User Guide
Page 25
Select the serial port to be used to communicate with the switch. 1) Start the PC and run the terminal emulation program. 2) Set terminal parameters as follows: z Bits per second: 38,400 z Data bits: 8 z Parity: None z Stop bits: 1 z Flow control: None z Emulation: VT100 The specific procedure is as shown below. The following configuration procedure...
Select the serial port to be used to communicate with the switch. 1) Start the PC and run the terminal emulation program. 2) Set terminal parameters as follows: z Bits per second: 38,400 z Data bits: 8 z Parity: None z Stop bits: 1 z Flow control: None z Emulation: VT100 The specific procedure is as shown below. The following configuration procedure...
User Guide
Page 116
... constrain for it, the function, as follows when a certain type of traffic. With storm constrain enabled on a port, you can specify the system to control a specific type of traffic (broadcast, multicast, or unicast) exceeds the corresponding upper threshold: z Block: Block the port. In this function enabled on a port, the system detects...
... constrain for it, the function, as follows when a certain type of traffic. With storm constrain enabled on a port, you can specify the system to control a specific type of traffic (broadcast, multicast, or unicast) exceeds the corresponding upper threshold: z Block: Block the port. In this function enabled on a port, the system detects...
User Guide
Page 117
... to enter the page shown in the flow interval module, which is the interval used for measuring the average traffic sending and receiving rates over a specific interval. In the Port Storm Constrain area, the configured port storm constrain settings are displayed. Configuring Storm Constrain Select Device > Storm Constrain from the interval...
... to enter the page shown in the flow interval module, which is the interval used for measuring the average traffic sending and receiving rates over a specific interval. In the Port Storm Constrain area, the configured port storm constrain settings are displayed. Configuring Storm Constrain Select Device > Storm Constrain from the interval...
User Guide
Page 122
..., a lower event is a cumulative sum. Event group The event group defines event indexes and controls the generation and notifications of the events triggered by RMON specifications (RFC 2819), the realized public MIB of the device supports the statistics group, history group, alarm group, and event group. A history group collects statistics on...
..., a lower event is a cumulative sum. Event group The event group defines event indexes and controls the generation and notifications of the events triggered by RMON specifications (RFC 2819), the realized public MIB of the device supports the statistics group, history group, alarm group, and event group. A history group collects statistics on...
User Guide
Page 151
... ACL with the group to restrict the source IP address of SNMP packets, that is, you can configure to allow or prohibit SNMP packets with a specific source IP address, so as to enter the page as shown in Figure 1-13. Return to enter the Add SNMP User page, as shown in...
... ACL with the group to restrict the source IP address of SNMP packets, that is, you can configure to allow or prohibit SNMP packets with a specific source IP address, so as to enter the page as shown in Figure 1-13. Return to enter the Add SNMP User page, as shown in...
User Guide
Page 152
.../NoPriv or Auth/Priv. Privacy Password Confirm Privacy Password ACL Set the privacy password when the security level is Auth/Priv. Associate a basic ACL with a specific source IP address, so as to allow or prohibit SNMP packets with the user to restrict the source IP address of SNMP packets, that is...
.../NoPriv or Auth/Priv. Privacy Password Confirm Privacy Password ACL Set the privacy password when the security level is Auth/Priv. Associate a basic ACL with a specific source IP address, so as to allow or prohibit SNMP packets with the user to restrict the source IP address of SNMP packets, that is...
User Guide
Page 225
... forwarding address entries. Return to ensure that the paths are Otherwise, the network fault-free. Item Bridge Diameter Description Any two stations in a switched network are interconnected through a specific path composed of a series of the factors deciding whether the device can be elected as a secondary root bridge (you cannot set the bridge...
... forwarding address entries. Return to ensure that the paths are Otherwise, the network fault-free. Item Bridge Diameter Description Any two stations in a switched network are interconnected through a specific path composed of a series of the factors deciding whether the device can be elected as a secondary root bridge (you cannot set the bridge...
User Guide
Page 254
...network management, and the interface number and OID (object identifier) associated with the address. 2) IEEE 802.1 organizationally specific TLVs Table 1-4 IEEE 802.1 organizationally specific TLVs Type Port VLAN ID Port And Protocol VLAN ID Description PVID of the sending device. Optional Management address used... for enhanced device management; Organizationally specific TLVs and LLDP-MED TLVs are included, the port ID TLV carries the port name. Some of them are mandatory to...
...network management, and the interface number and OID (object identifier) associated with the address. 2) IEEE 802.1 organizationally specific TLVs Table 1-4 IEEE 802.1 organizationally specific TLVs Type Port VLAN ID Port And Protocol VLAN ID Description PVID of the sending device. Optional Management address used... for enhanced device management; Organizationally specific TLVs and LLDP-MED TLVs are included, the port ID TLV carries the port name. Some of them are mandatory to...
User Guide
Page 255
...VLAN Name Protocol Identity Description A specific VLAN name on the port Protocols supported on the port Currently, 3Com Switch 2900 supports receiving but not sending protocol identity TLVs. 3) IEEE 802.3 organizationally specific TLVs Table 1-5 IEEE 802.3 organizationally specific TLVs Type MAC/PHY Configuration/Status ...MED endpoint to advertise its firmware version. Software Revision Allows a MED endpoint to advertise LAN type and VLAN ID of the specific port, and the Layer 2 and Layer 3 priorities for voice over IP (VoIP), such as basic configuration, network policy ...
...VLAN Name Protocol Identity Description A specific VLAN name on the port Protocols supported on the port Currently, 3Com Switch 2900 supports receiving but not sending protocol identity TLVs. 3) IEEE 802.3 organizationally specific TLVs Table 1-5 IEEE 802.3 organizationally specific TLVs Type MAC/PHY Configuration/Status ...MED endpoint to advertise its firmware version. Software Revision Allows a MED endpoint to advertise LAN type and VLAN ID of the specific port, and the Layer 2 and Layer 3 priorities for voice over IP (VoIP), such as basic configuration, network policy ...
User Guide
Page 257
... your device to configure the voice VLAN automatically. By configuring CDP compatibility, you can neither be transmitted nor be transmitted and received. With this mechanism, a specific number of LLDPDUs are sent successively at the 1-second interval to be differentiated from other types of Cisco IP phones for Media Endpoint Devices Configuring...
... your device to configure the voice VLAN automatically. By configuring CDP compatibility, you can neither be transmitted nor be transmitted and received. With this mechanism, a specific number of LLDPDUs are sent successively at the 1-second interval to be differentiated from other types of Cisco IP phones for Media Endpoint Devices Configuring...
User Guide
Page 286
...Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches Configuring IGMP Snooping Configuration Task List Perform the tasks in Table 1-1 to any port. When the switch receives a group-specific IGMP leave group message on a member port, it first checks whether a forwarding ...IGMP leave message to the multicast router to announce that port. instead, the switch resets the member port aging timer for that it has left and sends an IGMP group-specific query to the host from the outgoing port list; Table 1-1 IGMP snooping ...
...Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches Configuring IGMP Snooping Configuration Task List Perform the tasks in Table 1-1 to any port. When the switch receives a group-specific IGMP leave group message on a member port, it first checks whether a forwarding ...IGMP leave message to the multicast router to announce that port. instead, the switch resets the member port aging timer for that it has left and sends an IGMP group-specific query to the host from the outgoing port list; Table 1-1 IGMP snooping ...
User Guide
Page 290
... same multicast group will fail to be an Ethernet port or Layer-2 aggregate port. Click the plus sign (+) in front of Show Entries to enter the basic configuration page shown in Figure 1-6...., the fast leave function helps improve bandwidth and resource usage. Then, when receiving IGMP group-specific queries for that port. If fast leave is enabled for a port to which more than ... features are displayed at the lower part of this page. Return to that multicast group, the switch will not take part in which you can be configured. Figure 1-6 Display entry information 1-8 Advanced...
... same multicast group will fail to be an Ethernet port or Layer-2 aggregate port. Click the plus sign (+) in front of Show Entries to enter the basic configuration page shown in Figure 1-6...., the fast leave function helps improve bandwidth and resource usage. Then, when receiving IGMP group-specific queries for that port. If fast leave is enabled for a port to which more than ... features are displayed at the lower part of this page. Return to that multicast group, the switch will not take part in which you can be configured. Figure 1-6 Display entry information 1-8 Advanced...
User Guide
Page 317
Table 2-2 DHCP server group configuration items Item Server Group ID IP Address Description Type the ID of a specific interface. Return to DHCP Relay Agent Configuration Task List. 2-5 Figure 2-5 Configure a DHCP relay agent interface Table 2-3 describes the DHCP relay agent interface configuration items. Table 2-3 ... on an Interface Select Network > DHCP from the navigation tree to enter the default DHCP Relay page shown in Figure 2-5. Type the IP address of a specific interface to 20 DHCP server groups.
Table 2-2 DHCP server group configuration items Item Server Group ID IP Address Description Type the ID of a specific interface. Return to DHCP Relay Agent Configuration Task List. 2-5 Figure 2-5 Configure a DHCP relay agent interface Table 2-3 describes the DHCP relay agent interface configuration items. Table 2-3 ... on an Interface Select Network > DHCP from the navigation tree to enter the default DHCP Relay page shown in Figure 2-5. Type the IP address of a specific interface to 20 DHCP server groups.
User Guide
Page 326
... DHCP snooping interface configuration items Item Interface Name Interface State Option 82 Support Option 82 Strategy Description This field displays the name of a specific interface to enter the page shown in Figure 3-3. You can view trusted and untrusted ports in normal format. The strategies include: z...: The message is forwarded after its Option 82 being changed. Return to support Option 82 or not. Click the icon of a specific interface. Configuring DHCP Snooping Functions on an Interface Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab...
... DHCP snooping interface configuration items Item Interface Name Interface State Option 82 Support Option 82 Strategy Description This field displays the name of a specific interface to enter the page shown in Figure 3-3. You can view trusted and untrusted ports in normal format. The strategies include: z...: The message is forwarded after its Option 82 being changed. Return to support Option 82 or not. Click the icon of a specific interface. Configuring DHCP Snooping Functions on an Interface Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab...
User Guide
Page 342
... the non-permanent static ARP entry, the device adds the interface receiving the ARP reply to forward packets. After a static ARP entry is specified, only a specific MAC address is manually configured and maintained. z A permanent static ARP entry can be used for forwarding data. All ARP entries are displayed on the page...
... the non-permanent static ARP entry, the device adds the interface receiving the ARP reply to forward packets. After a static ARP entry is specified, only a specific MAC address is manually configured and maintained. z A permanent static ARP entry can be used for forwarding data. All ARP entries are displayed on the page...
User Guide
Page 350
..., the ARP packet cannot pass the check. Figure 2-1 Man-in-the-middle attack Switch Host A IP_ A MAC_ A Host C IP_C MAC_C Forged ARP reply Forged ARP reply Host B IP_B MAC_B ARP detection mechanism With ARP detection enabled for a specific VLAN, ARP messages arrived on any interface in the VLAN are discarded. 1) ARP detection...
..., the ARP packet cannot pass the check. Figure 2-1 Man-in-the-middle attack Switch Host A IP_ A MAC_ A Host C IP_C MAC_C Forged ARP reply Forged ARP reply Host B IP_B MAC_B ARP detection mechanism With ARP detection enabled for a specific VLAN, ARP messages arrived on any interface in the VLAN are discarded. 1) ARP detection...
User Guide
Page 383
... to test whether ACL 3000 takes effect. z Click Apply to the authentication server. Meanwhile, it is prohibited to enable 802.1X on the specific port are mutually exclusive on a specific port can take effect. The ping page appears. z Figure 1-36 shows the ping operation summary. z From the navigation tree, select Network > Diagnostic...
... to test whether ACL 3000 takes effect. z Click Apply to the authentication server. Meanwhile, it is prohibited to enable 802.1X on the specific port are mutually exclusive on a specific port can take effect. The ping page appears. z Figure 1-36 shows the ping operation summary. z From the navigation tree, select Network > Diagnostic...
User Guide
Page 385
... can be used for accounting. z Accounting: Records all network service usage information of the authentication, authorization and accounting functions should be authenticated before they access specific resources, you can use RADIUS server 1 for authentication and authorization, and RADIUS server 2 for not only charging, but a client for the AAA servers, as follows...
... can be used for accounting. z Accounting: Records all network service usage information of the authentication, authorization and accounting functions should be authenticated before they access specific resources, you can use RADIUS server 1 for authentication and authorization, and RADIUS server 2 for not only charging, but a client for the AAA servers, as follows...
User Guide
Page 386
... AAA framework allows for authentication and the isp-name part the ISP domain name. Configuration Task List Perform the tasks in practice. Introduction to access specific resources and records operations of different ISPs. As users of users. If a user does not provide the ISP domain name, the system considers that enables...
... AAA framework allows for authentication and the isp-name part the ISP domain name. Configuration Task List Perform the tasks in practice. Introduction to access specific resources and records operations of different ISPs. As users of users. If a user does not provide the ISP domain name, the system considers that enables...
User Guide
Page 401
..., Identifier, Length, Authenticator, and Attribute fields. There are two kinds of authenticators: request authenticator and response authenticator. 5) The Attribute field, with a variable length, carries the specific authentication, authorization, and accounting information for RADIUS authentication, authorization and accounting are neglected upon reception. It indicates the type of the attribute in bytes, including...
..., Identifier, Length, Authenticator, and Attribute fields. There are two kinds of authenticators: request authenticator and response authenticator. 5) The Attribute field, with a variable length, carries the specific authentication, authorization, and accounting information for RADIUS authentication, authorization and accounting are neglected upon reception. It indicates the type of the attribute in bytes, including...