EasyManua.ls Logo

Huawei Quidway S3000-EI Series User Manual

Huawei Quidway S3000-EI Series
383 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
HUAWEI
1. Getting Started
2. Port
3. VLAN
4. Multicast
5. QoS/ACL
6. Integrated Management
7. STP
8. Security
9. Network Protocol
10. System Management
11. Remote Power-feeding
12. Appendix
Quidway S3000-EI Series Ethernet Switches
Operation Manual
VRP3.10
Huawei Technologies Proprietary

Table of Contents

Other manuals for Huawei Quidway S3000-EI Series

Question and Answer IconNeed help?

Do you have a question about the Huawei Quidway S3000-EI Series and is the answer not in the manual?

Huawei Quidway S3000-EI Series Specifications

General IconGeneral
BrandHuawei
ModelQuidway S3000-EI Series
CategorySwitch
LanguageEnglish

Summary

Getting Started

Port

Configuration of Ethernet ports, including setup, enable/disable, and description settings.

VLAN

Configuration and management of Virtual Local Area Networks (VLANs) for network segmentation.

Multicast

Configuration and management of multicast protocols and services for efficient data distribution.

QoS/ACL

Quality of Service and Access Control List configuration for network traffic management and security.

Integrated Management

Configuration and management of integrated system features for overall network control.

STP

Spanning Tree Protocol configuration for preventing network loops and ensuring loop-free topology.

Security

Configuration of security features to protect the network from unauthorized access and threats.

Network Protocol

Configuration and management of various network protocols for optimal network operation.

System Management

Configuration and management of system-level settings for device operation and maintenance.

Remote Power-feeding

Configuration and management of remote power feeding capabilities, including PoE settings.

Appendix

Supplementary information and reference materials for the manual.

Chapter 1 Product Overview

1.1 Product Overview

General introduction to the Quidway S3000-EI Series Ethernet Switches and their types.

1.2 Function Features

Detailed description of the functional capabilities and features supported by the switches.

Chapter 2 Logging in Switch

2.1 Setting up Configuration Environment via the Console Port

Steps to set up the local configuration environment using the console port for switch access.

2.2 Setting up Configuration Environment through Telnet

Procedure for setting up remote configuration access using Telnet for switch management.

2.2.1 Connecting a PC to the Switch through Telnet

Instructions for connecting a PC to the switch via Telnet for configuration.

2.2.2 Telneting a Switch through another Switch

Configuration steps for accessing a switch via Telnet through another switch in the network.

2.3 Setting up Configuration Environment through a Dial-up the Modem

Procedure for setting up remote configuration using a dial-up modem connection.

Chapter 3 Command Line Interface

3.1 Command Line Interface

Overview of the command line interface features and characteristics for switch management.

3.2 Command Line View

Explanation of different command line views and their hierarchical protection mechanisms.

3.3 FeaturesFeature and Functions of Command Line

Detailed description of the features and functions available in the command line interface.

3.3.1 Online Help of Command Line

Information on how to access and use the online help features within the command line interface.

3.3.2 Displaying Characteristics of Command Line

Details on how the command line interface displays information and handles command input.

3.3.3 History Command of Command Line

Explanation of how to retrieve and use previous commands entered in the command line interface.

3.3.4 Common Command Line Error Messages

List of common error messages encountered in the command line interface and their causes.

3.3.5 Editing Characteristics of Command Line

Information on editing commands, cursor movement, and other text editing features in the CLI.

Chapter 4 User Interface Configuration

4.1 User Interface Overview

Overview of the different user interfaces for configuring and managing switch ports and data.

4.2 User Interface Configuration

Detailed configuration steps for user interfaces, including entering views and setting protocols.

4.2.1 Entering User Interface View

Instructions on how to enter specific user interface views for configuration tasks.

4.2.2 Configuring the User Interface-Supported Protocol

Configuration of supported protocols (Telnet, SSH) for user interface access.

4.2.3 Configuring the Attributes of AUX (Console) Port

Configuration of AUX (Console) port attributes like speed, flow control, parity, and data bits.

4.2.4 Configuring the Terminal Attributes

Configuration of terminal attributes such as screen length, idle timeout, and locking.

II. Configuring idle-timeout

Setting the idle timeout for user sessions to automatically disconnect inactive users.

IV. Setting the screen length

Configuring the screen length for displaying information in the terminal interface.

V. Setting the history command buffer size

Setting the size of the command history buffer for recalling previous commands.

4.2.5 Managing Users

Management of user accounts, including authentication methods and access levels.

I. Configuring the authentication method

Configuration of authentication methods (password, scheme, none) for user access.

II. Setting the command level used after a user logging in

Setting the command level accessible to a user after logging into the system.

III. Setting the command level used after a user logs in from a user interface

Setting the command level for users accessing the switch via specific user interfaces.

IV. Set command priority

Setting the priority of commands within specific views to manage access authorities.

4.2.6 Configure Redirection

Configuration of packet redirection to specific destinations based on QoS policies.

I. send command

Sending messages between different user interfaces for inter-user communication.

II. auto-execute command

Configuring commands to automatically execute upon user login for automation.

Chapter 5 System IP Configuration

5.1 System IP Overview

Overview of system IP configuration, including management VLAN and IP address structure.

5.1.1 Management VLAN

Configuration and importance of the management VLAN for switch IP configuration.

5.1.2 IP Address

Explanation of IP address classification, structure, and common formats.

I. IP address classification and indications

Details on IP address classes (A, B, C, D, E) and their respective ranges and uses.

II. Subnet and mask

Explanation of subnetting and masks for IP address allocation and network division.

5.1.3 Static Route

Configuration of static routes for manual network path definition and traffic control.

5.2 System IP Configuration

Comprehensive system IP configuration including VLANs, hostnames, and static routes.

5.2.1 Creating/Deleting a Management VLAN Interface

Steps to create or delete a management VLAN interface for IP configuration.

5.2.2 Assigning/Deleting the IP Address for/of the Management VLAN Interface

Assigning or deleting IP addresses for the management VLAN interface.

5.2.3 Setting/Deleting the Management VLAN Interface Description Character String

Setting or deleting a descriptive character string for the management VLAN interface.

5.2.4 Enabling/Disabling a Management VLAN Interface

Enabling or disabling the management VLAN interface to control its operational status.

5.2.5 Configuring the Hostname and Host IP Address

Configuring the hostname and associating it with the host IP address for easier network identification.

5.2.6 Configuring a Static Route

Configuration of static routes to define specific paths for network traffic.

5.2.7 Configuring the Default Preference of Static Routes

Setting the default preference value for static routes when no specific preference is defined.

5.3 Displaying and Debugging System IP

Commands for displaying and debugging system IP configuration to verify settings.

Chapter 1 Ethernet Port Configuration

1.1 Ethernet Port Overview

Overview of Ethernet ports on Quidway S3000-EI Series switches, including types and features.

1.2 Ethernet Port Configuration

Detailed configuration steps for Ethernet ports, including entering views and enabling/disabling.

1.2.1 Enter Ethernet port view

Instructions on how to enter the Ethernet port view for configuration tasks.

1.2.2 Enable/Disable Ethernet Port

Enabling or disabling Ethernet ports to control their operational status and data forwarding.

1.3 Set Description Character String for Ethernet Port

Setting a descriptive character string for Ethernet ports to distinguish them.

1.3.1 Set Duplex Attribute of the Ethernet Port

Configuration of duplex attributes (auto, full, half) for Ethernet ports to manage data transmission.

1.3.2 Set Speed on the Ethernet Port

Setting the operational speed of Ethernet ports, including auto-negotiation and specific speeds.

1.3.3 Set Cable Type for the Ethernet Port

Configuration of the cable type (straight-through, cross-over) connected to Ethernet ports.

1.3.4 Enable/Disable Flow Control for Ethernet Port

Enabling or disabling flow control on Ethernet ports to manage network congestion.

1.3.5 Set Ethernet Port Broadcast Suppression Ratio

Setting the ratio for broadcast suppression on Ethernet ports to manage broadcast storms.

1.3.6 Set link type for Ethernet port

Configuration of link types (access, hybrid, trunk) for Ethernet ports.

1.3.7 Add the Ethernet port to Specified VLANs

Adding Ethernet ports to specified VLANs for network segmentation and traffic control.

1.3.8 Set the Default VLAN ID for the Ethernet Port

Setting the default VLAN ID for access ports, hybrid, and trunk ports.

1.3.9 Set loopback detection for the Ethernet port

Configuration of loopback detection on Ethernet ports for fault diagnosis.

1.3.10 Set the Time Interval of Calculating Port Statistics Information

Setting the time interval for calculating port statistics, such as average port speed.

1.3.11 Port Traffic Threshold Configuration

Configuring traffic thresholds on ports to prevent network blocking due to high traffic.

1.4 Display and Debug Ethernet Port

Commands for displaying and debugging Ethernet port configurations and status.

1.5 Ethernet Port Configuration Example

A practical example demonstrating the configuration of Ethernet ports and related features.

I. Networking requirements

The networking scenario and requirements for the Ethernet port configuration example.

Chapter 2 Link Aggregation Configuration

2.1 Link Aggregation Overview

Overview of link aggregation, explaining its purpose for enhancing reliability and load balancing.

2.2 Link Aggregation Configuration

Steps and commands for configuring link aggregation groups to combine multiple ports.

2.2.1 Aggregate Ethernet Ports

Instructions on aggregating Ethernet ports to form link aggregation groups.

Chapter 1 VLAN Configuration

1.1 VLAN Overview

Introduction to Virtual Local Area Networks (VLANs), their purpose, and benefits.

1.2 Configure VLAN

Steps and commands for configuring VLANs, including enabling, creating, and managing ports.

1.2.1 Enable/Disable VLAN Feature

Enabling or disabling the VLAN feature on the switch for network segmentation control.

1.2.2 Create/Delete a VLAN

Procedures for creating new VLANs or deleting existing VLANs from the switch configuration.

1.2.3 Add Ethernet Ports to a VLAN

Assigning Ethernet ports to specific VLANs to control network traffic flow and segmentation.

1.2.4 Set/Delete VLAN Description Character String

Setting or deleting a descriptive string for VLANs to aid in identification and management.

1.3 Display and Debug VLAN

Commands for displaying and debugging VLAN configurations and status.

1.4 VLAN Configuration Example

A practical example demonstrating the configuration of VLANs and port assignments.

Chapter 2 Isolate-User-Vlan Configuration

2.1 Isolate-user-vlan Overview

Introduction to isolate-user-vlan, a feature for saving VLAN resources and implementing Layer-2 packet isolation.

2.2 Configure isolate-user-vlan

Steps and commands for configuring isolate-user-vlan, including creating VLANs and mapping ports.

2.2.1 Configure isolate-user-vlan

Detailed instructions for creating and configuring an isolate-user-vlan.

2.2.2 Configure Secondary VLAN

Configuration of secondary VLANs that can be mapped to isolate-user-vlans.

2.2.3 Configure to Map isolate-user-vlan to Secondary VLAN

Mapping isolate-user-vlans to secondary VLANs for implementing Layer-2 packet intercommunication.

2.2.4 Configure VLAN ID of IGMP packets

Configuration of VLAN ID for IGMP packets to ensure proper multicast traffic handling.

2.3 Display and Debug isolate-user-vlan

Commands for displaying and debugging isolate-user-vlan configurations.

Chapter 3 GARP/GVRP Configuration

3.1 Configure GARP

Configuration of the Generic Attribute Registration Protocol (GARP) for distributing and registering network information.

3.1.1 GARP Overview

Introduction to GARP, its role in registration protocols, and its applications like GVRP and GMRP.

3.1.2 Set GARP Timer

Configuration of GARP timers (Hold, Join, Leave, LeaveAll) for controlling protocol behavior.

3.1.3 Display and Debug GARP

Commands for displaying GARP statistics and debugging GARP configurations.

3.2 Configure GVRP

Configuration of GARP VLAN Registration Protocol (GVRP) for dynamic VLAN registration.

3.2.1 GVRP Overview

Overview of GVRP, its function in maintaining dynamic VLAN registration information.

3.2.2 Enable/Disable Global GVRP

Enabling or disabling the global GVRP function for network-wide VLAN registration.

3.2.3 Enable/Disable Port GVRP

Enabling or disabling GVRP on specific ports for port-level VLAN registration control.

3.2.4 Set GVRP Registration Type

Setting the GVRP registration type (Normal, Fixed, Forbidden) for controlling VLAN registration behavior.

3.2.5 Display and Debug GVRP

Commands for displaying GVRP statistics and debugging GVRP configurations.

Chapter 4 Voice VLAN Configuration

4.1 Introduction to Voice VLAN

Introduction to Voice VLAN, designed for prioritizing voice traffic and managing IP phone data flow.

4.2 Voice VLAN Configuration

Configuration steps for Voice VLAN, including enabling features, OUI settings, and security modes.

4.2.1 Enabling/Disabling Voice VLAN Features

Enabling or disabling Voice VLAN features globally on the switch.

4.2.2 Enabling/Disabling Voice VLAN Features on a Port

Enabling or disabling Voice VLAN features on specific ports for targeted voice traffic handling.

4.2.3 Setting/Removing the OUI Address Learned by Voice VLAN

Configuring OUI addresses to identify IP phones and manage voice traffic automatically.

4.2.4 Enabling/Disabling Voice VLAN Security Mode

Enabling or disabling Voice VLAN security mode to filter traffic based on source MAC address.

4.2.5 Enabling/Disabling Voice VLAN Auto Mode

Configuring Voice VLAN auto mode for automatic port assignment or manual mode for explicit control.

4.2.6 Setting the Aging Time of Voice VLAN

Setting the aging time for Voice VLAN entries to manage dynamic learning of IP phone information.

4.3 Displaying and Debugging of Voice VLAN

Commands for displaying and debugging Voice VLAN status and configurations.

Chapter 1 GMRP Configuration

1.1 GMRP Overview

Overview of GARP Multicast Registration Protocol (GMRP) for maintaining dynamic multicast registration.

1.2 Configure GMRP

Steps and commands for configuring GMRP, including global and port-level settings.

1.2.1 Enable/Disable GMRP Globally

Enabling or disabling the GMRP function globally across the switch.

1.2.2 Enable/Disable GMRP on the Port

Enabling or disabling GMRP on specific ports for controlling multicast registration per port.

1.3 Display and debug GMRP

Commands for displaying GMRP statistics and debugging GMRP configurations.

1.4 GMRP Configuration Example

A practical example demonstrating the configuration of GMRP for multicast information exchange.

Chapter 2 IGMP Snooping Configuration

2.1 IGMP Snooping Overview

Overview of IGMP Snooping, a multicast control mechanism for managing multicast groups on Layer 2.

2.1.1 IGMP Snooping Principle

Explanation of the IGMP Snooping principle and how it processes IGMP messages for multicast control.

2.1.2 Implement IGMP Snooping

Implementation details of IGMP Snooping, including related concepts and message processing.

2.2 Configure IGMP Snooping

Steps and commands for configuring IGMP Snooping, including enabling, aging times, and filters.

2.2.1 Enable/Disable IGMP Snooping

Enabling or disabling the IGMP Snooping function to control MAC multicast forwarding table creation.

2.2.2 Configure Router Port Aging Time

Configuring the aging time for router ports to manage the router port status in IGMP Snooping.

2.2.3 Configure Maximum Response Time

Setting the maximum response time for IGMP snooping to manage multicast group membership.

2.2.4 Configure Aging Time of Multicast Group Member

Configuring the aging time for multicast group member ports to manage membership expiration.

2.2.5 Enabling/Disabling the function of fast removing a port from a multicast group

Enabling or disabling the fast-leave function for efficient port removal from multicast groups.

2.2.6 Setting the maximum number of multicast groups permited on a port

Setting the maximum number of multicast groups allowed per port to manage resources.

2.2.7 Configuring IGMP Snooping Filter

Configuring IGMP Snooping filters using ACLs to control user access to multicast programs.

2.2.8 Multicast Source Port Suppression Configuration

Configuring multicast source port suppression to filter unauthorized multicast traffic.

I. Enabling/Disabling Multicast Source Port Suppression

Enabling or disabling multicast source port suppression globally or on specific ports.

2.3 Display and debug IGMP Snooping

Commands for displaying and debugging IGMP Snooping configurations and status.

2.4 IGMP Snooping Configuration Example

A practical example demonstrating the configuration of IGMP Snooping.

2.4.1 Enable IGMP Snooping

Steps to enable IGMP Snooping on the switch for multicast traffic management.

Chapter 3 Unknown Multicast Dropping Configuration

3.1 Introduction to Unknown Multicast Dropping

Introduction to unknown multicast dropping, a feature to save bandwidth by dropping unregistered packets.

3.2 Unknown Multicast Dropping Configuration

Configuration steps for unknown multicast dropping, including enabling the function.

3.2.1 Enable Unknown Multicast Dropping

Enabling the unknown multicast dropping function to improve system efficiency.

Chapter 4 Adding Multicast MAC Address Configuration

4.1 Introduction

Introduction to Layer 2 multicast, covering dynamic and static MAC address management.

4.2 Adding Multicast MAC Address Entries

Steps to add multicast MAC address entries for static forwarding and controlling traffic.

Chapter 5 Multicast VLAN Configuration

5.1 Introduction to Multicast VLAN

Introduction to Multicast VLAN, a solution to optimize bandwidth usage for multicast streams.

5.2 Multicast VLAN Configuration

Configuration steps for Multicast VLAN, including layer 2/3 setup and IGMP Snooping integration.

5.2.1 Configuration Tasks

Key configuration tasks for Multicast VLAN on layer 3 and layer 2 switches.

5.3 Multicast VLAN Configuration Example

A practical example demonstrating the configuration of Multicast VLAN for network requirements.

I. Network requirements

The networking scenario and requirements for the Multicast VLAN configuration example.

Chapter 1 ACL Configuration

1.1 Brief Introduction to ACL

Introduction to Access Control Lists (ACLs), their purpose in filtering packets and implementing policies.

1.1.1 ACL Overview

Overview of ACLs, including their function in packet filtering and traffic classification.

1.1.2 ACL Supported by the Ethernet Switch

Information on the different types of ACLs supported by the Ethernet switch.

1.2 Configuring ACL

Steps and commands for configuring ACLs, including time ranges, definitions, and activation.

1.2.1 Configuring the Time-Range

Configuration of time ranges for ACL rules to apply policies based on specific time periods.

1.2.2 Defining ACL

Procedures for defining ACLs, including basic, advanced, Layer-2, and user-defined types.

I. Defining the basic ACL

Defining basic ACLs based on Layer-3 source IP address for packet analysis.

II. Defining the advanced ACL

Defining advanced ACLs using multiple packet attributes for complex traffic classification.

III. Defining the Layer-2 ACL

Defining Layer-2 ACLs based on Layer-2 information like MAC address and VLAN ID.

IV. Defining the user-defined ACL

Defining user-defined ACLs by matching specific bytes and patterns in Layer-2 data frames.

1.2.3 Activating ACL

Activating ACLs globally to apply filtering or classification rules to network traffic.

1.3 ACL Configuration Example

Examples demonstrating the configuration of advanced, basic, link, and user-defined ACLs.

1.3.1 Advanced ACL Configuration Example

An example of configuring advanced ACLs to control access based on time and department.

I. Networking requirements

The networking scenario and requirements for the Advanced ACL configuration example.

1.3.2 Basic ACL Configuration Example

An example of configuring basic ACLs to filter packets based on source IP and time.

I. Networking requirements

The networking scenario and requirements for the Basic ACL configuration example.

1.3.3 Link ACL Configuration Example

An example of configuring Link ACLs to filter packets based on MAC addresses and time.

I. Networking requirements

The networking scenario and requirements for the Link ACL configuration example.

1.3.4 User-defined ACL Configuration Example

An example of configuring user-defined ACLs to filter TCP packets based on time.

I. Networking requirements

The networking scenario and requirements for the User-defined ACL configuration example.

Chapter 2 QoS Configuration

2.1 QoS Overview

Overview of Quality of Service (QoS), explaining its importance in network performance management.

2.1.1 Traffic

Definition of traffic as all packets passing through a switch.

2.1.2 Traffic Classification

Explanation of traffic classification using matching rules based on packet characteristics.

2.1.3 Packet Filter

Functionality of packet filtering to discard unwanted traffic and enhance network security.

2.1.4 Traffic Policing

Traffic policing for managing network resources by monitoring and controlling user traffic.

2.1.5 Port traffic Limit

Setting port-based traffic limits to control the general speed of packet output on ports.

2.1.6 Redirection

Specifying new ports for packet forwarding based on QoS policy requirements.

2.1.7 Traffic Priority

Delivering priority tag service for special packets using TOS, DSCP, and 802.1p tags.

2.1.8 Queue Scheduling

Explanation of queue scheduling algorithms (SP, WRR, Delay bounded WRR) for managing traffic during congestion.

2.1.9 Traffic Mirroring

Traffic mirroring function for copying data packets to a monitoring port for analysis.

2.1.10 Traffic Counting

Requesting traffic counts to analyze packets using flow-based traffic counting.

2.2 Configuring QoS

Comprehensive QoS configuration including port priority, policing, scheduling, and mirroring.

2.2.1 Setting Port Priority

Setting port priority levels to tag packets and influence their queuing and forwarding.

2.2.2 Configuring Trust Packet Priority

Configuring the switch to trust packet 802.1p priority or not, influencing packet QoS handling.

2.2.3 Traffic Policing

Configuring traffic policing to enforce flow-based traffic limits and manage speed.

2.2.4 Port Traffic Limit

Setting port traffic limits to control the line rate and general speed of packet output.

2.2.5 Configuring Packet Redirection

Configuring packet redirection to specific destinations like CPU or other output ports based on QoS.

2.2.6 Configuring Priority Marking

Configuring priority marking to tag packets with IP precedence, DSCP, or 802.1p priority.

2.2.7 Configuring Queue Scheduling

Configuring queue scheduling algorithms to manage packet output and prioritize traffic.

Chapter 3 Logon User ACL Control Configuration

3.1 Overview

Overview of logon user security control using ACLs to filter and manage user access.

3.2 Configuring ACL Control over the TELNET Users

Configuring ACLs to control TELNET user access, filtering malicious and illegal connection requests.

3.2.1 Defining ACL

Procedures for defining ACLs, specifically numbered ACLs for logon user control.

3.2.2 Calling ACL to Control TELNET Users

Calling defined ACLs in user-interface view to control TELNET user access.

3.2.3 Configuration Example

An example demonstrating the configuration of ACL control for TELNET users.

3.3 Configuring ACL Control over the SNMP Users

Configuring ACLs to control SNMP user access, filtering illegal network management users.

3.3.1 Defining ACL

Defining basic ACLs for controlling SNMP user access to the switch.

3.3.2 Calling ACL to Control SNMP Users

Calling defined ACLs to control SNMP user access based on community name, username, and group name.

3.3.3 Configuration Example

An example demonstrating the configuration of ACL control for SNMP users.

3.4 Configuring ACL Control over the HTTP Users

Configuring ACLs to control HTTP user access, filtering illegal users and preventing unauthorized access.

3.4.1 Defining ACL

Defining ACLs for controlling HTTP user access, limiting concurrent WEB user access.

3.4.2 Calling ACL to Control HTTP Users

Calling defined ACLs to control HTTP user access to the switch.

Chapter 1 Stack Function Configuration

1.1 Stack Function Overview

Overview of stack function, explaining how multiple switches form a management domain.

1.2 Configure Stack Function

Steps for configuring stack function, including IP address pool, enabling/disabling, and slave switch views.

1.2.1 Configure IP Address Pool for the Stack

Configuring an IP address pool for the stack to automatically assign IPs to slave switches.

1.2.2 Enable/Disable a Stack

Enabling or disabling the stack function to form or dissolve the stacked switch environment.

1.2.3 Switch to a Slave Switch view to Perform the Configuration

Switching to a slave switch view to perform configuration tasks on individual stack members.

1.3 Display and Debug Stack Function

Commands for displaying and debugging the status and configuration of stack functions.

1.4 Stack Function Configuration Example

A practical example demonstrating the configuration of stack functions for network requirements.

I. Networking requirements

The networking scenario and requirements for the stack function configuration example.

Chapter 2 HGMP V2 Configuration

2.1 HGMP V2 Overview

Overview of HGMP V2, a protocol for managing multiple switches through an administrator device.

2.1.1 Overview

General introduction to HGMP V2 and its role in network management.

2.1.2 Role of Switch

Explanation of the different roles switches can play within a cluster (administrator, member, candidate).

2.1.3 Functions

Key functions and advantages of HGMP V2 management, including streamlined configuration and topology discovery.

2.2 Configure NDP

Configuration of Neighbor Discovery Protocol (NDP) for discovering adjacent device information.

2.2.1 NDP Overview

Overview of NDP, its role in discovering network topology and adjacent device information.

2.2.2 Enable/Disable System NDP

Enabling or disabling system-wide NDP for collecting adjacent device information periodically.

2.2.3 Enable/Disable Port NDP

Enabling or disabling NDP on specific ports to decide on collecting adjacent node information.

2.2.4 Set NDP Holdtime

Setting the NDP holdtime to specify how long adjacent nodes keep local node information.

2.2.5 Set NDP Timer

Setting the NDP timer for timely updating of local information about adjacent nodes.

2.2.6 Display and Debug NDP

Commands for displaying and debugging NDP configurations and status.

2.3 Configure NTDP

Configuration of Neighbor Topology Discovery Protocol (NTDP) for collecting network topology information.

2.3.1 NTDP Overview

Overview of NTDP, its role in collecting topology information and discovering network devices.

2.3.2 Enable/Disable System NTDP

Enabling or disabling system-wide NTDP for processing NTDP packets and collecting topology information.

2.3.3 Enable/Disable Port NTDP

Enabling or disabling NTDP on specific ports to decide on transmitting/receiving NTDP packets.

2.3.4 Set Hop Number for Topology Collection

Setting the hop number limit for topology collection to control the scope of discovery.

2.3.5 Set hop-delay and port-delay for Collected Device to Forward Topology Collection Request

Configuring hop and port delays to manage topology request forwarding and avoid network congestion.

2.3.6 Set Topology Collection Interval

Setting the topology collection interval for periodically collecting topology information throughout the network.

2.3.7 Start manually Topology Information Collection

Manually initiating topology information collection using commands for device management and monitoring.

2.3.8 Display and Debug NTDP

Commands for displaying and debugging NTDP configurations and collected topology information.

2.4 Configure Cluster

Configuration steps for setting up and managing a cluster of network devices.

2.4.1 Cluster Overview

Overview of cluster management, including enabling, setting up, and managing cluster members.

2.4.2 Enable/Disable Cluster Function

Enabling or disabling the cluster function on administrator and member devices.

2.4.3 Enter cluster view

Instructions on entering the cluster view to perform cluster-related configurations.

2.4.4 Configure Cluster IP Address Pool

Configuring a private IP address pool for the cluster to assign IPs dynamically to member devices.

2.4.5 Name Administrator device and Cluster

Naming the administrator device and the cluster for identification and management.

2.4.6 Add/Delete a Cluster Member device

Adding or deleting member devices to or from the cluster for managing the cluster membership.

2.4.7 Set up a Cluster Automatically

Using the auto-setup function to automatically discover and add candidate devices to a new cluster.

2.4.8 Set Cluster Holdtime

Setting the cluster holdtime to manage member states during network faults or switch resets.

2.4.9 Set Cluster Timer to Specify the Handshaking Message Interval

Setting the cluster timer to specify the interval for handshaking messages between devices.

2.4.10 Configure Remote Control over the Member device

Configuring remote control functions to manage member devices remotely via the administrator device.

2.4.11 Configure the Cluster Server and Network Management and Log Hosts

Configuring cluster servers, network management, and log hosts for centralized management.

2.4.12 Member Accessing

Accessing and managing specific member devices within the cluster through the administrator device.

2.4.13 Display and Debug Cluster

Commands for displaying and debugging cluster status and member information.

2.5 HGMP V2 Configuration Example

A practical example demonstrating HGMP V2 configuration for managing multiple switches.

I. Network requirements

The networking scenario and requirements for the HGMP V2 configuration example.

Chapter 1 MSTP Region-configuration

1.1 MSTP Overview

Overview of Multiple Spanning Tree Protocol (MSTP), its compatibility, and benefits over STP/RSTP.

1.1.1 MSTP Concepts

Explanation of fundamental MSTP concepts, including MST regions, instances, and CIST.

I. MST region

Definition and characteristics of MST regions, including switches, region name, and VLAN mapping.

II. VLAN mapping table

Description of the VLAN mapping table attribute within an MST region for STI association.

III. IST

Explanation of the Internal Spanning Tree (IST) as a Common and Internal Spanning Tree within an MST region.

IV. CST

Definition of Common Spanning Tree (CST) connecting spanning trees of all MST regions.

V. CIST

Explanation of Common and Internal Spanning Tree (CIST) composed by IST in every MST region.

VI. MSTI

Definition of Multiple Spanning Tree Instance (MSTI) as a spanning tree independent within an MST region.

VII. Region root

Definition of region root as the root of IST and MSTI within the MST region.

VIII. Common Root Bridge

Identification of the Common Root Bridge as the root bridge of CIST in the network.

IX. Edge port

Definition of edge ports located at the MST region edge, connecting to different MST regions.

X. Port role

Explanation of port roles in MSTP calculation: designated, root, master, alternate, and backup ports.

1.1.2 MSTP Principles

Explanation of MSTP principles, including CIST and MSTI calculations for spanning tree determination.

I. CIST calculation

Process of CIST root calculation, identifying the highest priority switch for the network.

II. MSTI calculation

Process of MSTI calculation, generating different MSTIs for different VLANs within an MST region.

1.2 Configure MSTP

Steps and commands for configuring MSTP, including region setup, running modes, and port parameters.

1.2.1 Configure the MST Region for a Switch

Configuring the MST region for a switch, including region name, VLAN mapping, and revision level.

1.2.2 Specify the Switch as Primary or Secondary Root Switch

Specifying a switch as the primary or secondary root switch for spanning tree calculation.

1.2.3 Configure the MSTP Running Mode

Configuring the MSTP running mode (STP-compatible, RSTP, MSTP) for network compatibility.

1.2.4 Configure the Bridge Priority for a Switch

Configuring the bridge priority for a switch to influence its selection as the spanning tree root.

1.2.5 Configure the Max Hops in an MST Region

Configuring the maximum hops in an MST region to limit the scale of the region for calculation.

1.2.6 Configure the Switching Network Diameter

Configuring the network diameter to specify the scale of the switching network for MSTP calculations.

1.2.7 Configure the Time Parameters of a Switch

Configuring time parameters (Forward Delay, Hello Time, Max Age) for switch operation in MSTP.

1.2.8 Configure the Max Transmission Speed on a Port

Configuring the maximum transmission speed on a port for MSTP packet transmission efficiency.

1.2.9 Configure a Port as an Edge Port

Configuring a port as an edge port or non-edge port to manage BPDU handling and state transition.

1.2.10 Configure the Path Cost of a Port

Configuring the path cost of a port to influence VLAN-based load balancing across physical links.

1.2.11 Configure the Priority of a Port

Configuring the priority of a port to determine its role in spanning tree calculation and load balancing.

1.2.12 Configure the Port (not) to Connect with the Point-to-Point Link

Configuring ports to connect or not connect with point-to-point links, affecting state transition speed.

1.2.13 Configure the mCheck Variable of a Port

Configuring the mCheck variable for ports to manage MSTP operation mode.

1.2.14 Configure the Switch Security Function

Configuring switch security functions: BPDU, Root, loop, and TC protection for network stability.

I. BPDU protection

Configuring BPDU protection to prevent network flapping and attacks from forged BPDUs.

II. Root protection

Configuring root protection to prevent unauthorized changes to the spanning tree root priority.

III. loop protection

Configuring loop protection to control the generation of loops and prevent network instability.

IV. TC-protection

Configuring TC-protection to manage the impact of frequent TC-BPDU packets on the network.

1.2.15 Enable MSTP on the Device

Enabling MSTP on the device to activate its various configurations and functions.

1.2.16 Enable/Disable MSTP on a Port

Enabling or disabling MSTP on specific ports to spare resources and control MSTP operation.

Chapter 1 802.1x Configuration

1.1 802.1x Overview

Overview of 802.1x, a port-based network access control protocol for LAN user authentication.

1.1.1 802.1x Standard Overview

Overview of the IEEE 802.1x standard for LAN user access authentication.

1.1.2 802.1x System Architecture

Explanation of the 802.1x system architecture, including Supplicant, Authenticator, and Authentication Server.

1.1.3 802.1x Authentication Process

Description of the 802.1x authentication process and the types of EAP frames used.

1.1.4 Implementing 802.1x on the Ethernet Switch

Implementation details of 802.1x on Ethernet switches, including port access methods.

1.2 Configuring 802.1x

Steps and commands for configuring 802.1x features, including enabling, access control, and user management.

1.2.1 Enabling/Disabling 802.1x

Enabling or disabling the 802.1x feature globally or on specific ports.

1.2.2 Setting the Port Access Control Mode

Setting the port access control mode (authorized, unauthorized, auto) for controlling user access.

1.2.3 Setting the Port Access Control Method

Setting the port access control method (MAC-based, port-based) for user authentication.

1.2.4 Checking the Users that Log on the Switch via Proxy

Enabling checks for users logging onto the switch via proxy for enhanced security.

1.2.5 Setting the Supplicant Number on a Port

Setting the maximum number of users allowed per port for 802.1x authentication.

1.2.6 Setting the Authentication in DHCP Environment

Configuring authentication in a DHCP environment for users with static IP addresses.

1.2.7 Configuring the Authentication Method for 802.1x User

Configuring the authentication method (PAP, CHAP, EAP) for 802.1x users.

1.2.8 Enabling/Disabling Guest VLAN

Enabling or disabling the Guest VLAN feature for providing limited access to unauthenticated users.

1.2.9 Setting 802.1x Re-authentication

Configuring 802.1x re-authentication to periodically re-authenticate access users.

1.2.10 Setting 802.1x Client Version Authentication

Setting 802.1x client version authentication to verify client software validity and prevent outdated versions.

II. Configuring the maximum retry times for the switch to send version request frame to the client

Configuring the maximum retry times for sending version request frames to the client.

III. Configuring the timeout timer of version authentication

Configuring the timeout timer for version authentication to manage response delays.

1.2.11 Configuring 802.1x Dynamic User Binding

Configuring dynamic user binding to bind IP, MAC, port, and VLAN for user access control.

I. Overview

Overview of dynamic user binding and its benefits in managing user access and preventing IP changes.

II. Configuration Prerequisites

Prerequisites for configuring dynamic user binding, including enabling 802.1x and DHCP Snooping.

III. Configuration Procedure

Step-by-step procedure for configuring 802.1x dynamic user binding.

1.2.12 Setting the Maximum Times of Authentication Request Message Retransmission

Setting the maximum retransmission times for authentication request messages to supplicants.

1.2.13 Configuring Timers

Configuration of various timers for 802.1x authentication, including handshake, quiet, and re-authentication periods.

Chapter 2 AAA and RADIUS Protocol Configuration

2.1 AAA and RADIUS Protocol Overview

Overview of AAA and RADIUS protocols for network security management, including authentication and authorization.

2.1.1 AAA Overview

Introduction to Authentication, Authorization, and Accounting (AAA) framework for network security.

2.1.2 RADIUS Protocol Overview

Overview of RADIUS protocol, its role in distributed authentication, and usage in network access.

I. What is RADIUS

Definition of RADIUS (Remote Authentication Dial-In User Service) and its function in network access.

2.1.3 Implementing AAA/RADIUS on Ethernet Switch

Implementation of AAA/RADIUS framework on Ethernet switches for user access control and management.

2.2 AAA Configuration

Configuration steps for AAA, including ISP domains, relevant attributes, and user management.

2.2.1 Creating/Deleting ISP Domain

Creating or deleting ISP domains to support multi-ISP environments and user access control.

2.2.2 Configuring Relevant Attributes of ISP Domain

Configuring relevant attributes of ISP domains, including RADIUS scheme, state, and maximum supplicants.

2.2.3 Enabling/Disabling the Messenger Alert

Enabling or disabling the messenger alert function to inform users about their remaining online time.

2.2.4 Configuring Self-Service Server URL

Configuring the self-service server URL for users to manage their accounts and passwords.

2.2.5 Creating a Local User

Creating local users for authentication and management on the switch's NAS.

2.2.6 Setting Attributes of Local User

Setting attributes for local users, including password display mode and service types.

I. Setting the password display mode

Configuring how user passwords are displayed (cipher-force or auto) in the system.

II. Setting the attributes of local users

Configuring specific attributes for local users, such as password, state, and service type.

2.2.7 Disconnecting a User by Force

Forcing disconnection of users or categories of users from the network for management purposes.

2.2.8 Configuring Dynamic VLAN with RADIUS Server

Configuring dynamic VLAN assignment with RADIUS server based on user authentication and VLAN ID.

2.3 Configuring RADIUS Protocol

Configuration of the RADIUS protocol, including scheme setup, server details, and security parameters.

2.3.1 Creating/Deleting a RADIUS scheme

Creating or deleting RADIUS schemes to define server configurations and IP addresses.

2.3.2 Setting IP Address and Port Number of RADIUS Server

Setting IP addresses and UDP port numbers for primary and secondary RADIUS servers.

2.3.3 Setting RADIUS Packet Encryption Key

Setting encryption keys for RADIUS packets to ensure secure communication between NAS and server.

2.3.4 Setting Response Timeout Timer of RADIUS Server

Setting response timeout timers for RADIUS servers to manage request retransmissions.

2.3.5 Setting Retransmission Times of RADIUS Request Packet

Setting retransmission times for RADIUS request packets to ensure reliable communication.

2.3.6 Enabling The Selection Of Radius Accounting Option

Enabling the selection of RADIUS accounting options for tracking user network resource usage.

2.3.7 Setting a Real-time Accounting Interval

Setting the real-time accounting interval for transmitting accounting information to the RADIUS server.

2.3.8 Setting Maximum Times of Real-time Accounting Request Failing to be Responded

Setting maximum times for real-time accounting requests to handle server response failures.

2.3.9 Enabling/Disabling Stopping Accounting Request Buffer

Enabling or disabling the stopping accounting request buffer to manage account balance and charge information.

2.3.10 Setting the Maximum Retransmitting Times of Stopping Accounting Request

Setting maximum retransmission times for stopping accounting requests to ensure message delivery.

2.3.11 Setting the Supported Type of RADIUS Server

Setting the supported types of RADIUS servers (standard, huawei, iphotel, portal) for compatibility.

2.3.12 Setting RADIUS Server State

Setting the state (active, block) of primary and secondary RADIUS servers for communication management.

2.3.13 Setting Username Format Transmitted to RADIUS Server

Setting the username format for transmission to RADIUS server, including ISP domain or excluding it.

2.3.14 Setting the Unit of Data Flow that Transmitted to RADIUS Server

Defining the unit of data flow (byte, kilo-byte, etc.) transmitted to the RADIUS server.

2.3.15 Configuring Local RADIUS Authentication Server

Configuring local RADIUS authentication server for basic RADIUS functionality on the switch.

2.4 Displaying and Debugging AAA and RADIUS Protocol

Commands for displaying and debugging AAA and RADIUS protocol configurations and statistics.

Chapter 3 HABP Configuration

3.1 HABP Overview

Overview of Huawei Authentication Bypass Protocol (HABP), a feature to bypass 802.1x authentication for management traffic.

3.2 HABP configuration

Configuration steps for HABP, including setting up HABP server and client roles.

3.2.1 Configuring HABP Server

Configuring the HABP server on the management switch to collect MAC addresses from member switches.

3.2.2 Configuring HABP Client

Configuring HABP client on member switches to enable HABP attribute and bypass authentication.

3.3 Displaying and Debugging HABP Attribute

Commands for displaying and debugging HABP attribute information, including status and statistics.

Chapter 1 ARP Configuration

1.1 Introduction to ARP

Introduction to Address Resolution Protocol (ARP), explaining its necessity for IP to MAC address resolution.

I. Necessity of ARP

Explanation of why ARP is necessary for network communication between devices using IP and MAC addresses.

II. ARP implementation procedure

Description of the ARP implementation procedure, including ARP request and reply processes.

1.2 Configure ARP

Steps and commands for configuring ARP, including static mapping entries and dynamic aging timers.

1.2.1 Manually Add/Delete Static ARP Mapping Entries

Manually adding or deleting static ARP mapping entries for IP to MAC address resolution.

1.2.2 Configure the Dynamic ARP Aging Timer

Configuring the dynamic ARP aging timer to manage the lifespan of ARP entries.

1.2.3 Enabling/Disabling ARP the Checking Function of ARP Entry

Enabling or disabling ARP entry checking to prevent learning of multicast MAC addresses.

1.3 Gratuitous ARP Configuration

Configuration of Gratuitous ARP for functions like IP conflict detection and updating hardware addresses.

1.3.1 Gratuitous ARP Overview

Overview of Gratuitous ARP, its purpose, and characteristics of gratuitous ARP packets.

1.3.2 Configuration Tasks

Tasks involved in configuring Gratuitous ARP, including enabling the learning function.

1.3.3 Configuration Example

A practical example demonstrating the configuration of Gratuitous ARP packet learning.

1.4 Display and debug ARP

Commands for displaying and debugging ARP configurations and mapping tables.

Chapter 2 DHCP-Snooping Configuration

2.1 DHCP-Snooping Overview

Overview of DHCP Snooping, a security feature to confirm user IP and MAC address associations.

2.2 Configure DHCP-Snooping

Steps and commands for configuring DHCP Snooping, including enabling the function and setting trusted ports.

2.2.1 Enable/Disable the DHCP-Snooping Function of the Switch

Enabling or disabling the DHCP Snooping function on the switch to record DHCP traffic.

2.2.2 Setting the Port as Trusted Port

Setting ports as trusted or distrusted to control DHCP packet forwarding and ensure IP address validity.

2.3 Display and debug DHCP-Snooping

Commands for displaying and debugging DHCP Snooping configurations and client information.

Chapter 3 DHCP Client Configuration

3.1 Overview of DHCP Client

Overview of DHCP Client, explaining its role in dynamic IP address configuration and network complexity.

3.2 DHCP Client Configuration

Steps for configuring the DHCP client, including obtaining IP addresses via DHCP.

3.2.1 Configuring a VLAN Interface to Obtain IP Address Using DHCP

Configuring a VLAN interface to obtain an IP address automatically using DHCP.

3.3 Displaying and Debugging DHCP Client Configuration

Commands for displaying and debugging DHCP client configurations and address allocation.

Chapter 4 System Maintenance and Debugging

4.1 Basic System Configuration

Basic system configuration tasks, including setting switch name, system clock, and time zone.

4.1.1 Set Name for Switch

Setting or restoring the switch name for identification and management.

4.1.2 Set the System Clock

Setting the system clock time and date for accurate timekeeping and logging.

4.1.3 Set the Time Zone

Configuring the local time zone and its difference from UTC for accurate time display.

4.1.4 Set the Summer Time

Setting the name, start, and end times for summer time adjustments.

4.2 Display the State and Information of the System

Displaying system state, version, user information, and configuration files for monitoring.

4.3 System Debugging

Enabling and disabling system debugging features to diagnose and address errors.

4.3.1 Enable/Disable the Terminal Debugging

Enabling or disabling terminal debugging for outputting debugging information on user screens.

4.3.2 Display Diagnostic Information

Collecting and displaying diagnostic information to locate the source of system faults.

4.4 Testing Tools for Network Connection

Using network testing tools like ping and tracert to check connectivity and diagnose network issues.

I. ping

Using the ping command to check network connection and host reachability.

II. tracert

Using the tracert command to test gateways and analyze network faults.

4.5 Logging Function

Overview of the logging system (Info-center) for collecting, filtering, and outputting system information.

4.5.1 Introduction to Info-center

Introduction to Info-center as the system's information center for logging and debugging support.

4.5.2 Info-center Configuration

Configuring Info-center, including output directions, information sources, and time-stamp formats.

4.5.3 Sending the Configuration Information to Loghost

Configuring the system to send configuration information to a remote loghost for centralized logging.

4.5.4 Sending the Configuration Information to Console terminal

Configuring the system to send configuration information to the console terminal for local monitoring.

4.5.5 Sending the Configuration Information to Telnet Terminal or Dumb Terminal

Configuring the system to send information to Telnet or dumb terminals for remote monitoring.

4.5.6 Sending the Configuration Information to Log Buffer

Configuring the system to send information to a log buffer for temporary storage.

4.5.7 Sending the Configuration Information to Trap Buffer

Configuring the system to send information to a trap buffer for event notification.

4.5.8 Sending the Configuration Information to SNMP Network Management

Configuring the system to send information to SNMP Network Management for centralized monitoring.

4.5.9 Turn on/off the Information Synchronization Switch in Fabric

Turning on or off information synchronization within a Fabric for consistent logging across switches.

4.5.10 Displaying and Debugging Info-center

Displaying and debugging Info-center status and configurations for monitoring and troubleshooting.

Chapter 5 SNMP Configuration

5.1 SNMP Overview

Overview of Simple Network Management Protocol (SNMP) for network monitoring and management.

5.2 SNMP Versions and Supported MIB

Information on SNMP versions (V1, V2C, V3) and the Management Information Bases (MIBs) supported.

5.3 Configure SNMP

Steps and commands for configuring SNMP, including community names, traps, and agent settings.

5.3.1 Set Community Name

Setting SNMP community names and access authorities (read-only, read-write) for device access control.

5.3.2 Set the Method of Identifying and Contacting the Administrator

Setting the sysContact variable to identify and contact network administrators.

5.3.3 Enable/Disable SNMP Agent to Send Trap

Enabling or disabling the SNMP agent to send trap messages for event notifications.

5.3.4 Set the Destination Address of Trap

Setting or deleting the destination address for SNMP trap messages.

5.3.5 Set Lifetime of Trap Message

Setting the lifetime for Trap messages to prevent outdated trap information.

5.3.6 Set SysLocation

Setting the sysLocation variable to specify the physical location of managed devices.

5.3.7 Set SNMP Version

Setting the SNMP version (V1, V2C, V3) supported by the Ethernet switch.

5.3.8 Set the Engine ID of a Local or Remote Device

Setting the engine ID for local or remote devices for SNMP identification.

5.3.9 Set/Delete an SNMP Group

Setting or deleting SNMP groups to manage user access and permissions.

5.3.10 Set the Source Address of Trap

Setting or removing the source address for trap messages to identify the originating device.

5.3.11 Add/Delete a User to/from an SNMP Group

Adding or deleting users to or from SNMP groups for access control.

5.3.12 Create/Update View Information or Deleting a View

Creating, updating, or deleting MIB views to manage access to managed objects.

5.3.13 Set the Size of SNMP Packet Sent/Received by an Agent

Setting the size of SNMP packets sent or received by an agent to optimize network traffic.

5.3.14 Disable SNMP Agent

Disabling the SNMP agent to prevent it from sending or receiving SNMP messages.

5.4 Display and Debug SNMP

Commands for displaying and debugging SNMP configurations and status.

Chapter 6 RMON Configuration

6.1 RMON Overview

Overview of Remote Network Monitoring (RMON), an IETF-defined MIB for network traffic monitoring.

6.2 Configure RMON

Steps and commands for configuring RMON, including alarm, event, history, and statistics tables.

6.2.1 Add/Delete an Entry to/from the Alarm Table

Adding or deleting entries in the RMON alarm table to monitor specified alarm variables.

6.2.2 Add/Delete an Entry to/from the Event Table

Adding or deleting entries in the RMON event table to define event handling and trap messages.

6.2.3 Add/Delete an Entry to/from the History Control Table

Adding or deleting entries in the RMON history control table for data collection and storage.

6.2.4 Add/Delete an Entry to/from the Extended RMON Alarm Table

Adding or deleting entries in the extended RMON alarm table for advanced alarm monitoring.

6.2.5 Add/Delete an Entry to/from the Statistics Table

Adding or deleting entries in the RMON statistics table for port usage and error monitoring.

6.3 Display and Debug RMON

Commands for displaying and debugging RMON configurations and statistics.

6.4 RMON Configuration Example

A practical example demonstrating RMON configuration for Ethernet port performance monitoring.

Chapter 7 NTP Configuration

7.1 Brief Introduction to NTP

Introduction to Network Time Protocol (NTP) for synchronizing clocks across the network.

7.1.1 NTP Functions

Key functions of NTP, including clock synchronization for backups, complex events, and system operations.

7.1.2 Basic Operating Principle of NTP

Explanation of the basic operating principle of NTP and how clock synchronization is achieved.

7.2 NTP Configuration

Steps and commands for NTP configuration, including operating modes, authentication, and server settings.

7.2.1 Configure NTP Operating Mode

Configuring NTP operating modes (server, peer, broadcast, multicast) based on network topology.

V. Configure NTP Multicast Server Mode

Configuring NTP multicast server mode to transmit NTP packets to clients via multicast.

VI. Configure NTP Multicast Client Mode

Configuring NTP multicast client mode to receive NTP multicast messages and synchronize clocks.

7.2.2 Configure NTP ID Authentication

Enabling NTP authentication and configuring MD5 authentication keys for secure time synchronization.

7.2.3 Set NTP Authentication Key

Setting NTP authentication keys, including key ID, mode, and value, for secure communication.

7.2.4 Set Specified Key as Reliable

Setting a specified NTP authentication key as reliable to ensure secure time synchronization.

7.2.5 Designate an Interface to Transmit NTP Message

Designating an interface to transmit NTP messages, using its IP address as the source.

7.2.6 Set NTP Master Clock

Setting the external reference clock or local clock as the NTP master clock for time synchronization.

7.2.7 Enable/Disable an Interface to Receive NTP Message

Enabling or disabling an interface to receive NTP messages for clock synchronization.

7.2.8 Set Authority to Access a Local Ethernet Switch

Setting access authority for NTP services on a local Ethernet switch.

7.2.9 Set Maximum Local Sessions

Setting the maximum number of local sessions allowed for NTP clients.

7.3 NTP Display and Debugging

Commands for displaying NTP service status and debugging NTP operations.

7.4 Typical NTP Configuration Example

A practical example demonstrating NTP server and client configurations for time synchronization.

I. Configure NTP server

Configuring an NTP server to provide time synchronization services to other devices.

II. Networking diagram

Diagram illustrating the network setup for NTP configuration examples.

III. Configure NTP broadcast mode

Configuring NTP broadcast server and client modes for time synchronization via broadcast packets.

1) Network requirements

The network requirements for the NTP broadcast mode configuration example.

2) Networking diagram

Diagram illustrating the network for NTP broadcast mode configuration.

3) Configuration procedure

Step-by-step procedure for configuring NTP broadcast server and client modes.

IV. Configure NTP multicast mode

Configuring NTP multicast server and client modes for time synchronization via multicast packets.

V. Configure authentication-enabled NTP server mode

Configuring NTP server mode with authentication enabled for secure time synchronization.

1) Network requirements

The network requirements for the authentication-enabled NTP server mode configuration example.

Chapter 8 SSH Terminal Services

8.1 SSH Terminal Services

Overview of Secure Shell (SSH) terminal services for secure remote access and authentication.

8.1.1 SSH Overview

Overview of SSH, its security features, and communication process between client and server.

8.1.2 Configuring SSH Server

Steps for configuring the SSH server, including system protocols, RSA keys, and authentication types.

I. Setting system protocol

Setting the system protocol to SSH and configuring link maximum for secure connections.

II. Configuring and canceling local RSA key pair

Configuring and canceling local RSA key pairs for SSH authentication.

III. Configuring authentication type

Configuring authentication types (password, RSA) for SSH users to access the switch.

IV. Defining update interval of server key

Defining the update interval for SSH server keys to maintain security and prevent outdated keys.

V. Defining SSH authentication timeout value

Defining the timeout value for SSH authentication to manage connection attempts and security.

VI. Defining SSH authentication retry value

Defining the retry value for SSH authentication to prevent malicious registration attempts.

VII. Entering public key edit view and editing public key

Entering the public key edit view and editing the client public key for RSA authentication.

8.1.3 Configuring SSH Client

Configuration tasks for the SSH client, including specifying server IP, protocol, and version.

I. Specifying server IP address

Specifying the IP address of the SSH server in the PuTTY client configuration.

II. Selecting SSH protocol

Selecting the SSH protocol for the connection in the PuTTY client configuration.

III. Choosing SSH version

Choosing the SSH version (1.5 or earlier) compatible with the switch.

IV. Specifying RSA private key file

Specifying the RSA private key file for SSH users requiring RSA authentication.

V. Opening SSH connection

Opening the SSH connection and entering username/password for authenticated access.

8.1.4 Displaying and Debugging SSH

Commands for displaying and debugging SSH configurations and connection status.

8.1.5 SSH Configuration Example

A practical example demonstrating SSH local connection configuration for client access.

I. Networking requirements

The networking scenario and requirements for the SSH local configuration example.

Chapter 1 Remote Power-Feeding Configuration

1.1 Overview

Overview of Power over Ethernet (PoE) function, explaining remote power feeding to PDs like IP phones.

1.2 Configuring Remote Power-Feeding

Steps and commands for configuring remote power feeding, including enabling, modes, and priority settings.

1.2.1 Enabling/Disabling Remote Power-Feeding on a Port

Enabling or disabling remote power feeding on specific ports to control power supply to connected devices.

1.2.2 Pressing the Mode Button to Detect Power-Feeding on a Port

Using the mode button for reverse detection on connected PDs and feeding power to them.

1.2.3 Selecting the Power-Feeding Mode on a Port

Selecting the power-feeding mode (signal lines, spare lines) for ports based on data and current transfer needs.

1.2.4 Setting the Maximum Power on a Power-Feeding Port

Setting the maximum power output for power-feeding ports to match PD requirements.

1.2.5 Setting power management mode and Power-Feeding Priority on a Port

Setting power management mode (auto, manual) and power-feeding priority for ports.

I. Setting power management mode

Configuring the power management mode for ports to automatically or manually manage power supply.

II. Setting Power-Feeding Priority on a Port

Setting power-feeding priority for ports (critical, high, low) to manage power allocation during high load.

1.2.6 Enabling/Disabling the Compatibility Detection of PDs

Enabling or disabling PD compatibility detection to identify non-802.3af compliant devices.

1.2.7 Reset the PoE Configuration on the Switch

Restoring the PoE configuration on the switch to its default settings.

1.2.8 Upgrading the PoE Daughter-Card

Upgrading the PoE daughter-card application software using FTP or TFTP.

1.3 Displaying Remote Power-Feeding

Commands for displaying remote power-feeding status, port parameters, and PSE power supply information.

1.4 Configuration Example

Examples demonstrating the configuration of power-feeding supply and PoE daughter-card upgrades.

I. Networking requirements

The networking scenario and requirements for the power-feeding supply configuration example.

1.4.2 Upgrading PoE daughter-card Configuration Example

An example demonstrating the upgrade process for the PoE daughter-card.

I. Networking requirements

The networking scenario and requirements for the PoE daughter-card upgrade example.

Appendix A Acronyms

Related product manuals