Smart Link Configuration Example
Displaying and Maintaining Smart Link
# Configure to send flush messages within Vlan
# Return to system view
SwitchD system-view
Monitor Link Configuration
Introduction to Monitor Link
2Network diagram for a Monitor Link group implementation
How Monitor Link Works
Configuring the Uplink Port
Configuring Monitor Link
Creating a Monitor Link Group
Uplink
Configuring a Downlink Port
Port monitor-link group
Monitor Link Configuration Example
Displaying and Maintaining Monitor Link
# Configure to send flush messages in Vlan
# Create Smart Link group 1 and enter Smart Link group view
SwitchC monitor-link group
Table of Contents
Introduction to PoE
PoE Configuration
PoE Overview
Advantages of PoE
PoE Configuration Task List
PoE Configuration
PoE Features Supported by the Device
Maximum Power Provided by Each Electrical Port
Poe enable
Enabling the PoE Feature on a Port
Setting the Maximum Output Power on a Port
Poe max-power max-power
Poe power-management
Setting PoE Management Mode and PoE Priority of a Port
Setting the PoE Mode on a Port
Poe priority critical high
Poe update refresh
Configuring the PD Compatibility Detection Function
Poe legacy enable
Upgrading the PSE Processing Software Online
PoE Configuration Example
PoE Configuration Example
Displaying and Maintaining PoE Configuration
Networking requirements
1Network diagram for PoE
# Upgrade the PSE processing software online
Configuring PoE Profile
PoE Profile Configuration
PoE Profile Configuration
Introduction to PoE Profile
Display poe-profile
Displaying and Maintaining PoE Profile Configuration
PoE Profile to Port
All-profile interface
PoE Profile Application Example
PoE Profile Configuration Example
# Create Profile1, and enter PoE profile view
# Display detailed configuration information for Profile2
# Display detailed configuration information for Profile1
# Create Profile2, and enter PoE profile view
Table of Contents
Page
IP Route
IP Routing Protocol Overview
Introduction to IP Route and Routing Table
Routing Table
Page
Classification of Dynamic Routing Protocols
Routing Protocol Overview
Static Routing and Dynamic Routing
Routing Protocols and Routing Priority
Routing Information Sharing
Load Sharing and Route Backup
Route backup
Load sharing
Displaying and Maintaining a Routing Table
Introduction to Static Route
Static Route Configuration
Static Route
Default Route
Static Route Configuration
Configuring a Static Route
Static Route Configuration Example
Displaying and Maintaining Static Routes
# Approach 1 Configure static routes on Switch B
Troubleshooting a Static Route
# Approach 2 Configure a static route on Switch a
# Approach 2 Configure a static route on Switch B
Basic Concepts
RIP Configuration
RIP Overview
RIP routing database
RIP Startup and Operation
RIP timers
Routing loops prevention
Configuring Basic RIP Functions
RIP Configuration Task List
Basic RIP Configuration
Rip
RIP Route Control
Setting the RIP operating status on an interface
Specifying the RIP version on an interface
Configuring RIP route summarization
Configuring RIP Route Control
Setting the additional routing metrics of an interface
Rip metricin value
Configuring RIP to filter incoming/outgoing routes
Disabling the router from receiving host routes
RIP Network Adjustment and Optimization
Setting RIP preference
Configuring split horizon
Configuration Tasks
Configuring RIP timers
Configuring RIP-1 packet zero field check
Rip authentication-mode
Setting RIP-2 packet authentication mode
Configuring RIP to unicast RIP packets
Simple password md5
Displaying and Maintaining RIP Configuration
RIP Configuration Example
Configure Switch B # Configure RIP
Troubleshooting RIP Configuration
Failed to Receive RIP Updates
Configure Switch C # Configure RIP
Introduction to IP Route Policy
IP Route Policy Configuration
IP Route Policy Overview
Filters
For ACL configuration, refer to the part discussing ACL
IP Route Policy Configuration Task List
Route Policy Configuration
Route policy
Defining a Route Policy
Defining if-match Clauses and apply Clauses
If-match ip next-hop acl
IP Route Policy Configuration Example
Displaying and Maintaining IP Route Policy
Apply cost value
Configuration considerations
SwitchC-acl-basic-2000 quit SwitchC acl number
Configuration verification
Troubleshooting IP Route Policy
Precautions
Table of Contents
Introduction to UDP Helper
UDP Helper Configuration
Protocol UDP port number
Configuring UDP Helper
Displaying and Maintaining UDP Helper
UDP Helper Configuration Example
# Enable UDP Helper on Switch a
Cross-Network Computer Search Through UDP Helper
Table of Contents
Appendix a Acronyms
Protocol Independent Multicast-Dense Mode
Medium Access Control
Non Broadcast MultiAccess
Protocol Independent Multicast-Sparse Mode