H3c-technologies H3C S3100 Series Switches Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Router H3c-technologies H3C S3100 Series Switches herunter. H3C Technologies H3C S3100 Series Switches User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 105
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
H3C S3100 Series Ethernet Switches
Operation Manual
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 20100908-C-1.00
Product Version: Release 22XX Series
Seitenansicht 0
1 2 3 4 5 6 ... 104 105

Inhaltsverzeichnis

Seite 1 - Operation Manual

H3C S3100 Series Ethernet SwitchesOperation ManualHangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100908-C-1.00 Produc

Seite 2 - Trademarks

8 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Seite 3 - Preface

2-9 Protocol-Based VLAN Configuration Task List Complete these tasks to configure protocol-based VLAN: Task Remarks Configuring a Protocol Template

Seite 4

1-12 Configuring an Access Control Policy By configuring a certificate attribute-based access control policy, you can further control access to the s

Seite 5

1-13 PKI Configuration Examples z The SCEP plug-in is required when you use the Windows Server as the CA. In this case, when configuring the PKI d

Seite 6

1-14 After configuring the basic attributes, you need to perform configuration on the jurisdiction configuration page of the CA server. This includes

Seite 7 - Software Version

1-15 . z Apply for certificates # Retrieve the CA certificate and save it locally. [Switch] pki retrieval-certificate ca domain torsa Retrieving CA/

Seite 8

1-16 Modulus (1024 bit): 00D67D50 41046F6A 43610335 CA6C4B11 F8F89138 E4E905BD 43953BA2 623A5

Seite 9

1-17 Configuration procedure 1) Configure the CA server z Install the certificate server suites From the start menu, select Control Panel > Add

Seite 10 - Conventions

1-18 # Specify the entity for certificate request as aaa. [Switch-pki-domain-torsa] certificate request entity aaa z Generate a local key pair using

Seite 11 - Documentation Feedback

1-19 Subject: CN=switch Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public K

Seite 12 - We appreciate your comments

1-20 z The network connection is not proper. For example, the network cable may be damaged or loose. z No trusted CA is specified. z The URL of th

Seite 13

1-21 z The CRL distribution URL is not configured. z The LDAP server version is wrong. Solution z Make sure that the network connection is physica

Seite 14 - 1 CLI Configuration

2-10 z At present, the S3100 series support only the standard templates of AppleTalk and IP, the standard template of IPX encapsulated in Ethernet

Seite 15 - Modifying the Command Level

i Table of Contents 1 SSL Configuration ··············································································································

Seite 16 - Switching User Level

1-1 1 SSL Configuration When configuring SSL, go to these sections for information you are interested in: z SSL Overview z SSL Configuration Task

Seite 17

1-2 SSL Protocol Stack As shown in Figure 1-2, the SSL protocol consists of two layers of protocols: the SSL record protocol at the lower layer and t

Seite 18

1-3 Configuration Prerequisites When configuring an SSL server policy, you need to specify the PKI domain to be used for obtaining the server side ce

Seite 19

1-4 z If you enable client authentication here, you must request a local certificate for the client. z Currently, SSL mainly comes in these versio

Seite 20 - CLI Views

1-5 [Switch-pki-entity-en] quit # Create a PKI domain and configure it. [Switch] pki domain 1 [Switch-pki-domain-1] ca identifier ca1 [Switch-pki-dom

Seite 21

1-6 # Configure the system to strip domain name off a user name before transmitting the user name to the RADIUS server. [Switch-radius-radius1] user-

Seite 22

1-7 To do… Use the command… Remarks Specify the preferred cipher suite for the SSL client policy prefer-cipher { rsa_3des_ede_cbc_sha | rsa_aes_128

Seite 23

1-8 z If the SSL server is configured to authenticate the client, but the certificate of the SSL client does not exist or cannot be trusted, request

Seite 24

i Table of Contents 1 HTTPS Configuration ············································································································

Seite 25 - CLI Features

2-11 To do... Use the command... Remarks Display the protocol information and protocol indexes configured on the specified port display protocol-v

Seite 26 - Command History

1-1 1 HTTPS Configuration When configuring HTTPS, go to these sections for information you are interested in: z HTTPS Overview z HTTPS Configurati

Seite 27 - Command Edit

1-2 Associating the HTTPS Service with an SSL Server Policy You need to associate the HTTPS service with a created SSL server policy before enabling

Seite 28

1-3 Associating the HTTPS Service with a Certificate Attribute Access Control Policy Associating the HTTPS service with a configured certificate acce

Seite 29

1-4 HTTPS Configuration Example Network requirements z Host acts as the HTTPS client and Device acts as the HTTPS server. z Host accesses Device th

Seite 30

1-5 [Device] pki retrieval-certificate ca domain 1 # Apply for a local certificate. [Device] pki request-certificate domain 1 2) Configure an SSL se

Seite 31 - User Interface Index

i Table of Contents 1 Ethernet OAM Configuration······································································································

Seite 32

1-1 1 Ethernet OAM Configuration When configuring the Ethernet OAM function, go to these sections for information you are interested in: z Ethernet

Seite 33

1-2 Ethernet OAMPDUs Figure 1-1 shows the formats of different types of OAMPDUs. Figure 1-1 Formats of different types of Ethernet OAMPDUs The fiel

Seite 34

1-3 Table 1-2 Functions of different types of OAMPDUs OAMPDU type Function Information OAMPDU Used for transmitting state information of an Ethernet

Seite 35

1-4 z OAM connections can be initiated only by OAM entities operating in active OAM mode, while those operating in passive mode wait and respond to

Seite 36 - Common Configuration

2-12 [Switch] vlan 100 [Switch-vlan100] protocol-vlan ip # To ensure the normal operation of IP network, you need to configure a user-defined protoco

Seite 37

1-5 z The system transforms the period of detecting errored frame period events into the maximum number of 64-byte frames that a port can send in t

Seite 38

1-6 Task Remarks Configuring Errored Symbol Event Detection Optional Configuring Errored Frame Event Detection Optional Configuring Errored Frame

Seite 39

1-7 To do… Use the command… Remarks Enter system view System-view — Configure the Ethernet OAM handshake packet transmission interval oam timer hel

Seite 40 - Password

1-8 Follow these steps to configure errored frame event detection: To do… Use the command… Remarks Enter system view system-view — Configure the er

Seite 41

1-9 Enabling OAM Remote Loopback After enabling OAM remote loopback on a port, you can send loopback frames from the port to a remote port and then o

Seite 42

1-10 Displaying and Maintaining Ethernet OAM Configuration To do… Use the command… Remarks Display global Ethernet OAM configuration display oam co

Seite 43 - [ level level ] command

1-11 # Configure Ethernet 1/0/1 to operate in active Ethernet OAM mode (the default) and enable Ethernet OAM for it. <DeviceB> system-view [De

Seite 44

1-12 The above information indicates that 35 errors occurred since Ethernet OAM is enabled on Device A, 17 of which are caused by error frames. The l

Seite 45

i Table of Contents 1 CFD Configuration···············································································································

Seite 46 - 3 Logging in through Telnet

1-1 1 CFD Configuration When configuring CFD, go to these sections for information you are interested in: z Overview z CFD Configuration Task List

Seite 47

i Table of Contents 1 Static Route Configuration······································································································

Seite 48

1-2 Figure 1-1 Two nested MDs CFD exchanges messages and performs operations on a per-domain basis. By planning MDs properly in a network, you can

Seite 49

1-3 As shown in Figure 1-2, an outward-facing MEP sends packets to its host port. Figure 1-3 Inward-facing MEP As shown in Figure 1-3, an inward-f

Seite 50

1-4 Figure 1-4 Levels of MPs Device A Device B Device C Device D Device E Device F5 535 53 332 2 2 20 0 0 0 0 0MD level 5MD level 3MD Level 2 MD Leve

Seite 51

1-5 Linktrace Linktrace is responsible for identifying the path between the source MEP and the destination MEP. This function is implemented in the

Seite 52

1-6 z Normally, a port blocked by STP cannot receive, send, or respond to CFD messages. However, if it is configured as an outward-facing MEP, it c

Seite 53

1-7 To do... Use the command... Remarks Create an MA cfd ma ma-name md md-name vlan vlan-id Required Not created by default Create a service instan

Seite 54

1-8 MIPs are generated on each port automatically according to related MIP generation rules. If a port has no MIP, the system will check the MAs in e

Seite 55

1-9 Configuring CFD Functions Configuration Prerequisites Before configuring CFD functions, you need to complete basic CFD configurations first. Con

Seite 56 - Telnetting to a Switch

1-10 Follow these steps to configure LB on a MEP: To do... Use the command... Remarks Enter system view system-view — Enable LB cfd loopback servic

Seite 57

1-11 To do... Use the command... Remarks Display MP information display cfd mp [ interface interface-type interface-number ] Available in any view

Seite 58 - <Sysname> telnet xxxx

1-1 1 Static Route Configuration When configuring a static route, go to these sections for information you are interested in: z Introduction to Sta

Seite 59 - 4 Logging in Using a Modem

1-12 Figure 1-6 Network diagram for CFD configuration Configuration procedure 1) Configure a VLAN and assign ports to it On each device shown in F

Seite 60 - Switch Configuration

1-13 [DeviceC] cfd service-instance 2 md MD_B ma MA_B 4) Configure MEPs # On Device A, configure a MEP list in service instance 1; create and enable

Seite 61

1-14 # On Device B, enable the sending of CCMs for MEP 2001 in service instance 2 on Ethernet 1/0/3. [DeviceB] interface ethernet 1/0/3 [DeviceB-Ethe

Seite 62

i Table of Contents Appendix A Acronyms ··············································································································

Seite 63 - Management System

A-1 Appendix A Acronyms A AAA Authentication, Authorization and Accounting ABR Area Border Router ACL Access Control List ARP Address Resolutio

Seite 64 - Configuring the Login Banner

A-2 IGMP Internet Group Management Protocol IGP Interior Gateway Protocol IP Internet Protocol L LLDP Link Layer Discovery Protocol LSA Link Sta

Seite 65

A-3 TTL Time To Live U UDP User Datagram Protocol V VLAN Virtual LAN VOD Video On Demand W WRR Weighted Round Robin X XID eXchange Identificati

Seite 66

1-2 Static Route Configuration Configuration Prerequisites Before configuring a static route, perform the following tasks: z Configuring the physic

Seite 67 - 6 Logging in through NMS

1-3 Operation Command Remarks Display the routes that match a specified basic access control list (ACL) display ip routing-table acl acl-number [ v

Seite 68 - 7 User Control

i Table of Contents 1 IP Addressing Configuration·····································································································

Seite 69

1-1 1 IP Addressing Configuration IP Addressing Overview IP Address Classes IP addressing uses a 32-bit address to identify each host on a network.

Seite 70

9 Category Documents Purposes z S3100-EI series switches marketing brochure z S3100-SI series switches marketing brochure Describe product specifi

Seite 71

1-2 Class Address range Description D 224.0.0.0 to 239.255.255.255 Multicast address. E 240.0.0.0 to 255.255.255.255 Reserved for future use exc

Seite 72

1-3 bits for the host ID and thus have only 126 (27 – 2) hosts in each subnet. The maximum number of hosts is thus 64,512 (512 × 126), 1022 less afte

Seite 73

1-4 Configuring an IP address to a VLAN interface Table 1-3 Configure an IP address to a VLAN interface(S3100-SI) Operation Command Remarks Enter s

Seite 74 - [Sysname] ip http acl 2030

1-5 Operation Command Remarks Display brief configuration information about a specified or all Layer 3 interfaces display ip interface brief [ inte

Seite 75

2-1 2 IP Performance Configuration IP Performance Overview Introduction to IP Performance Configuration In some network environments, you need to ad

Seite 76 - Format of configuration file

2-2 Table 2-2 Configure TCP attributes Operation Command Remarks Enter system view system-view — Configure TCP synwait timer’s timeout value tcp ti

Seite 77

2-3 Use the reset command in user view to clear the IP, TCP, and UDP traffic statistics. Table 2-4 Display and maintain IP performance Operation Com

Seite 78

i Table of Contents 1 Voice VLAN Configuration········································································································

Seite 79

1-1 1 Voice VLAN Configuration The contents of this chapter are only applicable to the S3100-EI series among S3100 series switches. When configur

Seite 80

1-2 z Voice VLAN configuration z Failover call routing Following describes the way a typical IP phone acquires an IP address. Figure 1-1 Network d

Seite 81

10 You can e-mail your comments about product documentation to [email protected]. We appreciate your comments.

Seite 82

1-3 DHCP Server 1, and sends a new DHCP request message carrying the voice VLAN tag to the voice VLAN. 4) After receiving the DHCP request, DHCP Se

Seite 83 - 1 VLAN Overview

1-4 Setting the Voice Traffic Transmission Priority In order to improve transmission quality of voice traffic, the switch by default re-marks the pri

Seite 84 - VLAN Fundamentals

1-5 Table 1-2 Matching relationship between port types and voice devices capable of acquiring IP address and voice VLAN automatically Voice VLAN assi

Seite 85

1-6 Table 1-3 Matching relationship between port types and voice devices acquiring voice VLAN through manual configuration Voice VLAN assignment mode

Seite 86 - VLAN Classification

1-7 Voice VLAN Mode Packet Type Processing Method Packet carrying any other VLAN tag The packet is forwarded or dropped based on whether the receivi

Seite 87 - Port-Based VLAN

1-8 Configuring the Voice VLAN to Operate in Automatic Voice VLAN Assignment Mode Follow these steps to configure a voice VLAN to operate in automa

Seite 88

1-9 When the voice VLAN is working normally, if the device restarts, in order to make the established voice connections work normally, the system do

Seite 89 - MAC-Based VLAN

1-10 To do… Use the command… Remarks Enter VLAN view vlan vlan-id Access port Add the port to the VLAN port interface-list Enter port view interfac

Seite 90 - Protocol-Based VLAN

1-11 Displaying and Maintaining Voice VLAN To do… Use the command… Remarks Display information about the ports on which voice VLAN configuration f

Seite 91 - Encapsulation Formats

1-12 # Set the voice VLAN aging timer. [DeviceA] voice vlan aging 100 # Add a user-defined OUI address 0011-2200-000 and set the description string

Seite 92 - 2 VLAN Configuration

i Table of Contents 1 CLI Configuration ·············································································································

Seite 93

1-13 Configuration procedure # Enable the security mode for the voice VLAN so that the ports in the voice VLAN permit valid voice packets only. This

Seite 94

i Table of Contents 1 GVRP Configuration··············································································································

Seite 95

1-1 1 GVRP Configuration When configuring GVRP, go to these sections for information you are interested in: z Introduction to GVRP z GVRP Configur

Seite 96

1-2 Through message exchange, all the attribute information to be registered can be propagated to all the GARP-enabled switches in the same LAN. 2)

Seite 97

1-3 Figure 1-1 Format of GARP packets The following table describes the fields of a GARP packet. Table 1-1 Description of GARP packet fields Field

Seite 98 - Configuring a MAC-Based VLAN

1-4 GVRP As an implementation of GARP, GARP VLAN registration protocol (GVRP) maintains dynamic VLAN registration information and propagates the info

Seite 99

1-5 To do ... Use the command ... Remarks Enter system view system-view — Enable GVRP globally gvrp Required By default, GVRP is disabled globally.

Seite 100 - Configuration procedure

1-6 Table 1-2 Relations between the timers Timer Lower threshold Upper threshold Hold 10 centiseconds This upper threshold is less than or equal to

Seite 101

1-7 To do … Use the command … Remarks Display the settings of the GARP timers display garp timer [ interface interface-list ] Display GVRP statisti

Seite 102 - Network diagram

1-8 [SwitchA] interface Ethernet 1/0/2 [SwitchA-Ethernet1/0/2] port link-type trunk [SwitchA-Ethernet1/0/2] port trunk permit vlan all # Enable GVRP

Seite 103

1-1 1 CLI Configuration Introduction to the CLI A command line interface (CLI) is a user interface to interact with a switch. Through the CLI on a s

Seite 104

1-9 The following dynamic VLANs exist: 8 7) Configure Ethernet1/0/1 on Switch E to operate in fixed GVRP registration mode and display the VLAN i

Seite 105 - Static Route Configuration

i Table of Contents 1 Port Basic Configuration ·······································································································

Seite 106

1-1 1 Port Basic Configuration Ethernet Port Configuration Combo Port Configuration Introduction to Combo port A Combo port can operate as either an

Seite 107

1-2 Operation Command Remarks Enable the Ethernet port undo shutdown Optional By default, the port is enabled. Use the shutdown command to disable

Seite 108

1-3 z After you configure auto-negotiation speed(s) for a port, if you execute the undo speed command or the speed auto command, the auto-negotiati

Seite 109 - IP Addressing Configuration

1-4 Table 1-3 Enable flow control on a port Operation Command Remarks Enter system view system-view — Enter Ethernet port view interface interfa

Seite 110 - Subnetting and Masking

1-5 z If you have additionally enabled the loopback port auto-shutdown function on the port, the system will shut down the port, and send log and tr

Seite 111 - Configuring IP Addresses

1-6 Operation Command Remarks Enable loopback detection on a specified port loopback-detection enable Optional By default, the loopback detection

Seite 112

1-7 z external: Performs external loop test. In the external loop test, self-loop headers must be used on the port of the switch ( for 100M port,

Seite 113 - Network requirement

1-8 Enabling the System to Test Connected Cable You can enable the system to test the cable connected to a specific port. The test result will be ret

Seite 114 - IP Performance Configuration

1-2 z Manage level (level 3): Commands at this level are associated with the basic operation modules and support modules of the system. These comman

Seite 115

1-9 status of Ethernet ports in a network changes frequently, large amount of log information may be sent, which increases work load of the log serve

Seite 116

1-10 z With traffic upper and lower thresholds specified on a port, the system periodically collects statistics about the broadcast/multicast traffi

Seite 117

1-11 The port state change delay takes effect when the port goes down but not when the port goes up. Table 1-11 set the port state change delay Op

Seite 118 - 1 Voice VLAN Configuration

1-12 Displaying and Maintaining Basic Port Configuration Table 1-12 Display and maintain basic port configuration Operation Command Remarks Display

Seite 119

1-13 z Only the configuration for Switch A is listed below. The configuration for Switch B is similar to that of Switch A. z This example suppose

Seite 120

i Table of Contents 1 Link Aggregation Configuration ·································································································

Seite 121

1-1 1 Link Aggregation Configuration Overview Introduction to Link Aggregation Link aggregation can aggregate multiple Ethernet ports together to fo

Seite 122

1-2 z S3100 series that support extended LACP functions can be used as intermediate devices in LACP MAD implementation. z For details about IRF,

Seite 123 - Security Mode of Voice VLAN

1-3 manual aggregation group must contain at least one port. When a manual aggregation group contains only one port, you cannot remove the port unles

Seite 124 - Voice VLAN Configuration

1-4 z The ports connected to a peer device different from the one the master port is connected to or those connected to the same peer device as the

Seite 125

1-3 z It is recommended not to change the level of a command arbitrarily, for it may cause inconvenience to maintenance and operation. z When you

Seite 126

1-5 z When the rate or duplex mode of a port in the aggregation group changes, packet loss may occur on this port; z When the rate of a port decrea

Seite 127

1-6 Link Aggregation Configuration z The commands of link aggregation cannot be configured with the commands of port loopback detection feature at

Seite 128

1-7 z If the aggregation group you are creating already exists but contains no port, its type will change to the type you set. z If the aggregation

Seite 129

1-8 Configuring a Dynamic LACP Aggregation Group A dynamic LACP aggregation group is automatically created by the system based on LACP-enabled ports.

Seite 130 - Verification

1-9 Operation Command Remarks Configure a description for an aggregation group link-aggregation group agg-id description agg-name Optional By defau

Seite 131

1-10 Network diagram Figure 1-1 Network diagram for link aggregation configuration Configuration procedure The following only lists the configura

Seite 132 - 1 GVRP Configuration

1-11 3) Adopting dynamic LACP aggregation mode # Enable LACP on Ethernet1/0/1 through Ethernet1/0/3. <Sysname> system-view [Sysname] interface

Seite 133 - GARP message format

i Table of Contents 1 Port Isolation Configuration····································································································

Seite 134

1-1 1 Port Isolation Configuration Port Isolation Overview Through the port isolation feature, you can add the ports to be controlled into an isolat

Seite 135 - GVRP Configuration

1-2 z When a member port of an aggregation group joins/leaves an isolation group, the other ports in the same aggregation group on the local device

Seite 136 - Configuring GVRP Timers

1-4 The high-to-low user level switching is unlimited. However, the low-to-high user level switching requires the corresponding authentication. Gener

Seite 137

1-3 Network diagram Figure 1-1 Network diagram for port isolation configuration Configuration procedure # Add Ethernet1/0/2, Ethernet1/0/3, and Eth

Seite 138 - GVRP Configuration Example

i Table of Contents 1 Port Security Configuration·····································································································

Seite 139

1-1 1 Port Security Configuration When configuring port security, go to these sections for information you are interested in: z Port Security Overv

Seite 140

1-2 Table 1-1 Description of port security modes Security mode Description Feature noRestriction In this mode, access to the port is not restricted

Seite 141

1-3 Security mode Description Feature userLoginSecure MAC-based 802.1x authentication is performed on the access user. The port is enabled only aft

Seite 142 - 1 Port Basic Configuration

1-4 Security mode Description Feature macAddressElseUserLoginSecureExt This mode is similar to the macAddressElseUserLoginSecure mode, except that

Seite 143

1-5 Enabling Port Security Configuration Prerequisites Before enabling port security, you need to disable 802.1x and MAC authentication globally. En

Seite 144

1-6 To do... Use the command... Remarks Enter Ethernet port view interface interface-type interface-number — Set the maximum number of MAC addresse

Seite 145

1-7 If the port-security port-mode mode command has been executed on a port, none of the following can be configured on the same port: z Maximum num

Seite 146

1-8 If you configure the NTK feature and execute the port-security intrusion-mode blockmac command on the same port, the switch will be unable to di

Seite 147 - Enabling Loopback Test

1-5 When both the super password authentication and the HWTACACS authentication are specified, the device adopts the preferred authentication mode f

Seite 148 - Configuring a Port Group

1-9 To do… Use the command… Remarks Enter system view system-view — Set the interval at which the switch triggers MAC address authentication after

Seite 149

1-10 To do... Use the command... Remarks Enter Ethernet port view interface interface-type interface-number — Ignore the authorization information

Seite 150 - Configuration example

1-11 To do... Use the command... Remarks interface interface-type interface-number In Ethernet port view mac-address security mac-address vlan vlan

Seite 151

1-12 To do... Use the command... Remarks Display information about security MAC address configuration display mac-address security [ interface inte

Seite 152

1-13 [Switch-Ethernet1/0/1] quit [Switch] port-security timer disableport 30 Guest VLAN Configuration Example Network requirements As shown in Figure

Seite 153

1-14 [Switch] radius scheme 2000 [Switch-radius-2000] primary authentication 10.11.1.1 1812 [Switch-radius-2000] primary accounting 10.11.1.1 1813 [S

Seite 154 - <Sysname> system-view

2-1 2 Port Binding Configuration When configuring port binding, go to these sections for information you are interested in: z Port Binding Overview

Seite 155

2-2 Configuring Port Binding Follow these steps to configure port binding: To do... Use the command... Remarks Enter system view system-view — In s

Seite 156 - Overview

2-3 Network diagram Figure 2-1 Network diagram for port binding configuration 10.12.1.1/24MAC address: 0001-0002-0003Host A Host BEth1/0/1Switch ASwi

Seite 157 - Manual Aggregation Group

i Table of Contents 1 DLDP Configuration ·············································································································

Seite 158

1-6 Operation Command Description Enter system view system-view — Enter ISP domain view domain domain-name — Set the HWTACACS authentication scheme

Seite 159

1-1 1 DLDP Configuration When configuring DLDP, go to these sections for information you are interested in: z Overview z DLDP Fundamentals z DLDP

Seite 160 - Aggregation Group Categories

1-2 Figure 1-1 Fiber cross-connection Figure 1-2 Fiber broken or not connected Switch AGE1/1/1GE1/1/2Switch BGE1/1/1 GE1/1/2PC Device link detecti

Seite 161

1-3 z The auto-negotiation mechanism at the physical layer detects physical signals and faults. DLDP identifies peer devices and unidirectional link

Seite 162

1-4 DLDP packet type Function LinkDown Linkdown packets are used to notify unidirectional link emergencies (a unidirectional link emergency occurs w

Seite 163

1-5 Status Description DelayDown When a device in the active, advertisement, or probe DLDP state receives a port down message, it does not removes t

Seite 164

1-6 Timer Description DelayDown timer When a device in the active, advertisement, or probe DLDP state receives a port down message, it does not remo

Seite 165

1-7 Figure 1-3 A case for Enhanced DLDP mode z In normal DLDP mode, only fiber cross-connected unidirectional links (as shown in Figure 1-1 ) can

Seite 166

1-8 Table 1-6 The procedure to process a received DLDP packet Packet type Processing procedure If the corresponding neighbor entry does not exist on

Seite 167

1-9 Link Auto-recovery Mechanism If the shutdown mode of a port is set to auto shutdown, the port is set to the DLDP down state when DLDP detects the

Seite 168 - Port Isolation Configuration

1-10 To do … Use the command … Remarks Set the delaydown timer dldp delaydown-timer delaydown-time Optional By default, the delaydown timer expires

Seite 169

Copyright © 2010, Hangzhou H3C Technologies Co., Ltd. and its licensors All Rights Reserved No part of this manual may be reproduced or transmitted in

Seite 170

1-7 # Set the password used by the current user to switch to level 3. [Sysname] super password level 3 simple 123 z A VTY 0 user switches its level

Seite 171

1-11 This function is only applicable to ports that are in DLDP down state. Follow these steps to reset DLDP state: To do … Use the command … Rem

Seite 172 - Port Security Configuration

1-12 Network diagram Figure 1-4 Network diagram for DLDP configuration Switch AGE1/1/1GE1/1/2Switch BGE1/1/1 GE1/1/2PC Configuration procedure 1) C

Seite 173

1-13 When two switches are connected through fibers in a crossed way, two or three ports may be in the disable state, and the rest in the inactive s

Seite 174

i Table of Contents 1 MAC Address Table Management····································································································

Seite 175

1-1 1 MAC Address Table Management When configuring MAC address table management, go to these sections for information you are interested in: z Ove

Seite 176 - Enabling Port Security

1-2 Generally, the majority of MAC address entries are created and maintained through MAC address learning. The following describes the MAC address l

Seite 177

1-3 3) Because the switch broadcasts the packet, both User B and User C can receive the packet. However, User C is not the destination device of the

Seite 178 - Configuring the NTK feature

1-4 Managing MAC Address Table Aging of MAC address table To fully utilize a MAC address table, which has a limited capacity, the switch uses an agin

Seite 179 - Configuring the Trap feature

1-5 MAC Address Replication Configuration The contents of this section are only applicable to the S3100-EI series among S3100 series switches. Over

Seite 180

1-6 With the MAC address replication feature enabled, the switch copies the MAC address entries of the original VLAN to the MAC address table of the

Seite 181

1-8 Table 1-2 lists the CLI views provided by S3100 series Ethernet switches, operations that can be performed in different CLI views and the command

Seite 182

1-7 Configuring a MAC Address Entry You can add, modify, or remove a MAC address entry, remove all MAC address entries concerning a specific port, or

Seite 183

1-8 z When you add a MAC address entry, the current port must belong to the VLAN specified by the vlan argument in the command. Otherwise, the entr

Seite 184

1-9 By setting the maximum number of MAC addresses that can be learned from individual ports, the administrator can control the number of the MAC add

Seite 185

1-10 z If the VLAN is configured as a remote probe VLAN used by port mirroring, you can not disable MAC address learning of this VLAN. Similarly, a

Seite 186 - Port Binding Configuration

1-11 Configuring MAC Address Replication The contents of this section are only applicable to the S3100-EI series among S3100 series switches. Follo

Seite 187 - Configuring Port Binding

1-12 Configuration Example Adding a Static MAC Address Entry Manually Network requirements The server connects to the switch through Ethernet 1/0/2.

Seite 188 - Eth1/0/1

1-13 Figure 1-8 Network diagram for MAC address replication and VLAN marking configuration Eth1/0/1Network192.168.1.0/24NetworkMAC-A VLAN3MAC-A VLAN

Seite 189

1-14 # Configure MAC address replication on Ethernet 1/0/1 to copy the MAC address entries of VLAN 3 to the MAC address table of VLAN 4. [SwitchA-Et

Seite 190 - 1 DLDP Configuration

i Table of Contents 1 MSTP Configuration ·············································································································

Seite 191 - GE1/1/1 GE1/1/2

ii Introduction····································································································································1-4

Seite 192 - DLDP Fundamentals

1-9 View Available operation Prompt example Enter method Quit method FTP client view Configure FTP client parameters [ftp] Execute the ftp command i

Seite 193 - DLDP Status

1-1 1 MSTP Configuration Go to these sections for information you are interested in: z Overview z MSTP Configuration Task List z Configuring Root

Seite 194 - DLDP Timers

1-2 STP identifies the network topology by transmitting BPDUs between STP compliant network devices, typically switches and routers. BPDUs contain su

Seite 195 - DLDP Operating Mode

1-3 Figure 1-1 A schematic diagram of designated bridges and designated ports All the ports on the root bridge are designated ports. 4) Bridge I

Seite 196 - DLDP Implementation

1-4 6) Port ID A port ID used on an H3C device consists of two bytes, that is, 16 bits, where the first six bits represent the port priority, and the

Seite 197 - DLDP Neighbor State

1-5 Table 1-2 Selection of the optimum configuration BPDU Step Description 1 Upon receiving a configuration BPDU on a port, the device performs the

Seite 198 - DLDP Configuration

1-6 Step Description 3 The device compares the calculated configuration BPDU with the configuration BPDU on the port whose role is to be determined,

Seite 199 - Resetting DLDP State

1-7 Device Port name BPDU of port BP1 {1, 0, 1, BP1} Device B BP2 {1, 0, 1, BP2} CP1 {2, 0, 2, CP1} Device C CP2 {2, 0, 2, CP2} z Comparison

Seite 200 - DLDP Configuration Example

1-8 Device Comparison process BPDU of port after comparison z Port CP1 receives the configuration BPDU of Device A {0, 0, 0, AP2}. Device C finds

Seite 201

1-9 Figure 1-3 The final calculated spanning tree To facilitate description, the spanning tree calculation process in this example is simplified,

Seite 202 - [SwitchA] dldp reset

1-10 For this reason, the protocol uses a state transition mechanism. Namely, a newly elected root port and the designated ports must go through a pe

Seite 203

1-10 View Available operation Prompt example Enter method Quit method Advanced IPv6 ACL view Define rules for an advanced IPv6 ACL (with ID ranging

Seite 204 - MAC Address Table Management

1-11 z MSTP supports mapping VLANs to Multiple Spanning Tree (MST) instances (MSTIs) by means of a VLAN-to-instance mapping table. MSTP introduces i

Seite 205 - User B User C

1-12 3) MSTI A multiple spanning tree instance (MSTI) refers to a spanning tree in an MST region. Multiple spanning trees can be established in one M

Seite 206

1-13 z A region boundary port is located on the boundary of an MST region and is used to connect one MST region to another MST region, an STP-enable

Seite 207 - Managing MAC Address Table

1-14 z Forwarding state. Ports in this state can forward user packets and receive/send BPDUs. z Learning state. Ports in this state can receive/sen

Seite 208

1-15 In addition to the basic MSTP functions, H3C series switches also provide the following functions for users to manage their switches. z Root br

Seite 209

1-16 Task Remarks Configuring the Timeout Time Factor Optional Configuring the Maximum Transmitting Rate on the Current Port Optional The default v

Seite 210

1-17 Configuring Root Bridge Configuring an MST Region Configuration procedure Follow these steps to configure an MST region: To do... Use the comma

Seite 211

1-18 z MSTP-enabled switches are in the same region only when they have the same format selector (a 802.1s-defined protocol selector, which is 0 by

Seite 212

1-19 Specify the current switch as the secondary root bridge of a spanning tree Follow these steps to specify the current switch as the secondary roo

Seite 213

1-20 Configuring the Bridge Priority of the Current Switch Root bridges are selected according to the bridge priorities of switches. You can make a s

Seite 214

1-11 View Available operation Prompt example Enter method Quit method PKI entity view Configure PKI entity parameters [Sysname-pki-entity-en] Execut

Seite 215 - Configuration Example

1-21 In auto mode, if a port frequently receives MSTP packets of different formats alternately, the port will be forcibly placed in the discarding s

Seite 216

1-22 z STP-compatible mode, where the ports of a switch send STP BPDUs to neighboring devices. If STP-enabled switches exist in a switched network,

Seite 217 - [SwitchA-Ethernet1/0/1] quit

1-23 To do... Use the command... Remarks Configure the maximum hop count of the MST region stp max-hops hops Required By default, the maximum hop c

Seite 218

1-24 Configuration procedure Follow these steps to configure MSTP time-related parameters: To do... Use the command... Remarks Enter system view sy

Seite 219

1-25 Configuration example # Configure the forward delay parameter to be 1,600 centiseconds, the hello time parameter to be 300 centiseconds, and the

Seite 220 - 1 MSTP Configuration

1-26 To do... Use the command... Remarks Enter system view system-view — Configure the maximum transmitting rate for specified ports stp interface

Seite 221 - Basic concepts in STP

1-27 To do... Use the command... Remarks Configure the specified ports as edge ports stp interface interface-list edged-port enable Required By def

Seite 222

1-28 You can determine whether or not the link connected to a port is a point-to-point link in one of the following two ways. Setting the Link Type o

Seite 223 - How STP works

1-29 Enabling MSTP Configuration procedure Follow these steps to enable MSTP in system view: To do... Use the command... Remarks Enter system view sy

Seite 224

1-30 [Sysname-Ethernet1/0/1] stp disable Configuring Leaf Nodes Configuring the MST Region Refer to Configuring an MST Region. Configuring How a Port

Seite 225

1-12 The shortcut key <Ctrl+Z> is equivalent to the return command. CLI Features Online Help When configuring the switch, you can use the on

Seite 226

1-31 Table 1-7 Transmission rates vs. path costs Rate Operation mode (half-/full-duplex) 802.1D-1998 IEEE 802.1t Latency standard 0 — 65,535 200,0

Seite 227

1-32 Follow these steps to configure the path cost for a port in Ethernet port view: To do... Use the command... Remarks Enter system view system-v

Seite 228

1-33 Configure port priority in system view Follow these steps to configure port priority in system view: To do... Use the command... Remarks Enter

Seite 229 - Why MSTP

1-34 Performing mCheck Operation Ports on an MSTP-enabled switch can operate in three modes: STP-compatible, RSTP-compatible, and MSTP. If a port on

Seite 230 - Basic MSTP Terminology

1-35 [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] stp mcheck Configuring Guard Functions The following guard functions are available on

Seite 231

1-36 Configuring Root Guard A root bridge and its secondary root bridges must reside in the same region. The root bridge of the CIST and its secondar

Seite 232

1-37 Configuration example # Enable the root guard function on Ethernet 1/0/1. 1) Perform this configuration in system view <Sysname> system-v

Seite 233 - Principle of MSTP

1-38 Configuration example # Enable the loop guard function on Ethernet 1/0/1. <Sysname> system-view [Sysname] interface Ethernet 1/0/1 [Sysnam

Seite 234 - MSTP Configuration Task List

1-39 # Set the maximum times for the switch to remove the MAC address table and ARP entries within 10 seconds to 5. <Sysname> system-view [Sysn

Seite 235

1-40 Configuring Digest Snooping Introduction According to IEEE 802.1s, two interconnected switches can communicate with each other through MSTIs in

Seite 236 - Configuring Root Bridge

1-13 Partial online help 1) Enter a character/string, and then a question mark (?) next to it. All the commands beginning with the character/string

Seite 237

1-41 To do... Use the command... Remarks Return to system view quit — Enable the digest snooping feature globally stp config-digest-snooping Requir

Seite 238

1-42 Figure 1-6 and Figure 1-7 illustrate the rapid transition mechanisms on designated ports in RSTP and MSTP. Figure 1-6 The RSTP rapid transition

Seite 239

1-43 upstream designated ports, instead of waiting for agreement packets from the upstream switch. This enables designated ports of the upstream swit

Seite 240

1-44 z The rapid transition feature can be enabled on only root ports or alternate ports. z If you configure the rapid transition feature on a des

Seite 241

1-45 Configuring VLAN-VPN tunnel Follow these steps to configure VLAN-VPN tunnel: To do... Use the command... Remarks Enter system view system-view

Seite 242

1-46 Configuration Example # Enable log/trap output for the ports of instance 1. <Sysname> system-view [Sysname] stp instance 1 portlog # Enab

Seite 243

1-47 To do... Use the command... Remarks Display information about the root port of the instance where the switch reside display stp root Clear sta

Seite 244

1-48 [Sysname-mst-region] region-name example [Sysname-mst-region] instance 1 vlan 10 [Sysname-mst-region] instance 3 vlan 30 [Sysname-mst-region] in

Seite 245

1-49 [Sysname-mst-region] region-name example [Sysname-mst-region] instance 1 vlan 10 [Sysname-mst-region] instance 3 vlan 30 [Sysname-mst-region] in

Seite 246

1-50 # Add Ethernet 1/0/1 to VLAN 10. [Sysname] vlan 10 [Sysname-Vlan10] port Ethernet 1/0/1 3) Configure Switch C # Enable MSTP. <Sysname> sy

Seite 247

1-14 Purpose Operation Remarks Recall the next history command Press the down arrow key or <Ctrl+N> This operation recalls the next history c

Seite 248 - Enabling MSTP

1-51 [Sysname-GigabitEthernet1/0/1] port trunk permit vlan all

Seite 249 - Configuring Leaf Nodes

i Table of Contents 1 Multicast Overview ·············································································································

Seite 250

ii Introduction to MLD Snooping·········································································································3-1 Basic Conc

Seite 251 - Configuring Port Priority

iii Configuration Prerequisites ·············································································································4-3 Confi

Seite 252

1-1 1 Multicast Overview Multicast Overview With development of networks on the Internet, more and more interaction services such as data, voice, an

Seite 253 - Performing mCheck Operation

1-2 Information Transmission in the Broadcast Mode When you adopt broadcast, the system transmits information to all users on a network. Any user on

Seite 254 - Configuring Guard Functions

1-3 Figure 1-3 Information transmission in the multicast mode Assume that Hosts B, D and E need the information. To transmit the information to th

Seite 255 - Configuring Root Guard

1-4 Table 1-1 An analogy between TV transmission and multicast transmission Step TV transmission Multicast transmission 1 A TV station transmits

Seite 256 - Configuring Loop Guard

1-5 ASM model In the ASM model, any sender can become a multicast source and send information to a multicast group; numbers of receivers can join a m

Seite 257

1-6 Multicast Address As receivers are multiple hosts in a multicast group, you should be concerned about the following questions: z What destinati

Seite 258 - Configuring BPDU Dropping

1-15 Press… To… Left arrow key or <Ctrl+B> Move the cursor one character to the left. Right arrow key or <Ctrl+F> Move the cursor one

Seite 259 - Configuring Digest Snooping

1-7 Class D address range Description 232.0.0.0 to 232.255.255.255 Available source-specific multicast (SSM) multicast group addresses. 239.0.0.0 to

Seite 260 - Configuring Rapid Transition

1-8 Figure 1-4 IPv6 multicast format Referring to Figure 1-4, the meanings of the fields of an IPv6 multicast address are as follows: z 0xFF: Th

Seite 261

1-9 Value Meaning E Global scope Group ID: 112 bits, IPv6 multicast group identifier that uniquely identifies an IPv6 multicast group in the scope

Seite 262

1-10 Multicast Protocols z Generally, we refer to IP multicast working at the network layer as Layer 3 multicast and the corresponding multicast p

Seite 263 - Configuring VLAN-VPN Tunnel

1-11 2) Multicast routing protocols A multicast routing protocol runs on Layer 3 multicast devices to establish and maintain multicast routes and fo

Seite 264 - Introduction

1-12 In the traditional multicast-on-demand mode, when users in different VLANs on a Layer 2 device need multicast information, the upstream Layer 3

Seite 265

1-13 using the RPF interface as the incoming interface, and installs the entry into the multicast forwarding table. z If the interface on which the

Seite 266 - MSTP Configuration Example

1-14 the interface on which the packet actually arrived. The RPF check succeeds and the packet is forwarded.

Seite 267

2-1 2 IGMP Snooping Configuration IGMP Snooping Overview Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mec

Seite 268

2-2 Figure 2-2 IGMP Snooping related ports Router A Switch ASwitch BEth1/0/1 Eth1/0/2Eth1/0/3Eth1/0/1Eth1/0/2ReceiverReceiverHost AHost BHost CHost D

Seite 269

i Table of Contents 1 Logging into an Ethernet Switch ································································································

Seite 270

2-3 z If the receiving port is a router port existing in its router port list, the switch resets the aging timer of this router port. z If the rec

Seite 271

2-4 z If any IGMP report in response to the group-specific query arrives to the member port before its aging timer expires, this means that some oth

Seite 272

2-5 Operation Command Remarks Enable IGMP Snooping globally igmp-snooping enable Required By default, IGMP Snooping is disabled globally. Enter VLA

Seite 273

2-6 Configuring Timers This section describes how to configure the aging timer of the router port, the aging timer of the multicast member ports,. Ta

Seite 274 - 1 Multicast Overview

2-7 z The fast leave processing function works for a port only if the host attached to the port runs IGMPv2 or IGMPv3. z The configuration perform

Seite 275

2-8 Operation Command Remarks Configure a multicast group filter igmp-snooping group-policy acl-number [ vlan vlan-list ] Optional No group filter

Seite 276 - Roles in Multicast

2-9 z To prevent bursting traffic in the network or performance deterioration of the device caused by excessive multicast groups, you can set the m

Seite 277 - Multicast Models

2-10 Operation Command Remarks Enable IGMP Snooping igmp-snooping enable Required By default, IGMP Snooping is disabled. Enter VLAN view vlan vlan-

Seite 278 - Multicast Architecture

2-11 Table 2-11 Suppress flooding of unknown multicast traffic in the VLAN Operation Command Remarks Enter system view system-view — Enable unkno

Seite 279 - Multicast Address

2-12 Operation Command Remarks Configure specified port(s) as static member port(s) of a multicast group in the VLAN multicast static-group group-

Seite 280

1 Preface H3C S3100 Series Ethernet Switches Operation Manual-Release 22XX Series describes the software features for the H3C S3100 Series Ethernet Sw

Seite 281

ii Configuration on the Switch Side············································································································4-1 Mod

Seite 282 - E Global scope

2-13 z When receiving an IGMP general query, the simulated host responds with an IGMP report. Meanwhile, the switch sends the same IGMP report to it

Seite 283 - Multicast Protocols

2-14 It is not recommended to configure this function while the multicast VLAN function is in effect. Configuring Multicast VLAN In traditional mul

Seite 284 - Layer 2 multicast protocols

2-15 Operation Command Remarks Enable IGMP Snooping igmp-snooping enable — Enter VLAN view vlan vlan-id — Enable IGMP Snooping igmp-snooping enab

Seite 285

2-16 Table 2-20 Display and maintain IGMP Snooping Operation Command Remarks Display the current IGMP Snooping configuration display igmp-snooping

Seite 286

2-17 2) Configure Router A # Enable IP multicast routing, enable PIM-DM on each interface, and enable IGMP on Ethernet1/0/1. <RouterA> system

Seite 287

2-18 Configuring Multicast VLAN Network requirements As shown in Figure 2-4, Workstation is a multicast source. Switch A forwards multicast data from

Seite 288 - IGMP Snooping Configuration

2-19 1) Configure Switch A: # Set the interface IP address of VLAN 20 to 168.10.1.1 and enable PIM DM on the VLAN interface. <SwitchA> system-

Seite 289 - Eth1/0/2

2-20 [SwitchB] interface Ethernet 1/0/2 [SwitchB-Ethernet1/0/2] port link-type hybrid [SwitchB-Ethernet1/0/2] port hybrid vlan 3 10 untagged [SwitchB

Seite 290

3-1 3 MLD Snooping Configuration Only the S3100-EI series support MLD Snooping Configuration. When configuring MLD snooping, go to these sections

Seite 291

3-2 Figure 3-1 Before and after MLD snooping is enabled on the Layer 2 device IPv6 multicast packet transmission without MLD SnoopingSourceMulticast

Seite 292

1-1 1 Logging into an Ethernet Switch Logging into an Ethernet Switch You can log into an S3100 Ethernet switch in one of the following ways: z Log

Seite 293 - Configuring Timers

3-3 Ports involved in MLD snooping, as shown in Figure 3-2, are described as follows: z Router port: A router port is a port on the Ethernet switch

Seite 294

3-4 The description about adding or deleting a port in this section is only for a dynamic port. Static ports can be added or deleted only through th

Seite 295

3-5 Done messages When a host leaves an IPv6 multicast group, the host sends an MLD done message to the multicast router. When the switch receives a

Seite 296

3-6 Figure 3-3 Network diagram for MLD snooping proxying As shown in Figure 3-3, Switch A works as an MLD Snooping proxy. As a host from the persp

Seite 297

3-7 MLD Snooping Configuration Task List Complete these tasks to configure MLD snooping: Task Remarks Enabling MLD Snooping Required Configuring

Seite 298 - In VLAN interface view

3-8 Configuring Basic Functions of MLD Snooping Configuration Prerequisites Before configuring the basic functions of MLD snooping, complete the foll

Seite 299 - In VLAN view

3-9 If you switch MLD snooping from version 2 to version 1, the system will clear all MLD snooping forwarding entries from dynamic joining, and wil

Seite 300

3-10 Configuring Aging Timers for Dynamic Ports If the switch receives no MLD general queries or IPv6 PIM hello messages on a dynamic router port, th

Seite 301 - Configuring Multicast VLAN

3-11 To do... Use the command... Remarks Configure the port(s) as static member port(s) mld-snooping static-group ipv6-group-address [ source-ip i

Seite 302

3-12 z Each simulated host is equivalent to an independent host. For example, when receiving an MLD query, the simulated host corresponding to each

Seite 303

1-2 z VTY user interface indexes follow AUX user interface indexes. The first absolute VTY user interface is numbered 1, the second is 2, and so on.

Seite 304

3-13 Configuring MLD Snooping Querier Configuration Prerequisites Before configuring MLD snooping querier, complete the following task: z Enable M

Seite 305

3-14 the maximum response time (the host obtains the value of the maximum response time from the Max Response Time field in the MLD query it received

Seite 306

3-15 Configuring Source IPv6 Addresses of MLD Queries This configuration allows you to change the source IPv6 address of MLD queries. Follow these s

Seite 307 - [SwitchB-Ethernet1/0/2] quit

3-16 Configuring a Source IPv6 Address for the MLD Messages Sent by the Proxy You can set the source IPv6 addresses in the MLD reports and done messa

Seite 308 - MLD Snooping Configuration

3-17 Configuring MLD Report Suppression When a Layer 2 device receives an MLD report from an IPv6 multicast group member, the Layer 2 device forward

Seite 309

3-18 z When the number of IPv6 multicast groups that can be joined on a port reaches the maximum number configured, the system deletes all the forw

Seite 310 - How MLD Snooping Works

3-19 To do... Use the command... Remarks Enable IPv6 multicast group replacement mld-snooping overflow-replace [ vlan vlan-list ] Required Disable

Seite 311 - Membership reports

3-20 To do… Use the command... Remarks Clear the statistics information of all kinds of MLD messages learned by MLD snooping reset mld-snooping st

Seite 312 - MLD Snooping Proxying

3-21 Enable IPv6 forwarding and configure an IPv6 address and prefix length for each interface as per Figure 3-4. The detailed configuration steps ar

Seite 313 - Protocols and Standards

3-22 Port flags: D-Dynamic port, S-Static port, C-Copy port Subvlan flags: R-Real VLAN, C-Copy VLAN Vlan(id):100. Total 1 IP Group(s).

Seite 314

2-1 2 Logging in through the Console Port Introduction To log in through the Console port is the most common way to log into a switch. It is also th

Seite 315 - Enabling MLD Snooping

3-23 If no static router port is configured, when the path of Switch A—Switch B—Switch C gets blocked, at least one MLD query-response cycle must be

Seite 316

3-24 # Enable MLD snooping globally. <SwitchA> system-view [SwitchA] mld-snooping [SwitchA-mld-snooping] quit # Create VLAN 100, assign Etherne

Seite 317 - Configuring Static Ports

3-25 Total 1 IP Group(s). Total 1 IP Source(s). Total 1 MAC Group(s). Port flags: D-Dynamic port, S-Static port, C-Copy port Subvlan flags

Seite 318

3-26 As shown above, Ethernet 1/0/3 and Ethernet 1/0/5 on Switch C have become static member ports for IPv6 multicast group FF1E::101. MLD Snooping Q

Seite 319

3-27 [SwitchA-vlan100] mld-snooping querier [SwitchA-vlan100] quit 2) Configure Switch B # Enable IPv6 forwarding and enable MLD snooping globally.

Seite 320

3-28 Figure 3-7 Network diagram for MLD snooping proxying configuration SourceReceiverHost BHost AHost C1::1/64Eth1/0/4Eth1/0/2Eth1/0/3Eth1/0/1Eth1/0

Seite 321

3-29 After the configuration is completed, Host A and Host B send MLD join messages addressed to group FF1E::101. When receiving the messages, Switch

Seite 322

3-30 Port flags: D-Dynamic port, S-Static port, C-Copy port Subvlan flags: R-Real VLAN, C-Copy VLAN Vlan(id):100. Total 1 IP Group(s).

Seite 323

4-1 4 IPv6 Multicast VLAN Configuration Only the S3100-EI series support IPv6 Multicast VLAN Configuration. When configuring IPv6 multicast VLAN,

Seite 324

4-2 As shown in Figure 4-2, Host A, Host B and Host C are in three different user VLANs. All the user ports are hybrid ports. On Switch A, configure

Seite 325

2-2 2) If you use a PC to connect to the Console port, launch a terminal emulation utility (such as Terminal in Windows XP/Windows 2000. The followi

Seite 326

4-3 Configuring IPv6 Multicast VLAN When configuring port-based IPv6 multicast VLAN, you need to configure the attributes of each user port and then

Seite 327

4-4 Configuring IPv6 Multicast VLAN Ports In this approach, you need to configure a VLAN as an IPv6 multicast VLAN and then assign user ports to thi

Seite 328

4-5 IPv6 Multicast VLAN Configuration Examples Network requirements z As shown in Figure 4-3, Router A connects to an IPv6 multicast source (Source

Seite 329

4-6 [RouterA-Ethernet1/0/1] ipv6 pim dm [RouterA-Ethernet1/0/1] quit [RouterA] interface ethernet 1/0/2 [RouterA-Ethernet1/0/2] ipv6 pim dm [RouterA-

Seite 330

4-7 # View the MLD Snooping multicast group information on Switch A. [SwitchA] display mld-snooping group Total 1 IP Group(s). Total 1 IP Source(

Seite 331

5-1 5 Multicast User Control Policy Configuration Only the S3100-EI series support multicast user control policy configuration. IPv4 Multicast Us

Seite 332

5-2 To do... Use the command... Remarks Configure the mode to apply a QoS profile as user-based undo qos-profile port-based z If the 802.1x authe

Seite 333

5-3 Figure 5-1 Network diagram for IPv4 multicast user control policy configuration Switch BReceiverHost AHost BEth1/0/2Eth1/0/3Eth1/0/1Source 11.1.1

Seite 334

5-4 [SwitchB] igmp-snooping enable # Create VLAN 103, assign Ethernet 1/0/1 through Ethernet 1/0/3 to this VLAN, and enable IGMP snooping in this VLA

Seite 335

5-5 # Display information about IGMP snooping multicast groups in VLAN 103 on Switch B. [SwitchB] display igmp-snooping group vlan 103 verbose Tota

Seite 336

2-3 Figure 2-4 Set port parameters 3) Turn on the switch. You will be prompted to press the Enter key if the switch successfully completes POST (p

Seite 337 - Troubleshooting MLD Snooping

5-6 is then processed as per the rule), the rule order is important in determining which match criteria will apply. Two rule orders are available fo

Seite 338

5-7 A bigger step means more numbering flexibility. This is helpful when the config rule order is adopted, with which ACL rules are sorted in ascendi

Seite 339 - Configuration task Remarks

5-8 z You can only modify the existing rules of an ACL that uses the rule order of config. When modifying a rule of such an ACL, you may choose to c

Seite 340

5-9 To do… Use the command… Remarks Set the rule numbering step step step-value Optional 5 by default Configure a description for the advanced IP

Seite 341

5-10 z The source IPv6 ACL and the destination IPv6 ACL must be of the same type. z The destination ACL does not take the name of the source IPv6

Seite 342

5-11 To do... Use the command... Remarks Configure an IPv6 multicast group filter mld-snooping group-policy acl6-number [ vlan vlan-list ] Require

Seite 343

5-12 z For details about the qos-profile, qos-profile port-based and undo qos-profile port-based commands, refer to QoS-QoS Profile Operation. z A

Seite 344

5-13 # Create VLAN 101 through VLAN 104 and assign Ethernet 1/0/1 through Ethernet 1/0/3 to the four VLANs respectively. <SwitchA> system-view

Seite 345

5-14 [SwitchB-radius-scheme1] primary accounting 2::1 [SwitchB-radius-scheme1] key accounting 321123 [SwitchB-radius-scheme1] user-name-format withou

Seite 346

5-15 MAC group address:3333-0000-0101 Host port(s):total 1 port. Eth1/0/3 As shown above, Ethernet 1/0/3 on Switch B has

Seite 347 - Configuration procedures

2-4 Console Port Login Configuration Common Configuration Table 2-2 lists the common configuration of Console port login. Table 2-2 Common configurat

Seite 348

6-1 6 Common Multicast Configuration Common Multicast Configuration Table 6-1 Common multicast configuration tasks Configuration task Remarks Conf

Seite 349 - IPv6 ACL Overview

6-2 Configuring multicast source port suppression in Ethernet port view Table 6-3 Configure multicast source port suppression in Ethernet port view O

Seite 350

6-3 z If the multicast MAC address entry to be created already exists, the system gives you a prompt. z If you want to add a port to a multicast M

Seite 351 - IPv6 ACL Configuration

6-4 Table 6-7 Display common multicast configuration Operation Command Remarks Display the statistics information about multicast source port suppr

Seite 352

i Table of Contents 1 802.1x Configuration············································································································

Seite 353 - Copying an IPv6 ACL

ii 4 System-Guard Configuration (For S3100-EI)··························································································4-1 System-Gua

Seite 354

1-1 1 802.1x Configuration Introduction to 802.1x The 802.1x protocol (802.1x for short) was developed by IEEE802 LAN/WAN committee to address secur

Seite 355

1-2 stores user information, such as user name, password, the VLAN a user belongs to, priority, and the ACLs (access control list) applied. The four

Seite 356

1-3 Figure 1-2 The mechanism of an 802.1x authentication system z EAP protocol packets transmitted between the supplicant system PAE and the authe

Seite 357

1-4 z The Packet body field differs with the Type field. Note that EAPoL-Start, EAPoL-Logoff, and EAPoL-Key packets are only transmitted between the

Seite 358

2-5 Table 2-3 Console port login configurations for different authentication modes Authentication mode Console port login configuration Remarks None

Seite 359 - Eth1/0/3

1-5 fragmented and are encapsulated in multiple EAP-message fields. The type code of the EAP-message field is 79. Figure 1-6 The format of an EAP-mes

Seite 360

1-6 Figure 1-8 802.1x authentication procedure (in EAP relay mode) Supplicant SystemPAERADUIS serverEAPOLEAPOREAPOL-StartEAP-Request / IdentityEAP-Re

Seite 361

1-7 z The RADIUS server compares the received encrypted password (contained in a RADIUS access-request packet) with the locally-encrypted password.

Seite 362

1-8 Figure 1-9 802.1x authentication procedure (in EAP terminating mode) Supplicant system PAEAuthenticator system PAERADIUS serverEAPOLRADIUSEAPOL-

Seite 363

1-9 request packet if it does not receive the response from the RADIUS server when this timer times out. z Supplicant system timer (supp-timeout). T

Seite 364

1-10 z The 802.1x client needs to capable of detecting multiple network adapters, proxies, and IE proxies. z The CAMS server is configured to disab

Seite 365

1-11 If a user of a port in the guest VLAN initiates authentication but fails the authentication, the port will be added to the Auth-Fail VLAN config

Seite 366 - 1 802.1x Configuration

1-12 z If the authentication server assigns a VLAN, the port joins the assigned VLAN. After the user goes offline, the port returns to its initial V

Seite 367 - The way a port is controlled

1-13 Figure 1-10 802.1x re-authentication PCInternetPC PCRADIUS ServerSwitch 802.1x re-authentication can be enabled in one of the following two way

Seite 368

1-14 z 802.1x users use domain names to associate with the ISP domains configured on switches z Configure the AAA scheme (a local authentication s

Seite 369 - The format of an EAP packet

2-6 Operation Command Description Configure not to authenticate users authentication-mode none Required By default, users logging in through the Co

Seite 370 - EAP relay mode

1-15 Operation Command Remarks quit In system view dot1x port-method { macbased | portbased } [ interface interface-list ] interface interface-type

Seite 371

1-16 z 802.1x configurations take effect only after you enable 802.1x both globally and for specified ports. z If you enable 802.1x for a port, yo

Seite 372 - EAP terminating mode

1-17 Operation Command Remarks Set 802.1x timers dot1x timer { handshake-period handshake-period-value | quiet-period quiet-period-value | server-t

Seite 373

1-18 authentication domains for different ports even if the user certificates are from the same certificate authority (that is, the user domain names

Seite 374

1-19 Configuring Proxy Checking Table 1-4 Configure proxy checking Operation Command Remarks Enter system view system-view — Enable proxy checking

Seite 375 - The Guest VLAN function

1-20 Operation Command Remarks Set the client version checking period timer dot1x timer ver-period ver-period-value Optional By default, the timer

Seite 376 - Auth-Fail VLAN

1-21 Configuring Guest VLAN Table 1-8 Configure a guest VLAN Operation Command Remarks Enter system view system-view — In system view dot1x guest-v

Seite 377

1-22 z At present, only the S3100-EI series supports the Auth-Fail VLAN function. z Different ports can be configured with different Auth-Fail VLA

Seite 378 - Internet

1-23 2) The switch uses the value configured with the dot1x timer reauth-period command as the re-authentication interval for access users. Note the

Seite 379 - Basic 802.1x Configuration

1-24 z The switch is connected to a server comprising of two RADIUS servers whose IP addresses are 10.11.1.1 and 10.11.1.2. The RADIUS server with a

Seite 380

2-7 Configuration Example Network requirements Assume that the switch is configured to allow users to log in through Telnet, and the user level is se

Seite 381

1-25 # Create a RADIUS scheme named “radius1” and enter RADIUS scheme view. [Sysname] radius scheme radius1 # Assign IP addresses to the primary auth

Seite 382

1-26 802.1X Mandatory Authentication Domain Configuration Example Network Requirements As shown in Figure 1-13, Host A (an 802.1X user) and Host B (a

Seite 383

1-27 [Switch-isp-aabbcc] scheme radius-scheme radius1 [Switch-isp-aabbcc] quit # Configure RADIUS scheme radius1. [Switch] radius scheme radius1 [Sw

Seite 384 - Configuring Proxy Checking

2-1 2 Quick EAD Deployment Configuration The configuration introduced in this chapter is only supported by the S3100-EI series switches. Introduc

Seite 385

2-2 Configuring Quick EAD Deployment Configuration Prerequisites z Enable 802.1x on the switch. z Set the access mode to auto for 802.1x-enabled po

Seite 386 - Configuring Guest VLAN

2-3 You can control the usage of ACL resources by setting the ACL timer. The ACL timer starts once a user gets online. If the user has not passed aut

Seite 387

2-4 Network diagram Figure 2-1 Network diagram for quick EAD deployment Configuration procedure Before enabling quick EAD deployment, be sure tha

Seite 388

2-5 Troubleshooting Symptom: A user cannot be redirected to the specified URL server, no matter what URL the user enters in the IE address bar. Solu

Seite 389

3-1 3 HABP Configuration Introduction to HABP With 802.1x enabled, a switch authenticates and then authorizes 802.1x-enabled ports. Packets can be f

Seite 390

3-2 HABP Client Configuration HABP clients reside on switches attached to HABP servers. After you enable HABP for a switch, the switch operates as an

Seite 391 - Network Requirements

2 Part Features 05-Static Route Operation z Introduction to static route z Static route configuration z Troubleshooting a static route 06-IP Addre

Seite 392 - # Enable 802.1X globally

2-8 After the above configuration, you need to modify the configuration of the terminal emulation utility running on the PC accordingly in the dialog

Seite 393 - HTTP redirection

4-1 4 System-Guard Configuration (For S3100-EI) The configuration introduced in this chapter is only supported by the S3100-EI series switches. S

Seite 394

4-2 Operation Command Description Set the length of the isolation after an attack is detected system-guard timer-interval isolate-timerOptional By

Seite 395

5-1 5 System-Guard Configuration (For S3100-SI) The configuration introduced in this chapter is only supported by the S3100-SI series switches. S

Seite 396

5-2 Table 5-2 Configure system-guard related parameters Operation Command Description Enter system view system-view — Configure system-guard-relate

Seite 397 - Troubleshooting

i Table of Contents 1 AAA Overview····················································································································

Seite 398 - 3 HABP Configuration

ii Per User Type AAA Configuration Example··················································································2-31 Remote RADIUS Authent

Seite 399 - Displaying HABP

1-1 1 AAA Overview Introduction to AAA AAA is the acronym for the three security functions: authentication, authorization and accounting. It provide

Seite 400 - System-Guard Overview

1-2 Accounting AAA supports the following accounting methods: z None accounting: No accounting is performed for users. z Local accounting: It is no

Seite 401

1-3 Introduction to AAA Services Introduction to RADIUS AAA is a management framework. It can be implemented by not only one protocol. But in practic

Seite 402 - System-Guard Configuration

1-4 the authentication response message. Figure 1-3 depicts the message exchange procedure between user, switch and RADIUS server. Figure 1-3 Basic m

Seite 403

2-9 Operation Command Description Set the timeout time for the user interface idle-timeout minutes [ seconds ] Optional The default timeout time o

Seite 404

1-5 Figure 1-4 RADIUS message format 2) The Code field (one byte) decides the type of RADIUS message, as shown in Table 1-1. Table 1-1 Descriptio

Seite 405

1-6 5) The Authenticator field (16 bytes) is used to authenticate the response from the RADIUS server; and is used in the password hiding algorithm.

Seite 406 - 1 AAA Overview

1-7 Figure 1-5 depicts the format of attribute 26. The Vendor-ID field used to identify a vendor occupies four bytes, where the first byte is 0, and

Seite 407 - Introduction to ISP Domain

1-8 Figure 1-6 Network diagram for a typical HWTACACS application HostHWTACACS clientHWTACACS serverHWTACACS server Basic message exchange procedure

Seite 408 - Introduction to AAA Services

1-9 1) A user sends a login request to the switch acting as a TACACS client, which then sends an authentication start request to the TACACS server.

Seite 409 - RADIUS message format

2-1 2 AAA Configuration AAA Configuration Task List Configuration introduction You need to configure AAA to provide network access services for lega

Seite 410

2-2 Task Remarks Cutting Down User Connections Forcibly Optional Creating an ISP Domain and Configuring Its Attributes Table 2-3 Create an ISP dom

Seite 411

2-3 z If you have configured to use "." as the delimiter, for a user name that contains multiple ".", the first "." wi

Seite 412 - Introduction to HWTACACS

2-4 Operation Command Remarks Create an ISP domain and enter its view, or enter the view of an existing ISP domain domain isp-name Required Config

Seite 413 - HWTACACS server

2-5 z You can execute the scheme radius-scheme radius-scheme-name command to adopt an already configured RADIUS scheme to implement all the three A

Seite 414

2-10 # Set the local password to 123456 (in plain text). [Sysname-ui-aux0] set authentication password simple 123456 # Specify commands of level 2 ar

Seite 415 - 2 AAA Configuration

2-6 z Local authentication (local): Authentication is performed by the NAS, which is configured with the user information, including the usernames,

Seite 416

2-7 Operation Command Remarks Specify the default authorization method for all types of users authorization { local | none | hwtacacs-scheme hwtaca

Seite 417

2-8 Configuring Dynamic VLAN Assignment The dynamic VLAN assignment feature enables a switch to dynamically add the switch ports of successfully auth

Seite 418

2-9 z In string mode, if the VLAN ID assigned by the RADIUS server is a character string containing only digits (for example, 1024), the switch fir

Seite 419

2-10 Operation Command Remarks Configure the authorization VLAN for the local user authorization vlan string Required By default, no authorization

Seite 420

2-11 You can use the display connection command to view the connections of Telnet users, but you cannot use the cut connection command to cut down

Seite 421

2-12 Task Remarks Configuring the Type of RADIUS Servers to be Supported Optional Configuring the Status of RADIUS Servers Optional Configuring th

Seite 422

2-13 Operation Command Remarks Enable RADIUS authentication port radius client enable Optional By default, RADIUS authentication port is enabled. C

Seite 423

2-14 z The authentication response sent from the RADIUS server to the RADIUS client carries authorization information. Therefore, you need not (and

Seite 424

2-15 Follow these steps to configure the RADIUS authorization attribute ignoring function: To do… Use the command… Remarks Enter system view system

Seite 425

2-11 Operation Command Description Configure to authenticate users locally or remotely authentication-mode scheme [ command- authorization ] Requir

Seite 426 - Creating a RADIUS Scheme

2-16 Configuring RADIUS Accounting Servers Table 2-14 Configure RADIUS accounting servers Operation Command Remarks Enter system view system-view —

Seite 427

2-17 z In an actual network environment, you can specify one server as both the primary and secondary accounting servers, as well as specifying two

Seite 428

2-18 The authentication/authorization shared key and the accounting shared key you set on the switch must be respectively consistent with the shared

Seite 429

2-19 z If you change the type of RADIUS server, the data stream destined to the original RADIUS server will be restored to the default unit. z Whe

Seite 430

2-20 Configuring the Attributes of Data to be Sent to RADIUS Servers Table 2-19 Configure the attributes of data to be sent to RADIUS servers Operati

Seite 431

2-21 z Generally, the access users are named in the userid@isp-name or userid.isp-name format. Here, isp-name after the “@” or “.” character repres

Seite 432

2-22 z If you adopt the local RADIUS authentication server function, the UDP port number of the authentication/authorization server must be 1645, t

Seite 433

2-23 Operation Command Remarks Create a RADIUS scheme and enter its view radius scheme radius-scheme-name Required By default, a RADIUS scheme name

Seite 434

2-24 In an environment that a CAMS server is used to implement AAA functions, if the switch reboots after an exclusive user (a user whose concurrent

Seite 435

2-25 HWTACACS Configuration Task List Table 2-24 HWTACACS configuration tasks Task Remarks Creating an HWTACACS Scheme Required Configuring TACACS

Seite 436

2-12 Configuration Example Network requirements Assume the switch is configured to allow users to log in through Telnet, and the user level is set to

Seite 437

2-26 Operation Command Remarks Set the IP address and port number of the primary TACACS authentication server primary authentication ip-address [ p

Seite 438

2-27 Configuring TACACS Accounting Servers Table 2-28 Configure TACACS accounting servers Operation Command Remarks Enter system view system-view —

Seite 439 - Creating an HWTACACS Scheme

2-28 Operation Command Remarks Create an HWTACACS scheme and enter its view hwtacacs scheme hwtacacs-scheme-name Required By default, no HWTACACS s

Seite 440

2-29 Configuring the Timers Regarding TACACS Servers Table 2-31 Configure the timers regarding TACACS servers Operation Command Remarks Enter syste

Seite 441

2-30 Operation Command Remarks Display information about user connections display connection [ access-type { dot1x | mac-authentication } | domain

Seite 442

2-31 Operation Command Remarks Delete buffered non-response stop-accounting requests reset stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-n

Seite 443

2-32 # Configure RADIUS scheme radius1. [Switch] radius scheme radius1 [Switch-radius-radius1] primary authentication 10.110.91.164 1812 [Switch-radi

Seite 444

2-33 The Telnet user names added to the RADIUS server must be in the format of userid@isp-name if you have configured the switch to include domain na

Seite 445 - AAA Configuration Examples

2-34 The configuration procedure for local authentication of FTP users is similar to that for Telnet users. The following text only takes Telnet use

Seite 446

2-35 z Change the server IP address, and the UDP port number of the authentication server to 127.0.0.1, and 1645 respectively in the configuration s

Seite 447

2-13 [Sysname-ui-aux0] speed 19200 # Set the maximum number of lines the screen can contain to 30. [Sysname-ui-aux0] screen-length 30 # Set the maxim

Seite 448

2-36 Troubleshooting AAA Troubleshooting RADIUS Configuration The RADIUS protocol operates at the application layer in the TCP/IP protocol suite. Thi

Seite 449

3-1 3 EAD Configuration Only the S3100-EI series switches support the EAD configuration. Introduction to EAD Endpoint admission defense (EAD) is

Seite 450 - Troubleshooting AAA

3-2 Figure 3-1 Typical network application of EAD Virus patch serverSupplicantAuthentication serverSecurity policy server After a client passes the

Seite 451 - 3 EAD Configuration

3-3 EAD Configuration Example Network requirements In Figure 3-2: z A user is connected to Ethernet 1/0/1 on the switch. z The user adopts 802.1x

Seite 452 - EAD Configuration

3-4 [Sysname-radius-cams] key authentication expert [Sysname-radius-cams] server-type extended # Configure the IP address of the security policy serv

Seite 453 - EAD Configuration Example

i Table of Contents 1 MAC Authentication Configuration································································································

Seite 454

1-1 1 MAC Authentication Configuration MAC Authentication Overview MAC authentication provides a way for authenticating users based on ports and MAC

Seite 455

1-2 Related Concepts MAC Authentication Timers The following timers function in the process of MAC authentication: z Offline detect timer: At this i

Seite 456 - MAC Authentication Overview

1-3 Operation Command Remarks Set the user name in fixed mode for MAC authenticationmac-authentication authmode usernamefixedConfigure the user nam

Seite 457 - Related Concepts

1-4 MAC Address Authentication Enhanced Function Configuration MAC Address Authentication Enhanced Function Configuration Tasks Table 1-2 MAC addres

Seite 458

3-1 3 Logging in through Telnet Introduction S3100 series Ethernet switches support Telnet. You can manage and maintain a switch remotely by Telnett

Seite 459

1-5 In PGV or PAFV mode, when a user fails MAC authentication on a port, the device adds the port to the guest VLAN or Auth-Fail VLAN. Therefore, t

Seite 460

1-6 z The Auth-Fail VLAN for MAC authentication takes precedence over the guest VLAN for MAC authentication. When both of them are configured on a

Seite 461 - Access a Port

1-7 z If both the limit on the number of MAC address authentication users and the limit on the number of users configured in the port security func

Seite 462

1-8 MAC Authentication Configuration Example Network requirements As illustrated in Figure 1-1, a supplicant is connected to the switch through port

Seite 463 - MAC: 00-0d-88-f6-44-c1

1-9 After doing so, your MAC authentication configuration will take effect immediately. Only users with the MAC address of 00-0d-88-f6-44-c1 are allo

Seite 464

i Table of Contents 1 Web Authentication Configuration ·······························································································

Seite 465

1-1 1 Web Authentication Configuration When configuring Web authentication, go to these sections for information you are interested in: z Introduct

Seite 466

1-2 z Web authentication can use only a RADIUS authentication scheme; it does not support local authentication. z The user number limit configured

Seite 467

1-3 z Before enabling global Web authentication, you should first set the IP address of a Web authentication server. z Do not add a Web authentica

Seite 468

1-4 Configuration Procedure Follow these steps to configure an Auth-Fail VLAN for Web authentication: To do… Use the command… Remarks Enter system

Seite 469

3-2 Table 3-2 Common Telnet configuration Configuration Description Configure the command level available to users logging into the VTY user interfa

Seite 470 - Customizing Page Elements

1-5 After you configure HTTPS access for Web authentication on the switch, the switch will allow clients to use HTTPS to open the authentication page

Seite 471 - Rules on file names

1-6 The web-authentication customize command is used to customize part of the information provided on the default authentication page. You cannot ch

Seite 472 - Rules on page requests

1-7 Table 1-1 Main authentication page file names Main authentication page File name Login page login.htm Login success page loginSuccess.htm Logi

Seite 473 - </form>

1-8 <p><input type=SUBMIT value="Login" name = "WaButton" style="width:60px;"> </form> 3) Authenticat

Seite 474

1-9 The auto mode allows a user to move between ports in the same VLAN rather than different VLANs. If a user moves between VLANs, the access is den

Seite 475

1-10 Web Authentication Configuration Example Network requirements As shown in Figure 1-1, a user connects to the Ethernet switch through port Ethern

Seite 476

1-11 [Sysname -radius-radius1] key authentication expert # Configure the system to strip domain name off a user name before transmitting the user nam

Seite 477 - Table of Content

i Table of Content 1 Triple Authentication Configuration······························································································

Seite 478 - Background

1-1 1 Triple Authentication Configuration Triple Authentication Overview Currently, among S3100 series Ethernet switches, only the S3100-EI series

Seite 479 - Extended Functions

1-2 z Upon startup, a terminal triggers MAC authentication first on the access device. If it passes MAC authentication, no other types of authentica

Seite 480 - Network Diargram

3-3 Authentication mode Telnet configuration Description Manage VTY usersSet service type for VTY users Required Perform common configuration Perfor

Seite 481

1-3 Triple Authentication Configuration Complete the following tasks to configure triple authentication: Task Remarks For details Configure 802.1X

Seite 482

1-4 Configuration Procedure z Make sure that the terminals, the servers and the switch are reachable to each other. z If using an external DHCP s

Seite 483

1-5 Configure IP address pool 3, including the address range, lease and gateway address. A short lease is recommended to shorten the time terminals u

Seite 484

1-6 # Set the MAC authentication timers. [Switch] mac-authentication timer offline-detect 180 [Switch] mac-authentication timer quiet 180 # Specify t

Seite 485 - 1 ARP Configuration

i Table of Contents 1 ARP Configuration···············································································································

Seite 486 - ARP Table

1-1 1 ARP Configuration Introduction to ARP ARP Function Address Resolution Protocol (ARP) is used to resolve an IP address into a data link layer a

Seite 487 - ARP Process

1-2 Table 1-1 describes the fields of an ARP packet. Table 1-1 Description on the fields of an ARP packet Field Description Hardware Type Type of th

Seite 488 - ARP attack detection

1-3 Table 1-3 ARP entries ARP entry Generation Method Maintenance Mode Static ARP entry Manually configured Manual maintenance Dynamic ARP entry

Seite 489 - ARP Configuration

1-4 Introduction to ARP Attack Detection Man-in-the-middle attack According to the ARP design, after receiving an ARP response, a host adds the IP-to

Seite 490

1-5 packets, or through trusted ports if the MAC address table contains no such destination MAC addresses. Introduction to ARP Packet Rate Limit To p

Seite 491

3-4 Operation Command Description Make terminal services available shell Optional By default, terminal services are available in all user interface

Seite 492

1-6 Operation Command Remarks Configure the ARP aging timer arp timer aging aging-time Optional By default, the ARP aging timer is set to 20 minute

Seite 493 - ARP Configuration Example

1-7 Operation Command Remarks Enable the ARP attack detection function arp detection enable Required By default, ARP attack detection is disabled

Seite 494

1-8 Table 1-6 Configure the ARP packet rate limit function Operation Command Remarks Enter system view system-view — Enter Ethernet port view int

Seite 495

1-9 The sending of gratuitous ARP packets is enabled as long as an S3100 switch operates. No command is needed for enabling this function. That is,

Seite 496

1-10 z Add a static ARP entry, with the IP address being 192.168.1.1, the MAC address being 000f-e201-0000, and the outbound port being Ethernet1/0/

Seite 497

1-11 [SwitchA-Ethernet1/0/1] arp detection trust [SwitchA-Ethernet1/0/1] quit # Enable ARP attack detection on all ports in VLAN 1. [SwitchA] vlan 1

Seite 498 - 1 DHCP Overview

i Table of Contents 1 DHCP Overview···················································································································

Seite 499 - Updating IP Address Lease

ii Introduction to DHCP Accounting··································································································2-23 DHCP Accounti

Seite 500 - DHCP Packet Format

1-1 1 DHCP Overview Introduction to DHCP With networks getting larger in size and more complicated in structure, lack of available IP addresses beco

Seite 501 - Protocol Specification

1-2 Obtaining IP Addresses Dynamically A DHCP client undergoes the following four phases to dynamically obtain an IP address from a DHCP server: 1)

Seite 502 - 2 DHCP Server Configuration

3 Part Features 16-Multicast Operation z Internet group management protocol (IGMP) snooping v2&v3 z Multicast Listener Discovery (MLD) snooping

Seite 503 - Structure of an address pool

3-5 # Enter VTY 0 user interface view. [Sysname] user-interface vty 0 # Configure not to authenticate Telnet users logging into VTY 0. [Sysname-ui-vt

Seite 504 - Enabling DHCP

1-3 If the DHCP client fails to update its IP address lease when half of the lease time elapses, it will update its IP address lease by broadcasting

Seite 505 - Configuration Task List

1-4 Protocol Specification Protocol specifications related to DHCP include: z RFC2131: Dynamic Host Configuration Protocol z RFC2132: DHCP Options

Seite 506

2-1 2 DHCP Server Configuration When configuring the DHCP server, go to these sections for information you are interested in: z Introduction to DHC

Seite 507

2-2 picks an IP address from the pool and sends the IP address and other related parameters (such as the IP address of the DNS server, and the lease

Seite 508

2-3 The DHCP server assigns an IP address to the client in the following order from an interface address pool or a global address pool: 3) If there

Seite 509

2-4 To do… Use the command… Remarks Enter system view system-view — Enable DHCP dhcp enable Optional By default, DHCP is enabled. To improve secu

Seite 510

2-5 Enabling the Global Address Pool Mode on Interface(s) You can configure the global address pool mode on the specified or all interfaces of a DHCP

Seite 511 - Basic concept

2-6 address, the DHCP server searches for the IP address corresponding to the MAC address of the DHCP client and assigns the IP address to the DHCP c

Seite 512

2-7 To improve security and avoid malicious attack to the unused sockets, S3100 Ethernet switches provide the following functions: z UDP 67 and UDP

Seite 513

2-8 z In the same DHCP global address pool, the network command can be executed repeatedly. In this case, the new configuration overwrites the pre

Seite 514

3-6 Operation Command Description Set the maximum number of lines the screen can contain screen-length screen-length Optional By default, the scree

Seite 515

2-9 Configuring WINS Servers for the DHCP Client For Microsoft Windows-based DHCP clients that communicate through NetBIOS protocol, the host name-t

Seite 516

2-10 Configuring Gateways for the DHCP Client Gateways are necessary for DHCP clients to access servers/hosts outside the current network segment. A

Seite 517

2-11 z Sub-option 4: Fail-over call routing. Meanings of the sub-options for Option 184 Figure 2-1 Meanings of the sub-options for Option 184 Sub-op

Seite 518

2-12 For the configurations specifying to add sub-option 2, sub-option 3, and sub-option 4 in the response packets to take effect, you need to confi

Seite 519

2-13 Specify an IP address for the network calling processor before performing other configuration. Configuring a Self-Defined DHCP Option By conf

Seite 520

2-14 Configuring the Interface Address Pool Based DHCP Server In the interface address pool mode, after the addresses in the interface address pool

Seite 521

2-15 Task Remarks Enabling the Interface Address Pool Mode on Interface(s) Required Configuring the static IP address allocation mode Configuring an

Seite 522

2-16 To improve security and avoid malicious attack to the unused sockets, S3600 Ethernet switches provide the following functions: z UDP port 67

Seite 523 - Prerequisites

2-17 z The IP addresses statically bound in interface address pools and the interface IP addresses must be in the same network segment. z There is

Seite 524 - DHCP Accounting Fundamentals

2-18 To do… Use the command… Remarks Specify the IP addresses that are not dynamically assigned dhcp server forbidden-ip low-ip-address [ high-ip-a

Seite 525 - Configuring DHCP Accounting

3-7 # Enter VTY 0 user interface view. [Sysname] user-interface vty 0 # Configure to authenticate users logging into VTY 0 using the password. [Sysna

Seite 526

2-19 To do… Use the command… Remarks Enter system view system-view — interface interface-type interface-number dhcp server dns-list ip-address&

Seite 527

2-20 To do… Use the command… Remarks Configure multiple interfaces in system view dhcp server nbns-list ip-address&<1-8> { interface inte

Seite 528

2-21 Follow these steps to configure Option 184 parameters for the client with voice service: To do… Use the command… Remarks Enter system view sy

Seite 529

2-22 z Define new DHCP options. New configuration options will come out with DHCP development. To support new options, you can add them into the att

Seite 530

2-23 To do… Use the command… Remarks Enable the unauthorized DHCP server detecting function dhcp server detect Required Disabled by default. With

Seite 531

2-24 z After sending a DHCP-ACK packet with the IP configuration parameters to the DHCP client, the DHCP server sends an Accounting START packet to

Seite 532 - Analysis

2-25 If a DHCP server is configured to ignore Option 82, after the DHCP server receives packets containing Option 82, the DHCP server will not add Op

Seite 533 - DHCP Snooping Configuration

2-26 DHCP Server Configuration Examples Currently, DHCP networking can be implemented in two ways. One is to deploy the DHCP server and DHCP clients

Seite 534 - Introduction to Option 82

2-27 If you use the inheriting relation of parent and child address pools, make sure that the number of the assigned IP addresses does not exceed th

Seite 535

2-28 # Configure DHCP address pool 0, including address range, domain name suffix of the clients, and domain name server address. [SwitchA] dhcp serv

Seite 536

3-8 Operation Command Description Enter one or more VTY user interface views user-interface vty first-number [ last-number ] — Configure to authen

Seite 537 - Overview of IP Filtering

2-29 Network diagram DHCP client DHCP clientDHCP client 3COM VCXDHCP ServerIP:10.1.1.1/24 Figure 2-3 Network diagram for Option 184 support configura

Seite 538

2-30 z The IP address of VLAN-interface 1 is 10.1.1.1/24, and that of VLAN-interface 2 is 10.1.2.1/24. z The IP address of the RADIUS server is 10.

Seite 539

2-31 [Sysname] domain 123 [Sysname-isp-123] scheme radius-scheme 123 [Sysname-isp-123] quit # Create an address pool on the DHCP server. [Sysname] dh

Seite 540

3-1 3 DHCP Snooping Configuration Introduction Introduction to DHCP Snooping For the sake of security, the IP addresses used by online DHCP clients

Seite 541

3-2 z Trusted: A trusted port is connected to an authorized DHCP server directly or indirectly. It forwards DHCP messages to guarantee that DHCP cli

Seite 542

3-3 Padding content and frame format of Option 82 There is no specification for what should be padded in Option 82. Manufacturers can pad it as requi

Seite 543 - Configuring IP Filtering

3-4 Figure 3-5 Standard format of the remote ID sub-option Mechanism of DHCP-snooping Option 82 With DHCP snooping and DHCP-snooping Option 82 supp

Seite 544

3-5 The circuit ID and remote ID sub-options in Option 82, which can be configured simultaneously or separately, are independent of each other in te

Seite 545

3-6 DHCP Snooping Configuration Configuring DHCP Snooping Follow these steps to configure DHCP snooping: Operation Command Description Enter system

Seite 546 - Eth1/0/2 Eth1/0/3

3-7 Configuring Unauthorized DHCP Server Detection Only the S3100-SI series among S3100 series switches support the unauthorized DHCP server detect

Seite 547

3-9 Table 3-7 Determine the command level when users logging into switches are authenticated in the scheme mode Scenario Authentication mode User typ

Seite 548

3-8 z Only the S3100-EI series among S3100 series switches support the DHCP-snooping Option 82 support feature. z Enable DHCP snooping and specify

Seite 549

3-9 If a handling policy is configured on a port, this configuration overrides the globally configured handling policy for requests received on this

Seite 550

3-10 z If you have configured a circuit ID with the vlan vlan-id argument specified, and the other one without the argument in Ethernet port view,

Seite 551 - Ethernet1/0/1

3-11 z If you configure a remote ID sub-option in both system view and on a port, the remote ID sub-option configured on the port applies when the

Seite 552 - Introduction to DHCP Client

3-12 z Enable DHCP snooping and specify trusted ports on the switch before configuring IP filtering. z You are not recommended to configure IP fil

Seite 553

3-13 DHCP Snooping Configuration Example DHCP-Snooping Option 82 Support Configuration Example Network requirements As shown in Figure 3-8, Ethernet1

Seite 554 - Introduction to BOOTP Client

3-14 # Set the circuit ID sub-option in DHCP packets from VLAN 1 to “abcd” on Ethernet 1/0/3. [Switch] interface Ethernet1/0/3 [Switch-Ethernet1/0/3]

Seite 555

3-15 [Sysname-Ethernet1/0/2] quit # Enable unauthorized DHCP server detection on Ethernet 1/0/3. [Sysname] interface ethernet1/0/3 [Sysname-Ethernet

Seite 556

3-16 [Switch-Ethernet1/0/1] dhcp-snooping trust [Switch-Ethernet1/0/1] quit # Enable IP filtering on Ethernet1/0/2, Ethernet1/0/3, and Ethernet1/0/4

Seite 557

4-1 4 DHCP Packet Rate Limit Configuration The contents of this chapter are only applicable to the S3100-EI series among S3100 series switches. I

Seite 558 - 1 ACL Configuration

3-10 Refer to AAA Operation and SSH Operation of this manual for information about AAA, RADIUS, and SSH. Configuration Example Network requirements

Seite 559

4-2 Configuring DHCP Packet Rate Limit Configuring DHCP Packet Rate Limit Follow these steps to configure rate limit of DHCP packets: Operation Comm

Seite 560 - ACL Configuration

4-3 Networking diagram Figure 4-1 Network diagram for DHCP packet rate limit configuration Ethernet1/0/2Client A Client BEthernet1/0/11DHCP ServerDHC

Seite 561

5-1 5 DHCP/BOOTP Client Configuration Introduction to DHCP Client After you specify a VLAN interface as a DHCP client, the device can use DHCP to ob

Seite 562 - Configuring Basic ACL

5-2 z The S3100 EPON series Ethernet switches do not support automatic configuration feature. z To implement the automatic configuration feature,

Seite 563 - Configuring Advanced ACL

5-3 An intermediate file maintains the IP address-to-host name mappings which are created using the ip host hostname ip-address command. When you us

Seite 564 - Configuring Layer 2 ACL

5-4 Because a DHCP server can interact with a BOOTP client, you can use the DHCP server to assign an IP address to the BOOTP client, without needing

Seite 565 - Configuring an IPv6 ACL

5-5 DHCP Client Configuration Example Network requirements Using DHCP, VLAN-interface 1 of Switch A is connected to the LAN to obtain an IP address f

Seite 566

i Table of Contents 1 ACL Configuration···············································································································

Seite 567

1-1 1 ACL Configuration ACL Overview As the network scale and network traffic are increasingly growing, security control and bandwidth assignment pl

Seite 568 - ACL Assignment

1-2 For depth-first rule, there are two cases: Depth-first match order for rules of a basic ACL 1) Range of source IP address: The smaller the sourc

Seite 569 - Assigning an ACL to a VLAN

3-11 [Sysname-ui-vty0] screen-length 30 # Set the maximum number of commands the history command buffer can store to 20. [Sysname-ui-vty0] history-co

Seite 570 - Assigning an ACL to a Port

1-3 Being referenced by upper-level software ACLs can also be used to filter and classify the packets to be processed by software. In this case, the

Seite 571

1-4 z Periodic time range, which recurs periodically on the day or days of the week. z Absolute time range, which takes effect only in a period of

Seite 572 - 10.110.100.46

1-5 Time-range : test ( Inactive ) 08:00 to 18:00 working-day # Define an absolute time range spans from 15:00 1/28/2006 to 15:00 1/28/2008. <Sy

Seite 573

1-6 z With the auto match order specified, the newly created rules will be inserted in the existent ones by depth-first principle, but the numbers o

Seite 574

1-7 Operation Command Description Assign a description string to the ACL description text Optional No description by default Note that: z With

Seite 575

1-8 Configuration procedure Table 1-4 Define a Layer 2 ACL rule Operation Command Description Enter system view system-view — Create a Layer 2 AC

Seite 576 - 192.168.1.2

1-9 z src-ip: Matches the source address field in IPv6 packets. z dest-ip: Matches the destination address field in IPv6 packets. z src-port: Matc

Seite 577

1-10 Configuration prerequisites z To configure a time range-based IPv6 ACL rule, you need to create the corresponding time range first. For informa

Seite 578

1-11 z IPv6 ACLs do not match IPv6 packets with extension headers. z Do not use IPv6 ACLs with VLAN mapping and trusted port priority together.

Seite 579

1-12 Assigning an ACL Globally Configuration prerequisites Before applying ACL rules to a VLAN, you need to define the related ACLs. For information

Seite 580 - 1 QoS Configuration

3-12 2) Perform Telnet-related configuration on the switch. Refer to section "Telnet Configuration with Authentication Mode Being None”, sectio

Seite 581

1-13 Configuration example # Apply ACL 2000 to VLAN 10 to filter the inbound packets of VLAN 10 on all the ports. <Sysname> system-view [Sysna

Seite 582 - Introduction to QoS Features

1-14 Configuration procedure Table 1-9 Apply an ACL to a port Operation Command Description Enter system view system-view — Enter Ethernet port vie

Seite 583 - Priority Trust Mode

1-15 Example for Upper-Layer Software Referencing ACLs Example for Controlling Telnet Login Users by Source IP Network requirements Apply an ACL to

Seite 584

1-16 Configuration procedure # Define ACL 2001. <Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule 1 permit source

Seite 585 - Priority trust mode

1-17 Advanced ACL Configuration Example Network requirements Different departments of an enterprise are interconnected through a switch. The IP addre

Seite 586

1-18 Network diagram Figure 1-5 Network diagram for Layer 2 ACL Configuration procedure # Define a periodic time range that is active from 8:00 to

Seite 587 - Priority Marking

1-19 <Sysname> system-view [Sysname] time-range test 8:00 to 18:00 daily # Set the port to trust the 802.1p (CoS) priority in received packets.

Seite 588 - Token bucket

1-20 # Define an ACL to deny packets destined for the database server. [Sysname] acl number 3000 [Sysname-acl-adv-3000] rule 1 deny ip destination 19

Seite 589 - Traffic shaping

i Table of Contents 1 QoS Configuration···············································································································

Seite 590 - Queue Scheduling

ii Configuration Example····························································································································2-

Seite 591

3-13 z A Telnet connection is terminated if you delete or modify the IP address of the VLAN interface in the Telnet session. z By default, command

Seite 592 - QoS Configuration

1-1 1 QoS Configuration Overview Introduction to QoS Quality of Service (QoS) is a concept concerning service demand and supply. It reflects the abi

Seite 593

1-2 traffic, and setting priority of the packets. To meet those requirements, the network should be provided with better service capability. Major T

Seite 594 - Configuring Priority Mapping

1-3 Category Features Refer to… following types: z Basic ACLs z Advanced ACLs z Layer-2 ACLs (applicable only to the S3100-EI series) z IPv6 AC

Seite 595

1-4 Priority Trust Mode Precedence types 1) IP precedence, ToS precedence, and DSCP precedence Figure 1-2 DS field and ToS byte The ToS field in a

Seite 596 - Marking Packet Priority

1-5 z Best Effort (BE) class: This class is a special class without any assurance in the CS class. The AF class can be degraded to the BE class if i

Seite 597

1-6 The 4-byte 802.1Q tag header consists of the tag protocol identifier (TPID, two bytes in length), whose value is 0x8100, and the tag control info

Seite 598 - Configuring Traffic Policing

1-7 For incoming 802.1q tagged packets, you can configure the switch to trust packet priority with the priority trust command or to trust port priori

Seite 599

1-8 Table 1-7 DSCP-precedence-to-local-precedence mapping table DSCP Local precedence 0 to 15 0 16 to 31 1 32 to 47 2 48 to 63 3 Table 1-8 IP-p

Seite 600 - Configuring Traffic Shaping

1-9 network resources and provide better service for more users. For example, a traffic flow can be limited to get only its committed resources durin

Seite 601

1-10 Traffic policing The typical application of traffic policing is to supervise specific traffic into the network and limit it to a reasonable rang

Seite 602

4-1 4 Logging in Using a Modem Introduction The administrator can log into the Console port of a remote switch using a modem through public switched

Seite 603 - Configuring Queue Scheduling

1-11 Port Rate Limiting Port rate limiting refers to limiting the total rate of inbound or outbound packets on a port. Port rate limiting can be imp

Seite 604

1-12 In queue scheduling, SP sends packets in the queue with higher priority strictly following the priority order from high to low. When the queue w

Seite 605

1-13 Burst The Burst function can provide better packet cache function and traffic forwarding performance. It is suitable for networks where z Large

Seite 606 - Enabling the Burst Function

1-14 For detailed information about priority trust mode, refer to Priority trust mode. Configuration prerequisites The priority trust mode to be con

Seite 607

1-15 Operation Command Description specifying the trusted priority type, the switch trusts the 802.1p (CoS) priority of the received packets. Note

Seite 608

1-16 Configuration procedure Table 1-11 Configure CoS-precedence-to-local-precedence mapping table Operation Command Description Enter system view

Seite 609 - Displaying QoS

1-17 local precedence(queue) : 0 0 1 1 2 2 3 3 Marking Packet Priority Only H3C S3100-EI series switches support t

Seite 610 - QoS Configuration Example

1-18 Table 1-15 Mark the priority for packets that are of a VLAN and match specific ACL rules Operation Command Description Enter system view syste

Seite 611

1-19 [Sysname] acl number 2000 [Sysname-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255 [Sysname-acl-basic-2000] quit [Sysname] traffic-priorit

Seite 612 - 2 QoS Profile Configuration

1-20 Table 1-20 Configure traffic policing for packets that are of a port group and match specific ACL rules Operation Command Description Enter s

Seite 613 - QoS Profile Configuration

4 Part Features 27-Stack-Cluster Operation z Stack z Huawei Group Management Protocol (HGMP) v2 z Neighbor Discovery Protocol (NDP) z Neighbor To

Seite 614 - Applying a QoS Profile

4-2 The configuration commands and the output of different modems may differ. Refer to the user manual of the modem when performing the above config

Seite 615

1-21 [Sysname] acl number 2000 [Sysname-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255 [Sysname-acl-basic-2000] quit [Sysname] traffic-limit v

Seite 616

1-22 Configuration procedure Table 1-23 Configure port rate limiting Operation Command Description Enter system view system-view — Enter Ethernet

Seite 617

1-23 Table 1-25 Redirect packets that are of a VLAN and match specific ACL rules Operation Command Description Enter system view system-view — Con

Seite 618 - 1 Mirroring Configuration

1-24 2) Method II <Sysname> system-view [Sysname] acl number 2000 [Sysname-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255 [Sysname-acl-b

Seite 619

1-25 Operation Command Description Configure queue scheduling queue-scheduler { strict-priority | hq-wrr queue0-weight queue1-weight queue2-weight

Seite 620 - Mirroring Configuration

1-26 Table 1-30 Generate traffic statistics on all the packets matching specific ACL rules Operation Command Description Enter system view system-

Seite 621

1-27 Configuration example z Ethernet 1/0/1 is connected to the 10.1.1.0/24 network segment. z Generate statistics on the packets sourced from the

Seite 622

1-28 Only H3C S3100-EI series switches support this configuration. Refer to section Traffic Mirroring for information about traffic mirroring. Con

Seite 623

1-29 Table 1-37 Configure traffic mirroring for a port group Operation Command Description Enter system view system-view — Enter Ethernet port view

Seite 624 - Displaying Port Mirroring

1-30 [Sysname] interface Ethernet 1/0/4 [Sysname-Ethernet1/0/4] monitor-port [Sysname-Ethernet1/0/4] quit [Sysname] interface Ethernet 1/0/1 [Sysname

Seite 625

4-3 Figure 4-1 Establish the connection by using modems Console portPSTNTelephone lineModem serial cableTelephone number of the romote end:82882285Mo

Seite 626

1-31 Operation Command Description unit-id } traffic-shape Display traffic accounting configuration of a port or all the ports display qos-interfa

Seite 627

1-32 Network diagram Figure 1-9 Network diagram for traffic policing configuration Configuration procedure 1) Define an ACL for traffic classifica

Seite 628

2-1 2 QoS Profile Configuration Only H3C S3100-EI series switches support this configuration. Overview Introduction to QoS Profile QoS profile i

Seite 629

2-2 A user-based QoS profile application fails if the traffic classification rule defined in the QoS profile contains source address information (in

Seite 630 - 1 Stack

2-3 Operation Command Description local-precedence pre-value }* Applying a QoS Profile You can configure to apply a QoS profile dynamically or sim

Seite 631 - Main Switch Configuration

2-4 Displaying QoS Profile Configuration After the above configuration, you can execute the display command in any view to view the running status of

Seite 632 - Maintaining Slave Switches

2-5 <Sysname> system-view [Sysname] radius scheme radius1 [Sysname-radius-radius1] primary authentication 10.11.1.1 [Sysname-radius-radius1] pr

Seite 633 - Slave Switch Configuration

i Table of Contents 1 Mirroring Configuration ········································································································

Seite 634 - Stack Configuration Example

1-1 1 Mirroring Configuration Mirroring Overview Mirroring refers to the process of copying packets of one or more ports (source ports) to a destina

Seite 635

1-2 To implement remote port mirroring, a special VLAN, called remote-probe VLAN, is needed. All mirrored packets are sent from the reflector port of

Seite 636 - 2 Cluster

4-4 Figure 4-3 Set the telephone number Figure 4-4 Call the modem 5) If the password authentication mode is specified, enter the password when p

Seite 637 - Roles in a Cluster

1-3 Switch Ports involved Function Trunk port Receives remote mirrored packets. Destination switch Destination port Receives packets forwarded fro

Seite 638 - How a Cluster Works

1-4 Operation Command Description In system viewmirroring-group group-id mirroring-port mirroring-port-list { both | inbound | outbound } interface

Seite 639 - Introduction to NTDP

1-5 Operation Command Description Configure the current VLAN as the remote-probe VLAN remote-probe vlan enable Required Return to system view quit

Seite 640 - Cluster maintenance

1-6 z Layer 2 connectivity is ensured between the source and destination switches over the remote-probe VLAN. 2) Configuration procedure Table 1-5 C

Seite 641 - Disconnect

1-7 Operation Command Description Configure trunk port to permit packets from the remote-probe VLAN port trunk permit vlan remote-probe-vlan-id Re

Seite 642 - Management VLAN

1-8 z Configure Ethernet 1/0/3 as the mirroring destination port. Network diagram Figure 1-3 Network diagram for local port mirroring Configuratio

Seite 643 - Cluster Configuration Tasks

1-9 z Ethernet 1/0/2 of Switch B connects to Ethernet 1/0/1 of Switch C. z The data detection device is connected to Ethernet 1/0/2 of Switch C. Th

Seite 644

1-10 # Configure Ethernet 1/0/3 as trunk port, allowing packets of VLAN 10 to pass. [Sysname] interface Ethernet 1/0/3 [Sysname-Ethernet1/0/3] port l

Seite 645

1-11 [Sysname-Ethernet1/0/1] port trunk permit vlan 10 [Sysname-Ethernet1/0/1] quit # Display configuration information about remote destination mirr

Seite 646

i Table of Contents 1 Stack ··························································································································

Seite 647

5-1 5 Logging in through the Web-based Network Management System Introduction An S3100 Ethernet switch has a Web server built in. It enables you to

Seite 648 - Configuring Member Devices

1-1 1 Stack The S3100 series switches can be stacked only when stack modules are installed. Stack Function Overview A stack is a management domai

Seite 649

1-2 z Connect the intended main switch and slave switches through stack modules and dedicated stack cables. (Refer to H3C S3100 Series Ethernet Swit

Seite 650

1-3 z Make sure the IP addresses in the IP address pool of a stack are successive so that they can be assigned successively. For example, the IP add

Seite 651

1-4 Introduction to the Stack-Port Function If you enable the stack function on a stack-supporting device, the device will send join-in requests to t

Seite 652

1-5 Operation Command Description Display the stack status information on a slave switch display stacking The display command can be executed in an

Seite 653

1-6 Main device for stack. Total members:3 Management-vlan:1(default vlan) # Display the information about the stack members on switch A. <stack

Seite 654

2-1 2 Cluster Cluster Overview Introduction to HGMP A cluster contains a group of switches. Through cluster management, you can manage multiple geog

Seite 655

2-2 you can configure and manage all the member devices through the management device without the need to log onto them one by one. z It provides th

Seite 656

2-3 Figure 2-2 State machine of cluster role z A candidate device becomes a management device when you create a cluster on it. Note that a cluster

Seite 657

2-4 z The management device adds the candidate devices to the cluster or removes member devices from the cluster according to the candidate device i

Seite 658

5-2 Figure 5-1 Establish an HTTP connection between your PC and the switch 4) Log into the switch through IE. Launch IE on the Web-based network m

Seite 659

2-5 device busy processing of the NTDP topology collection responses. To avoid such cases, the following methods can be used to control the NTDP topo

Seite 660

2-6 To create a cluster, you need to determine the device to operate as the management device first. The management device discovers and determines c

Seite 661

2-7 Additionally, on the management device, you can configure the FTP server, TFTP server, logging host and SNMP host to be shared by the whole clust

Seite 662

2-8 1) Determine whether the destination MAC address or destination IP address is used to trace a device in the cluster z If you use the tracemac c

Seite 663

2-9 Configuration task Remarks Configuring the Cluster Synchronization Function Optional Configuring the Management Device Management device confi

Seite 664 - 1 PoE Configuration

2-10 Operation Command Description Enter Ethernet port view interface interface-type interface-number specified Ethernet ports In Ethernet port vie

Seite 665 - PoE Configuration

2-11 Operation Command Description Configure the port forward delay of topology collection requests ntdp timer port-delay time Optional By default,

Seite 666

2-12 Operation Command Description Set the interval for the management device to send multicast packets cluster-mac syn-interval time-interval Opti

Seite 667

2-13 Operation Command Description Configure a shared TFTP server for the cluster tftp-server ip-address Optional By default, no shared TFTP server

Seite 668

2-14 To reduce the risk of being attacked by malicious users against opened socket and enhance switch security, the S3100 series Ethernet switches p

Seite 669 - PoE Configuration Example

5-3 Configuration Example Network requirements z A user logs in to the switch through Web. z The banner page is desired when a user logs into the

Seite 670 - Eth1/0/1 Eth1/0/8

2-15 Operation Command Description Enter Ethernet port view interface interface-type interface-number — Enable NTDP on the port ntdp enable Require

Seite 671 - 2 PoE Profile Configuration

2-16 Operation Command Description Enter system view system-view — Enter cluster view cluster — Configuring MAC address of Management device admini

Seite 672

2-17 The topology information is saved as a topology.top file in the Flash memory to the administrative device. You cannot specify the file name ma

Seite 673

2-18 Operation Command Description Display the topology of the current cluster display cluster current-topology [ mac-address mac-address1 [ to-mac

Seite 674

2-19 SNMP configuration synchronization With this function, you can configure the public SNMP community name, SNMP group, SNMP users and MIB views. T

Seite 675

2-20 z Perform the above operations on the management device of the cluster. z Configuring the public SNMP information is equal to executing these

Seite 676 - 1 SNMP Configuration

2-21 Member 2 succeeded in the usm-user configuration. Member 1 succeeded in the usm-user configuration. Finish to synchronize the command. # Afte

Seite 677

2-22 z A cluster is established, and you can manage the member devices through the management device. 2) Configuration procedure Perform the followi

Seite 678

2-23 Operation Command Description Clear the statistics on NDP ports reset ndp statistics [ interface port-list ] You can execute the reset command

Seite 679

2-24 Network diagram Figure 2-4 Network diagram for HGMP cluster configuration NetworkFTP server/TFTP serverSNMP host/logging host63.172.55.1/2469.17

Seite 680 - Configuring Trap Parameters

5-4 Operation Command Description Enable the Web server ip http shutdown Required By default, the Web server is enabled. Disable the Web server und

Seite 681 - Displaying SNMP

2-25 # Set the holdtime of NDP information to 200 seconds. [Sysname] ndp timer aging 200 # Set the interval to send NDP packets to 70 seconds. [Sysna

Seite 682 - SNMP Configuration Examples

2-26 [aaa_0.Sysname-cluster] tftp-server 63.172.55.1 [aaa_0.Sysname-cluster] logging-host 69.172.55.4 [aaa_0.Sysname-cluster] snmp-host 69.172.55.4 3

Seite 683 - Configuring the NMS

2-27 Network diagram Figure 2-5 Network diagram for the enhanced cluster feature configuration Configuration procedure # Enter cluster view. <a

Seite 684

i Table of Contents 1 PoE Configuration ··············································································································

Seite 685 - 2 RMON Configuration

1-1 1 PoE Configuration PoE Overview Introduction to PoE Power over Ethernet (PoE)-enabled devices use twisted pairs through electrical ports to sup

Seite 686 - Commonly Used RMON Groups

1-2 Switch Input power supply Number of electrical ports supplying power Maximum PoE distance Maximum power provided by each electrical port Total Ma

Seite 687 - RMON Configuration

1-3 Task Remarks Setting PoE Management Mode and PoE Priority of a Port Optional Setting the PoE Mode on a Port Optional Configuring the PD Compat

Seite 688 - RMON Configuration Examples

1-4 more than one port has the same lowest priority, the switch will power down the PD connected to the port with larger port number. z manual: When

Seite 689

1-5 Table 1-7 Configure the PD compatibility detection function Operation Command Description Enter system view system-view — Enable the PD compati

Seite 690

1-6 z In the case that the PSE processing software is damaged (that is, no PoE command can be executed successfully), use the full update mode to u

Seite 691 - 1 NTP Configuration

6-1 6 Logging in through NMS Introduction You can also log into a switch through a network management station (NMS), and then configure and manage t

Seite 692

1-7 Networking diagram Figure 1-1 Network diagram for PoE Switch ANetworkEth1/0/2Eth1/0/1 Eth1/0/8Switch B AP AP Configuration procedure # Upgrade t

Seite 693 - NTP Implementation Modes

2-1 2 PoE Profile Configuration Introduction to PoE Profile On a large-sized network or a network with mobile users, to help network administrators

Seite 694 - Multicast mode

2-2 Operation Command Description In system view apply poe-profile profile-name interface interface-type interface-number [ to interface-type inter

Seite 695 - NTP Configuration Tasks

2-3 Ethernet 1/0/1 through Ethernet 1/0/10 of Switch A are used by users of group A, who have the following requirements: z The PoE function can be

Seite 696

2-4 [SwitchA] display poe-profile name Profile1 Poe-profile: Profile1, 3 action poe enable poe max-power 3000 poe priority critical # Create Profile2

Seite 697

i Table of Contents 1 SNMP Configuration··············································································································

Seite 698

1-1 1 SNMP Configuration SNMP Overview The simple network management protocol (SNMP) is used for ensuring the transmission of the management informa

Seite 699

1-2 adopts a hierarchical naming scheme to organize the managed objects. It is like a tree, with each tree node representing a managed object, as sho

Seite 700

1-3 Configuring Basic SNMP Functions SNMPv3 configuration is quite different from that of SNMPv1 and SNMPv2c. Therefore, the configuration of basic S

Seite 701

1-4 Table 1-3 Configure basic SNMP functions (SNMPv3) Operation Command Description Enter system view system-view — Enable SNMP agent snmp-agent Op

Seite 702

7-1 7 User Control Refer to the ACL part for information about ACL. Introduction A switch provides ways to control different types of login user

Seite 703

1-5 An S3100 Ethernet switch provides the following functions to prevent attacks through unused UDP ports. z Executing the snmp-agent command or an

Seite 704 - Displaying NTP Configuration

1-6 Configuring Extended Trap The extended Trap includes the following. z “Interface description” and “interface type” are added into the linkUp/lin

Seite 705

1-7 Table 1-7 Display SNMP Operation Command Description Display the SNMP information about the current device display snmp-agent sys-info [ contac

Seite 706 - 3.0.1.32/24 3.0.1.33/24

1-8 [Sysname] snmp-agent sys-info version all [Sysname] snmp-agent community read public [Sysname] snmp-agent community write private # Set the acces

Seite 707

1-9 Authentication-related configuration on an NMS must be consistent with that of the devices for the NMS to manage the devices successfully.

Seite 708

2-1 2 RMON Configuration Introduction to RMON Remote monitoring (RMON) is a kind of management information base (MIB) defined by Internet Engineerin

Seite 709

2-2 Commonly Used RMON Groups Event group Event group is used to define the indexes of events and the processing methods of the events. The events de

Seite 710

2-3 The statistics include the number of the following items: collisions, packets with cyclic redundancy check (CRC) errors, undersize (or oversize)

Seite 711

2-4 Displaying RMON After the above configuration, you can execute the display command in any view to display the RMON running status, and to verify

Seite 712 - Total associations : 1

2-5 # Add an entry numbered 2 to the extended alarm table to allow the system to calculate the alarm variables with the (.1.3.6.1.2.1.16.1.1.1.9.1+.1

Seite 713

7-2 Table 7-2 Control Telnet users by source IP addresses Operation Command Description Enter system view system-view — Create a basic ACL or enter

Seite 714 - 1 SSH Configuration

i Table of Contents 1 NTP Configuration···············································································································

Seite 715 - SSH Operating Process

1-1 1 NTP Configuration Introduction to NTP Network time protocol (NTP) is a time synchronization protocol defined in RFC 1305. It is used for time

Seite 716 - Authentication negotiation

1-2 z The clock stratum determines the accuracy, which ranges from 1 to 16. The stratum of a reference clock ranges from 1 to 15. The clock accurac

Seite 717 - Configuring the SSH Server

1-3 z Device A sends an NTP message to Device B, with a timestamp 10:00:00 am (T1) identifying when it is sent. z When the message arrives at Devic

Seite 718

1-4 Symmetric peer mode Figure 1-3 Symmetric peer mode In the symmetric peer mode, the local S3100 Ethernet switch serves as the symmetric-active p

Seite 719

1-5 Table 1-1 NTP implementation modes on H3C S3100 series Ethernet switches NTP implementation mode Configuration on S3100 series switches Server/c

Seite 720

1-6 z Configuring NTP Server/Client Mode z Configuring the NTP Symmetric Peer Mode z Configuring NTP Broadcast Mode z Configuring NTP Multicast M

Seite 721

1-7 z The remote server specified by remote-ip or server-name serves as the NTP server, and the local switch serves as the NTP client. The clock o

Seite 722

1-8 z In the symmetric peer mode, you need to execute the related NTP configuration commands (refer to section Configuring NTP Implementation Modes

Seite 723

1-9 Operation Command Description Configure the switch to work in the NTP broadcast server mode ntp-service broadcast-server [ authentication-keyi

Seite 724

5 Part Features 42-ARP and IP Attack Defense Operation z Supporting ARP packet filtering based on gateway’s address (applicable only to the S3100-EI

Seite 725 - Configuring the SSH Client

7-3 Table 7-4 Control Telnet users by source MAC addresses Operation Command Description Enter system view system-view — Create or enter Layer 2 AC

Seite 726 - Generating a client key

1-10 Configuring a switch to work in the multicast client mode Table 1-8 Configure a switch to work in the NTP multicast client mode Operation Comma

Seite 727

1-11 The access-control right mechanism provides only a minimum degree of security protection for the local switch. A more secure method is identit

Seite 728

1-12 with the corresponding NTP broadcast/multicast client. Otherwise, NTP authentication cannot be enabled normally. z Configurations on the server

Seite 729 - Selecting an SSH version

1-13 Operation Command Description Configure the specified key as a trusted key ntp-service reliable authentication-keyid key-id Required By defaul

Seite 730

1-14 Configuring the Number of Dynamic Sessions Allowed on the Local Switch A single device can have a maximum of 128 associations at the same time,

Seite 731

1-15 Operation Command Description Display the brief information about NTP servers along the path from the local device to the reference clock sour

Seite 732

1-16 Actual frequency: 100.0000 Hz Clock precision: 2^18 Clock offset: 0.66 ms Root delay: 27.47 ms Root dispersion: 208.39 ms Peer dispersion:

Seite 733

1-17 # Enter system view. <DeviceB> system-view # Set Device C as the peer of Device B. [DeviceB] ntp-service unicast-peer 3.0.1.33 Device C an

Seite 734 - SSH Configuration Examples

1-18 Network diagram Figure 1-8 Network diagram for the NTP broadcast mode configuration Vlan-int21.0.1.31/24Vlan-int23.0.1.31/24Vlan-int23.0.1.32/24

Seite 735

1-19 The output information indicates that Device D is synchronized to Device C, with the clock stratum level of 3, one level lower than that of Devi

Seite 736

7-4 Controlling Network Management Users by Source IP Addresses You can manage an S3100 Ethernet switch through network management software. Network

Seite 737

1-20 [DeviceA] interface Vlan-interface 2 [DeviceA-Vlan-interface2] ntp-service multicast-client After the above configurations, Device A and Device

Seite 738

1-21 Configuration procedure 1) Configure Device B. # Enter system view. <DeviceB> system-view # Enable the NTP authentication function. [Devi

Seite 739 - <Switch> system-view

1-22 Total associations : 1

Seite 740

i Table of Contents 1 SSH Configuration···············································································································

Seite 741

1-1 1 SSH Configuration When configuring SSH, go to these sections for information you are interested: z SSH Overview z SSH Server and Client Conf

Seite 742

1-2 Figure 1-1 Encryption and decryption Key-based algorithm is usually classified into symmetric key algorithm and asymmetric key algorithm. Asymm

Seite 743

1-3 Version negotiation z The server opens port 22 to listen to connection requests from clients. z The client sends a TCP connection request to t

Seite 744

1-4 z In password authentication, the client encrypts the username and password, encapsulates them into a password authentication request, and sends

Seite 745

1-5 Table 1-2 Complete the following tasks to configure the SSH server: Task Remarks Configuring the User Interfaces for SSH Clients Required Prepar

Seite 746

1-6 Table 1-3 Follow these steps to configure the user interface for SSH clients: To do... Use the command... Remarks Enter system view system-view

Seite 747

7-5 Network diagram Figure 7-2 Network diagram for controlling SNMP users using ACLs Switch10.110.100.46Host AIP networkHost B10.110.100.52 Configur

Seite 748

1-7 z You can configure a login header only when the service type is stelnet. For configuration of service types, refer to Specifying a Service Typ

Seite 749

1-8 To do... Use the command... Remarks Destroy the DSA key pair public-key local destroy dsa Optional Use the command to destroy the generated DSA

Seite 750

1-9 z For password authentication type, the username argument must be consistent with the valid user name defined in AAA; for publickey authenticat

Seite 751

1-10 This configuration is not necessary if the password authentication mode is configured for SSH users. With the publickey authentication mode co

Seite 752

1-11 This configuration task is unnecessary if the SSH user’s authentication mode is password. For the publickey authentication mode, you must spec

Seite 753

1-12 Configuring the SSH Client The configurations required on the SSH client are related to the authentication mode that the SSH server uses. In add

Seite 754

1-13 z Selecting the protocol for remote connection as SSH. Usually, a client can use a variety of remote connection protocols, such as Telnet, Rlo

Seite 755

1-14 Figure 1-3 Generate the client keys (2) After the key pair is generated, click Save public key and enter the name of the file for saving the p

Seite 756

1-15 Likewise, to save the private key, click Save private key. A warning window pops up to prompt you whether to save the private key without any pr

Seite 757

1-16 Figure 1-7 SSH client configuration interface 1 In the Host Name (or IP address) text box, enter the IP address of the server. Note that there

Seite 758 - File System Configuration

7-6 Operation Command Description Create a basic ACL or enter basic ACL view acl number acl-number [ match-order { config | auto } ] As for the acl

Seite 759 - File Operations

1-17 Figure 1-8 SSH client configuration interface 2 Under Protocol options, select 2 from Preferred SSH protocol version. Some SSH client softwa

Seite 760 - Prompt Mode Configuration

1-18 Figure 1-9 SSH client configuration interface 3 Click Browse… to bring up the file selection window, navigate to the private key file and clic

Seite 761

1-19 Configuring whether first-time authentication is supported When the device connects to the SSH server as an SSH client, you can configure whethe

Seite 762 - File Attribute Configuration

1-20 To do... Use the command... Remarks Start the client to establish a connection with an SSH server ssh2 { host-ip | host-name } [ port-num ] [

Seite 763 - Configuring File Attributes

1-21 Operation Original commands Current commands Display information about the peer RSA public keys display rsa peer-public-key [ brief | name k

Seite 764

1-22 Network diagram Figure 1-10 Switch acts as server for local password authentication Configuration procedure z Configure the SSH server # Crea

Seite 765

1-23 # Configure the SSH client software to establish a connection to the SSH server. Take SSH client software Putty (version 0.58) as an example: 1

Seite 766 - FTP and SFTP Configuration

1-24 Figure 1-12 SSH client configuration interface 2 Under Protocol options, select 2 from Preferred SSH protocol version. 3) As shown in Figure

Seite 767 - FTP Configuration

1-25 Network diagram Figure 1-13 Switch acts as server for password and RADIUS authentication Configuration procedure 1) Configure the RADIUS serv

Seite 768

1-26 Figure 1-14 Add an access device # Add a user for device management. From the navigation tree, select User Management > User for Device Man

Seite 769

7-7 [Sysname] ip http acl 2030

Seite 770

1-27 Generating the RSA and DSA key pairs on the server is prerequisite to SSH login. # Generate RSA and DSA key pairs. [Switch] public-key local c

Seite 771

1-28 Figure 1-16 SSH client configuration interface (1) In the Host Name (or IP address) text box, enter the IP address of the SSH server. z From

Seite 772

1-29 authentication succeeds, you will log in to the server. The level of commands that you can access after login is authorized by the CAMS server.

Seite 773

1-30 [Switch-ui-vty0-4] authentication-mode scheme # Enable the user interfaces to support SSH. [Switch-ui-vty0-4] protocol inbound ssh [Switch-ui-vt

Seite 774 - 2.2.2.2/8

1-31 2) From the category on the left pane of the window, select Connection > SSH. The window as shown in Figure 1-20 appears. Figure 1-20 SSH cl

Seite 775

1-32 Configuration procedure Under the publickey authentication mode, either the RSA or DSA public key can be generated for the server to authentic

Seite 776 - SFTP Configuration

1-33 # Import the client’s public key named Switch001 from file public. [Switch] public-key peer Switch001 import sshkey public # Assign the public

Seite 777

1-34 Figure 1-23 Generate a client key pair (2) After the key pair is generated, click Save public key and enter the name of the file for saving th

Seite 778

1-35 Likewise, to save the private key, click Save private key. A warning window pops up to prompt you whether to save the private key without any pr

Seite 779 - SFTP Configuration Example

1-36 Figure 1-27 SSH client configuration interface 2 Under Protocol options, select 2 from Preferred SSH protocol version. 4) Select Connection/SS

Seite 780

i Table of Contents 1 Configuration File Management···································································································

Seite 781

1-37 Click Browse… to bring up the file selection window, navigate to the private key file and click OK. 5) From the window shown in Figure 1-28, cl

Seite 782 - # Exit SFTP

1-38 [SwitchB] local-user client001 [SwitchB-luser-client001] password simple abc [SwitchB-luser-client001] service-type ssh level 3 [SwitchB-luser-c

Seite 783 - 2 TFTP Configuration

1-39 Configuration procedure In public key authentication, you can use either RSA or DSA public key. Here takes the DSA public key as an example.

Seite 784 - TFTP Configuration Example

1-40 # Import the client public key pair named Switch001 from the file Switch001. [SwitchB] public-key peer Switch001 import sshkey Switch001 # Assi

Seite 785

1-41 When Switch Acts as Client and First-Time Authentication is not Supported Network requirements As shown in Figure 1-31, establish an SSH connect

Seite 786

1-42 Before doing the following steps, you must first generate a DSA key pair on the client and save the key pair in a file named Switch001, and the

Seite 787 - 1 Information Center

1-43 When first-time authentication is not supported, you must first generate a DSA key pair on the server and save the key pair in a file named Sw

Seite 788

i Table of Contents 1 File System Management Configuration····························································································

Seite 789

1-1 1 File System Management Configuration File System Configuration Introduction to File System To facilitate management on the switch memory, S310

Seite 790 - System Information Format

1-2 Table 1-2 Directory operations To do… Use the command… Remarks Create a directory mkdir directory Optional Delete a directory rmdir directory O

Seite 791 - Sysname

1-1 1 Configuration File Management Introduction to Configuration File A configuration file records and stores user configurations performed to a sw

Seite 792

1-3 To do… Use the command… Remarks Execute the specified batch file execute filename Optional This command should be executed in system view. z

Seite 793

1-4 To do… Use the command… Remarks Configure the prompt mode of the file system file prompt { alert | quiet } Required By default, the prompt mod

Seite 794

1-5 7239 KB total (3585 KB free) (*) -with main attribute (b) -with backup attribute (*b) -with both main and backup attribute File Attribute Con

Seite 795

1-6 Booting with the Startup File The device selects the main startup file as the preferred startup file. If the device fails to boot with the main s

Seite 796

1-7 z The configuration of the main or backup attribute of a Web file takes effect immediately without restarting the switch. z After upgrading a

Seite 797

i Table of Contents 1 FTP and SFTP Configuration······································································································

Seite 798

1-1 1 FTP and SFTP Configuration Introduction to FTP and SFTP Introduction to FTP FTP (file transfer protocol) is commonly used in IP-based networks

Seite 799

1-2 FTP Configuration Table 1-2 FTP configuration tasks Item Configuration task Description Creating an FTP user Required Enabling an FTP server

Seite 800

1-3 z Only one user can access an H3C S3100 series Ethernet switch at a given time when the latter operates as an FTP server. z Operating as an F

Seite 801

1-4 With an H3C S3100 series Ethernet switch acting as the FTP server, if a network administrator attempts to disconnect a user that is uploading/do

Seite 802

1-2 z When setting the configuration file for next startup, you can specify to use the main or backup configuration file. Startup with the configura

Seite 803 - Log Output to the Console

1-5 Table 1-7 Configure the banner display for an FTP server Operation Command Description Enter system view system-view — Configure a login banner

Seite 804

1-6 Operation Command Description Get the local working path on the FTP client lcd Display the working directory on the FTP server pwd Create a dir

Seite 805

1-7 to upgrade the switch application and download the configuration file config.cfg from the switch, thus to back up the configuration file. z Cre

Seite 806

1-8 ftp> put switch.bin 200 Port command okay. 150 Opening ASCII mode data connection for switch.bin. 226 Transfer complete. ftp: 75980 bytes rece

Seite 807

1-9 z An FTP user named “switch” and the password “hello” have been configured on the FTP server. z The IP addresses 1.1.1.1 for a VLAN interface

Seite 808 - BOOT Menu

1-10 z Create a user account on the FTP server with the user name “switch” and password “hello”, and grant the user “switch” read and write permissi

Seite 809 - Loading Boot ROM

1-11 [ftp] put config.cfg # Execute the get command to download the file named switch.bin to the Flash memory of the switch. [ftp] get switch.bin # E

Seite 810

1-12 Configuring connection idle time After the idle time is configured, if the server does not receive service requests from a client within a speci

Seite 811 - Loading ...CCCCCCCCCC

1-13 Operation Command Description Enter SFTP client view sftp { host-ip | host-name } [ port-num ] [ identity-key { dsa | rsa } | prefer_kex { dh_

Seite 812 - Loading ...CCCCCCCCCC done!

1-14 If you specify to authenticate a client through public key on the server, the client needs to read the local private key when logging in to the

Seite 813 - Introduction to TFTP

1-3 S3100 series Ethernet switches do not support the safe mode. When you are saving a configuration file using the save safely command, if the devi

Seite 814 - Loading the Boot ROM

1-15 # Configure the authentication mode as password. Authentication timeout time, retry number, and update time of the server key adopt the default

Seite 815 - Introduction to FTP

1-16 drwxrwxrwx 1 noone nogroup 0 Sep 01 06:22 new -rwxrwxrwx 1 noone nogroup 225 Sep 01 06:55 pub Received status: End of fi

Seite 816

1-17 -rwxrwxrwx 1 noone nogroup 283 Sep 02 06:36 puk Received status: End of file Received status: Success sftp-client> # Exit SFTP. s

Seite 817 - Remote Loading Using FTP

2-1 2 TFTP Configuration Introduction to TFTP Compared with FTP, TFTP (trivial file transfer protocol) features simple interactive access interface

Seite 818 - <Sysname> reboot

2-2 Item Configuration task Description TFTP server configuration For details, see the corresponding manual — TFTP Configuration: A Switch Opera

Seite 819

2-3 2) Configure the TFTP client (switch). # Log in to the switch. (You can log in to a switch through the Console port or by telnetting the switch.

Seite 820

i Table of Contents 1 Information Center··············································································································

Seite 821 - Remote Loading Using TFTP

1-1 1 Information Center Information Center Overview Introduction to Information Center Acting as the system information hub, information center cla

Seite 822

1-2 The system supports ten channels. The channels 0 through 5 have their default channel names and are associated with six output directions by defa

Seite 823 - Displaying the System Status

1-3 Module name Description DEV Device management module DNS Domain name system module ETH Ethernet module FIB Forwarding module FTM Fabric topol

Seite 824 - Debugging the System

1-4 z While the reset saved-configuration [ main ] command erases the configuration file with main attribute, it only erases the main attribute of a

Seite 825 - Displaying Debugging Status

1-4 To sum up, the major task of the information center is to output the three types of information of the modules onto the ten channels in terms of

Seite 826 - Command Alias Configuration

1-5 z severity (the information level) ranges from 1 to 8. Table 1-1 details the value and meaning associated with each severity. Note that the prio

Seite 827 - 3 Network Connectivity Test

1-6 Note that there is a space between the sysname and module fields. %% This field is a preamble used to identify a vendor. It is displayed only whe

Seite 828 - 4 Device Management

1-7 Task Remarks Setting to Output System Information to the SNMP NMS Optional Configuring Synchronous Information Output Synchronous information

Seite 829

1-8 Operation Command Description Log host direction info-center timestamp loghost date Set the time stamp format in the output direction of the in

Seite 830 - Upgrading the Boot ROM

1-9 Table 1-8 Default output rules for different output directions LOG TRAP DEBUG Output direction Modules allowed Enabled/disabled SeverityEnabled

Seite 831

1-10 Setting to output system information to a monitor terminal Table 1-10 Set to output system information to a monitor terminal Operation Command

Seite 832

1-11 Make sure that the debugging/log/trap information terminal display function is enabled (use the terminal monitor command) before you enable th

Seite 833

1-12 Setting to Output System Information to the Trap Buffer Table 1-13 Set to output system information to the trap buffer Operation Command Descr

Seite 834

1-13 Setting to Output System Information to the SNMP NMS Table 1-15 Set to output system information to the SNMP NMS Operation Command Description

Seite 835 - Scheduled Task Configuration

6 Software version Added features compared with the earlier version Release 2108P04 Part Limit broadcast traffic in pps 09-Port Basic Configuration O

Seite 836

1-5 Displaying Device Configuration After the above configuration, you can execute the display command in any view to display the current and initial

Seite 837

1-14 Operation Command Description Display the status of trap buffer and the information recorded in the trap buffer display trapbuffer [ unit unit

Seite 838

1-15 # Switch configuration messages local4.info /var/log/Switch/information When you edit the file “/etc/syslog.conf”, note that: z A note mus

Seite 839 - 1 VLAN-VPN Configuration

1-16 # Enable the information center. <Switch> system-view [Switch] info-center enable # Configure the host whose IP address is 202.38.1.10 as

Seite 840 - Implementation of VLAN-VPN

1-17 Log Output to the Console Network requirements The switch sends the following information to the console: the log information of the two module

Seite 841 - VLAN-VPN Configuration

1-18 # Set the time stamp format of the log information to be output to the log host to date. <Switch> system-view System View: return to User

Seite 842 - VLAN-VPN

i Table of Contents 1 Boot ROM and Host Software Loading ·····························································································

Seite 843

ii Configuring a Scheduled Task················································································································5-1 Con

Seite 844 - Data transfer process

1-1 1 Boot ROM and Host Software Loading Traditionally, switch software is loaded through a serial port. This approach is slow, time-consuming and c

Seite 845 - Selective QinQ Configuration

1-2 BOOT Menu Starting... *********************************************************** *

Seite 846

1-3 Loading by XModem through Console Port Introduction to XModem XModem protocol is a file transfer protocol that is widely used due to its simplici

Seite 847

i Table of Contents 1 VLAN Overview···················································································································

Seite 848

1-4 If you have chosen 9600 bps as the download baudrate, you need not modify the HyperTerminal’s baudrate, and therefore you can skip Step 4 and 5

Seite 849

1-5 Figure 1-2 Console port configuration dialog box Step 5: Click the <Disconnect> button to disconnect the HyperTerminal from the switch an

Seite 850

1-6 Step 7: Choose [Transfer/Send File] in HyperTerminal, and click <Browse> in pop-up dialog box, as shown in Figure 1-4. Select the software

Seite 851 - 3 BPDU Tunnel Configuration

1-7 z If the HyperTerminal’s baudrate is not reset to 9600 bps, the system prompts "Your baudrate should be set to 9600 bps again! Press enter

Seite 852

1-8 Loading the Boot ROM Figure 1-6 Local loading using TFTP Step 1: As shown in Figure 1-6, connect the switch through an Ethernet port to the TFT

Seite 853 - BPDU Tunnel Configuration

1-9 Step 6: Enter Y to start file downloading or N to return to the Boot ROM update menu. If you enter Y, the system begins to download and update th

Seite 854

1-10 You can use one computer as both configuration device and FTP server. Step 2: Run the FTP server program on the FTP server, configure an FTP u

Seite 855

1-11 When loading the Boot ROM and host software using FTP through BOOT menu, you are recommended to use the PC directly connected to the device as

Seite 856

1-12 This will update BootRom file on unit 1. Continue? [Y/N] y Upgrading BOOTROM, please wait... Upgrade BOOTROM succeeded! Step 3: Restart the s

Seite 857

1-13 You can configure the IP address for any VLAN on the switch for FTP transmission. However, before configuring the IP address for a VLAN interfa

Seite 858 - VLAN Mapping Configuration

ii Associating a Port with a Protocol-Based VLAN···········································································2-10 Displaying Protocol-Ba

Seite 859

1-14 Figure 1-11 Enter Boot ROM directory Step 6: Enter ftp 192.168.0.28 and enter the user name test, password pass, as shown in Figure 1-12, to l

Seite 860

1-15 Figure 1-13 Upload file switch.btm to the switch Step 8: Configure switch.btm to be the Boot ROM at next startup, and then restart the switch.

Seite 862

2-1 2 Basic System Configuration and Debugging Basic System Configuration Table 2-1 Basic System Configuration Operation Command Description Set t

Seite 863

2-2 Table 2-2 System information display commands Operation Command Description Display the current date and time of the system display clock Displ

Seite 864

2-3 You can use the following commands to enable the two switches. Table 2-3 Enable debugging and terminal display for a specific module Operation

Seite 865

2-1 Command Alias Configuration Introduction As the network environment becomes more complex and network products become increasingly diverse, users

Seite 866

3-1 3 Network Connectivity Test Network Connectivity Test ping You can use the ping command to check the network connectivity and the reachability o

Seite 867 - Configuring DHCP Option 82

4-1 4 Device Management Introduction to Device Management Device Management includes the following: z Reboot the Ethernet switch z Configure real-

Seite 868

4-2 Scheduling a Reboot on the Switch After you schedule a reboot on the switch, the switch will reboot at the specified time. Table 4-3 Schedule a

Seite 869 - 1 HWPing Configuration

1-1 1 VLAN Overview This chapter covers these topics: z VLAN Overview z Port-Based VLAN z MAC-Based VLAN z Protocol-Based VLAN VLAN Overview Int

Seite 870 - HWPing Test Parameters

4-3 Table 4-5 Specify the APP to be used at reboot Operation Command Description Specify the APP to be used at reboot boot boot-loader [ backup-att

Seite 871

4-4 Table 4-8 Commonly used pluggable transceivers Transceiver type Applied environment Whether can be an optical transceiver Whether can be an elec

Seite 872 - HWPing Configuration

4-5 TX power, and RX power. When these parameters are abnormal, you can take corresponding measures to prevent transceiver faults. Table 4-10 Display

Seite 873

4-6 The switch acts as the FTP client, and the remote PC serves as both the configuration PC and the FTP server. Perform the following configuration

Seite 874

4-7 Trying ... Press CTRL+K to abort

Seite 875

5-1 5 Scheduled Task Configuration What Is a Scheduled Task A scheduled task defines a command or a group of commands and when such commands will be

Seite 876

5-2 Specify the time delay to execute the commands in the task Follow these steps to configure a scheduled task: To do… Use the command… Descripti

Seite 877

5-3 [Switch] job phone1 # Configure the view where the specified command to be executed as Ethernet interface view. [Switch-job-phone1] view Ethernet

Seite 878

i Table of Contents 1 VLAN-VPN Configuration··········································································································

Seite 879

1-1 1 VLAN-VPN Configuration When configuring VLAN-VPN, go to these sections for information you are interested in: z VLAN-VPN Overview z VLAN-VPN

Seite 880

1-2 way. However, hosts in different VLANs cannot communicate with each other directly but need the help of network layer devices, such as routers an

Seite 881

1-2 Implementation of VLAN-VPN With the VLAN-VPN feature enabled, no matter whether or not a received packet already carries a VLAN tag, the switch w

Seite 882

1-3 Protocol type Value IS-IS 0x8000 LACP 0x8809 802.1x 0x888E VLAN-VPN Configuration VLAN-VPN Configuration Task List Complete the following tasks

Seite 883

1-4 Follow these steps to configure the TPID for VLAN-VPN packets : To do... Use the command... Remarks Enter system view system-view — Set the TPI

Seite 884

1-5 Network diagram Figure 1-4 Network diagram for VLAN-VPN configuration Configuration procedure z Configure Switch A. # Enable the VLAN-VPN feat

Seite 885

1-6 [SwitchB] interface Ethernet 1/0/21 [SwitchB-Ethernet1/0/21] vlan-vpn enable # Set the global TPID value to 0x9200 (for intercommunication with t

Seite 886

2-1 2 Selective QinQ Configuration This chapter is only applicable to S3100-EI series switches. When configuring selective QinQ, go to these sect

Seite 887

2-2 Figure 2-1 Diagram for a selective QinQ implementation In this implementation, Switch A is an access device of the service provider. The users

Seite 888 - ICMP Test

2-3 Configuring Global Tag Mapping Rules for Selective QinQ Table 2-1 Configure global tag mapping rules for selective QinQ Operation Command Descr

Seite 889 - DHCP Test

2-4 z The public network permits packets of VLAN 1000 and VLAN 1200. Apply QoS policies for these packets to reserve bandwidth for packets of VLAN 1

Seite 890

2-5 [SwitchA-Etherent1/0/5] port hybrid vlan 5 1000 1200 tagged [SwitchA-Ethernet1/0/5] quit # Configure Ethernet 1/0/3 as a hybrid port and configur

Seite 891 - FTP Test

1-3 IEEE 802.1Q inserts a four-byte VLAN tag after the DA&SA field, as shown in Figure 1-3. Figure 1-3 Format of VLAN tag A VLAN tag comprises

Seite 892 - HTTP Test

2-6 [SwitchB-Etherent1/0/12] port hybrid pvid vlan 12 [SwitchB-Etherent1/0/12] port hybrid vlan 12 1000 untagged [SwitchB-Ethernet1/0/12] quit # Con

Seite 893

3-1 3 BPDU Tunnel Configuration This chapter is only applicable to S3100-EI series switches. When configuring BPDU tunnel, go to these sections f

Seite 894 - Jitter Test

3-2 customer network to the service provider network. The customer network contains Network A and Network B. You can make the BPDU packets of the cus

Seite 895

3-3 Figure 3-3 The structure of a BPDU packet after it enters a BPDU tunnel To prevent the devices in the service provider network from processin

Seite 896 - SNMP Test

3-4 To do... Use the command... Remarks Enter Ethernet port view interface interface-type interface-number — Enable BPDU tunnel for packets of a sp

Seite 897

3-5 z Enable the service provider network to transmit STP packets of the customer network through BPDU tunnel. The destination MAC address for tunne

Seite 898

3-6 [Sysname-Ethernet1/0/4] bpdu-tunnel stp # Enable VLAN-VPN and use VLAN 100 to transmit user data packets through BPDU tunnels. [Sysname-Ethernet

Seite 899

i Table of Contents 1 VLAN Mapping Configuration ·····································································································

Seite 900

1-1 1 VLAN Mapping Configuration The VLAN mapping feature is applicable to only the S3100-EI series among the S3100 series. VLAN Mapping Overvie

Seite 901 - DNS Test

1-2 As shown in Figure 1-1, each user in the community has multiple applications. The VLAN technology is used on the home gateway to distinguish tra

Seite 902

1-4 z Shared VLAN learning (SVL), where the switch records all learned MAC address entries in one MAC address table, regardless of in which VLAN the

Seite 903

1-3 Figure 1-3 After many-to-one VLAN mapping …… Configuring the DHCP Option 82 for Many-to-One VLAN Mapping Option 82 is the relay agent option in

Seite 904 - 1 IPv6 Configuration

1-4 Configuring One-to-one VLAN Mapping One-to-one VLAN Mapping Configuration Task List Complete the following tasks to configure one-to-one VLAN ma

Seite 905 - Introduction to IPv6 Address

1-5 z You cannot enable one-to-one VLAN mapping on a link aggregation group member port. z When you configure a global one-to-one VLAN mapping ru

Seite 906 - IPv6 address classification

1-6 To do… Use the command… Remarks Configure a many-to-one VLAN mapping rule and enable many-to-one VLAN mapping on the port vlan-mapping n-to-1 v

Seite 907 - Multicast address

1-7 This example describes how to configure one-to-one VLAN mapping for two users: map the three traffic streams from user A to VLAN 1001, VLAN 1002,

Seite 908

1-8 z If you configure Ethernet 1/0/1 and Ethernet 1/0/2 as trunk ports, you also need to assign them to the corresponding original VLANs and targe

Seite 909 - Duplicate address detection

1-9 Figure 1-6 Network diagram for many-to-one VLAN mapping configuration …… Configuration Procedure Configuring Many-to-One VLAN Mapping # Create V

Seite 910 - Introduction to ND Snooping

1-10 [SwitchA] interface GigabitEthernet 1/1/1 [SwitchA-GigabitEthernet1/1/1] port link-type trunk [SwitchA-GigabitEthernet1/1/1] port trunk permit v

Seite 911 - Introduction to ND Detection

i Table of Contents 1 HWPing Configuration ···········································································································

Seite 912

1-1 1 HWPing Configuration When configuring HWPing, go to these sections for information you are interested in: z HWPing Overview z HWPing Configu

Seite 913

1-5 Port-Based VLAN Port-based VLAN technology introduces the simplest way to classify VLANs. You can assign the ports on the device to different VLA

Seite 914 - Untrusted Untrusted

1-2 Test Types Supported by HWPing Table 1-1 Test types supported by HWPing Supported test types Description ICMP test DHCP test FTP test HTTP test

Seite 915 - Introduction to IPv6 DNS

1-3 Test parameter Description Number of probes per test (count) For tests except jitter test, only one test packet is sent in a probe. In a jitter

Seite 916 - IPv6 Configuration Task List

1-4 Test parameter Description Interval to send jitter test packets (jitter-interval) Each jitter probe will send multiple UDP test packets at regul

Seite 917

1-5 To do… Use the command… Remarks Enter system view system-view — Enable the HWPing client function hwping-agent enable Required By default, the

Seite 918 - Configuring IPv6 NDP

1-6 To do… Use the command… Remarks Configure the retaining time of statistics information statistics keep-time keep-time Optional By default, the

Seite 919 - Configure the NS Interval

1-7 To do… Use the command… Remarks Create an HWPing test group and enter its view hwping administrator-name operation-tag Required By default, no

Seite 920

1-8 To do… Use the command… Remarks Enable the HWPing client function hwping-agent enable Required By default, the HWPing client function is disabl

Seite 921 - Configuring ND Snooping

1-9 To do… Use the command… Remarks Configure the probe timeout time timeout time Optional By default, a probe times out in three seconds. Configur

Seite 922 - Configuring the ND Detection

1-10 To do… Use the command… Remarks Configure the source IP address source-ip ip-address Optional By default, no source IP address is configured.

Seite 923 - Configuring DHCPv6 Snooping

1-11 To do… Use the command… Remarks Configure the type of HTTP operation http-operation { get | post } Optional By default, the type of HTTP opera

Seite 924 - Configuring IPv6 Filtering

1-6 Before assigning an access or hybrid port to a VLAN, create the VLAN first. Configuring the Default VLAN ID for a Port An access port can belo

Seite 925 - Configuring IPv6 DNS

1-12 To do… Use the command… Remarks Configure a stuffing character string datafill string Optional By default, the numbers between 0 and 255 are s

Seite 926

1-13 To do… Use the command… Remarks Configure advantage factor for a jitter voice test adv-factor adv-number By default, the advantage factor is z

Seite 927 - IPv6 Configuration Examples

1-14 To do… Use the command… Remarks Configure the retaining time of statistics information statistics keep-time keep-time Optional By default, the

Seite 928

1-15 To do… Use the command… Remarks Configure the destination port destination-port port-number Required in a Tcpprivate test A Tcppublic test is

Seite 929

1-16 To do… Use the command… Remarks Configure the type of service tos value Optional By default, the service type is zero. Start the test test-ena

Seite 930 - Networking diagram

1-17 To do… Use the command… Remarks Enable history record history-record enable Optional By default, history record is not enabled. Configure the

Seite 931

1-18 To do… Use the command… Remarks Configure the source IP address source-ip ip-address Optional By default, no source IP address is specified. C

Seite 932

1-19 To do… Use the command… Remarks Configure the IP address of the DNS server dns-server ip-address Required By default, no DNS server address is

Seite 933 - IPv6 Traceroute

1-20 Displaying HWPing Configuration To do… Use the command… Remarks Display the results of the test display hwping { results | history | jitter }

Seite 934 - IPv6 TFTP

1-21 Destination ip address:10.2.2.2 Send operation times: 10 Receive response times: 10 Min/Max/Average Round Trip Ti

Seite 935 - IPv6 Telnet

1-7 MAC-Based VLAN The contents of this section are only applicable to the S3100-EI series among S3100 series switches. Introduction to MAC-Based V

Seite 936

1-22 [Sysname-hwping-administrator-dhcp] source-interface Vlan-interface 1 # Configure to make 10 probes per test. [Sysname-hwping-administrator-dhc

Seite 937 - Unable to Run Traceroute

1-23 FTP Test Network requirements Both the HWPing client and the FTP server are H3C S3100 series Ethernet switches. Perform an HWPing FTP test betwe

Seite 938 - Unable to Run Telnet

1-24 # Start the test. [Sysname-hwping-administrator-ftp] test-enable # Display test results [Sysname-hwping-administrator-ftp] display hwping resul

Seite 939

1-25 Network diagram Figure 1-5 Network diagram for the HTTP test Configuration procedure z Configure HTTP Server: Use Windows 2003 Server as the

Seite 940 - 1 DNS Configuration

1-26 DNS Resolve Time: 0 HTTP Operation Time: 675 DNS Resolve Min Time: 0 HTTP Test Total Time: 748 D

Seite 941 - DNS suffixes

1-27 <Sysname> system-view [Sysname] hwping-server enable [Sysname] hwping-server udpecho 10.2.2.2 9000 z Configure HWPing Client (Switch A):

Seite 942

1-28 Negative SD Number:30 Negative DS Number:24 Negative SD Sum:64 Negative DS Sum: 41 Negative S

Seite 943 - DNS Configuration Example

1-29 z The SNMP network management function must be enabled on SNMP agent before it can receive response packets. z The SNMPv2c version is used as

Seite 944

1-30 4 10 1 0 2000-04-03 08:57:19.9 5 9 1 0 2000-04-03 08:57:19.9

Seite 945 - Troubleshooting DNS

1-31 [Sysname-hwping-administrator-tcpprivate] history-records 10 # Start the test. [Sysname-hwping-administrator-tcpprivate] test-enable # Display

Seite 946

7 Software version Added features compared with the earlier version Release 2108P04 Part Web authentication 20-Web Authentication Operation DHCP Serve

Seite 947 - 1 Smart Link Configuration

1-8 Protocol-Based VLAN The contents of this section are only applicable to the S3100-EI series among S3100 series switches. Introduction to Proto

Seite 948 - Flush message

1-32 <Sysname> system-view [Sysname] hwping-server enable [Sysname] hwping-server udpecho 10.2.2.2 8000 z Configure HWPing Client (Switch A):

Seite 949 - Configuring Smart Link

1-33 7 10 1 0 2000-04-02 08:29:45.3 8 10 1 0 2000-04-02 08:29:45.3

Seite 950 - Configuration Tasks

1-34 [Sysname-hwping-administrator-dns] display hwping results administrator dns HWPing entry(admin administrator, tag dns) test result: Destin

Seite 951 - Precautions

i Table of Contents 1 IPv6 Configuration··············································································································

Seite 952

1-1 1 IPv6 Configuration z H3C S3100 Series Ethernet Switches support IPv6 management features, but do not support IPv6 forwarding and related fe

Seite 953

1-2 Adequate address space The source IPv6 address and the destination IPv6 address are both 128 bits (16 bytes) long. IPv6 can provide 3.4 x 1038 ad

Seite 954

1-3 z If an IPv6 address contains two or more consecutive groups of zeros, they can be replaced by the double-colon (::) option. For example, the ab

Seite 955 - Monitor Link Configuration

1-4 Type Format prefix (binary) IPv6 prefix ID Anycast address Anycast addresses are taken from unicast address space and are not syntactically dis

Seite 956 - Configuring Monitor Link

1-5 hexadecimal number FFFE needs to be inserted in the middle of MAC addresses (behind the 24 high-order bits).To ensure the interface identifier ob

Seite 957 - Configuring the Uplink Port

1-6 z H3C S3100 Series Ethernet Switches do not support RS, RA, or Redirect message. z Of the above mentioned IPv6 NDP functions, H3C S3100 Serie

Seite 958 - Configuring a Downlink Port

1-9 Packets with the value of the type or length field being in the range 0x05DD to 0x05FF are regarded as illegal packets and thus discarded directl

Seite 959

1-7 duplication address detection is accomplished through NS and NA messages. Figure 1-4 shows the duplicate address detection procedure. Figure 1-4

Seite 960

1-8 z If they are consistent, the device resets the aging timer for the ND snooping entry. z If they are inconsistent and the received packet is a

Seite 961

1-9 z Router Advertisement (RA) z Redirect The ND protocol functions powerfully, but without any security mechanism, it is apt to be used by attac

Seite 962

1-10 The user legality check is based on the source IPv6 address and source MAC address in the ND packet to check whether the user is legal on the VL

Seite 963 - Interface Can Learn

1-11 Ensuring DHCPv6 clients to obtain IP addresses from authorized DHCPv6 servers If there is an unauthorized DHCPv6 server on a network, the DHCPv6

Seite 964

1-12 Figure 1-7 Diagram for the IPv6 filtering function The switch can filter invalid IPv6 packets through IPv6 static binding entries or IP-to-MAC

Seite 965

1-13 z RFC 1981: Path MTU Discovery for IP version 6 z RFC 2375: IPv6 Multicast Address Assignments z RFC 2460: Internet Protocol, Version 6 (IPv6

Seite 966 - [Switch-Ethernet1/0/1] quit

1-14 z Manual configuration: IPv6 site-local addresses or global unicast addresses are configured manually. IPv6 link-local addresses can be acquire

Seite 967 - Configuration Procedures

1-15 z IPv6 unicast addresses can be configured for only one VLAN interface of an H3C S3100 Series Ethernet Switches. Only one global unicast addre

Seite 968

1-16 dynamically learned neighbors reaches the threshold, the interface will stop learning neighbor information. Table 1-7 Configure the maximum numb

Seite 969 - [Switch-Ethernet1/0/1] dot1x

2-1 2 VLAN Configuration When configuring a VLAN, go to these sections for information you are interested in: z VLAN Configuration z Configuring a

Seite 970

1-17 Table 1-10 Configure the neighbor reachable timeout time on an interface To do… Use the command… Remarks Enter system view system-view — Enter

Seite 971 - 1 LLDP Configuration

1-18 Configuring the Maximum Number of IPv6 ICMP Error Packets Sent within a Specified Time If too many IPv6 ICMP error packets are sent within a sho

Seite 972

1-19 Configuring ND snooping Follow these steps to configure ND snooping: To do… Use the command… Remarks Enter system view system-view — Enter VLA

Seite 973 - LLDPDUs

1-20 To do… Use the command Remarks Enter Layer-2 Ethernet interface view interface interface-type interface-number — Configure the ports requirin

Seite 974

1-21 Configuring DHCPv6 snooping support for DHCPv6 Option 18/Option 37 DHCPv6 Option 37, also known as the DHCPv6 relay agent remote ID option, reco

Seite 975 - Operating Modes of LLDP

1-22 You cannot configure both IPv6 filtering and port binding. Configuring IPv6 DNS Configure a static host name to IPv6 address mapping You can d

Seite 976 - LLDP Configuration Task List

1-23 Displaying and Maintaining IPv6 To do… Use the command… Remarks Display DHCPv6 snooping entries display dhcp-snooping ipv6 { all | unit unit-i

Seite 977 - Setting LLDP Operating Mode

1-24 To do… Use the command… Remarks Clear the statistics by ND detection reset ipv6 nd detection statistics [ interface interface-type interface-n

Seite 978 - Enabling LLDP Polling

1-25 [SwitchB-Vlan-interface1] ipv6 address 3001::2/64 Verification # Display the brief IPv6 information of an interface on Switch A. [SwitchA-Vlan-i

Seite 979

1-26 bytes=56 Sequence=3 hop limit=64 time = 6 ms Reply from FE80::2E0:FCFF:FE00:2006 bytes=56 Sequence=4 hop limit=64 time = 7 ms

Seite 980

2-2 z VLAN 1 is the system default VLAN, which needs not to be created and cannot be removed, either. z The VLAN you created in the way described

Seite 981 - Configuring LLDP Trapping

1-27 Configuration procedure # Enable DHCPv6 snooping. <SwitchA> system-view [SwitchA] dhcp-snooping ipv6 enable # Specify Ethernet 1/1 as trus

Seite 982 - LLDP Configuration Examples

1-28 # Configure the upper port Ethernet 1/0/3 as ND trusted port, while the lower ports Ethernet 1/0/1 and Ethernet 1/0/2 as the default state, name

Seite 983

1-29 # Enable IPv6 filtering on Ethernet 1/0/2, Ethernet 1/0/3, and Ethernet 1/0/4 to filter packets based on the source IP addresses/MAC addresses.

Seite 984 - LLDP status on Switch A

2-1 2 IPv6 Application Configuration Introduction to IPv6 Applications IPv6 are supporting more and more applications. Most of IPv6 applications are

Seite 985

2-2 Figure 2-1 Traceroute process Device AHop Limit=1Hop Limit exceededHop Limit=2Hop Limit exceededHop Limit=nUDP port unreachableDevice B Device C

Seite 986

2-3 When you use the tftp ipv6 command to connect to the TFTP server, you must specify the “–i” keyword if the destination address is a link-local a

Seite 987

2-4 IPv6 Application Configuration Example Network requirements In Figure 2-3, SWA, SWB, and SWC are three switches, among which SWA is an H3C S3100

Seite 988

2-5 # On SWA, configure static routes to SWC, the Telnet Server, and the TFTP Server. <SWA> system-view [SWA] ipv6 route-static 3002:: 64 3003:

Seite 989 - 1 PKI Configuration

2-6 Unable to Run TFTP Symptom Unable to download and upload files by performing TFTP operations. Solution z Check that the route between the device

Seite 990 - Architecture of PKI

i Table of Contents 1 DNS Configuration···············································································································

Seite 991 - Operation of PKI

2-3 To do... Use the command... Remarks Create a VLAN interface and enter VLAN interface view interface Vlan-interface vlan-id Required By default,

Seite 992 - Configuring an Entity DN

1-1 1 DNS Configuration This chapter covers only IPv4 DNS configuration. For details about IPv6 DNS, refer to IPv6 Management Operation. DNS Over

Seite 993

1-2 Figure 1-1 Dynamic domain name resolution Figure 1-1 shows the relationship between user program, DNS client, and DNS server. The resolver and

Seite 994 - Configuring a PKI Domain

1-3 z The IP address you assign to a host name last time will overwrite the previous one if there is any. z You may create up to 50 static mappin

Seite 995

1-4 Operation Command… Remarks Clear the information in the dynamic domain name cache reset dns dynamic-host Available in user view DNS Configurat

Seite 996

1-5 Dynamic Domain Name Resolution Configuration Example Network requirements As shown in Figure 1-3, the switch serving as a DNS client uses dynamic

Seite 997

1-6 Reply from 3.1.1.1: bytes=56 Sequence=2 ttl=125 time=4 ms Reply from 3.1.1.1: bytes=56 Sequence=3 ttl=125 time=4 ms Reply from 3.1.1.

Seite 998

i Table of Contents 1 Smart Link Configuration ·······································································································

Seite 999 - Deleting a Certificate

1-1 1 Smart Link Configuration Currently, only S3100-EI series Ethernet switches support the smart link feature. Smart Link Overview As shown in

Seite 1000

1-2 Master port The master port can be either an Ethernet port or a manually-configured or static LACP aggregation group. For example, you can config

Seite 1001 - PKI Configuration Examples

1-3 Operating Mechanism of Smart Link Figure 1-2 Network diagram of Smart Link operating mechanism BLOCKSwitch A Switch BEth1/0/1Eth1/0/2Switch C Sw

Seite 1002

2-4 To do… Use the command… Remarks Enter system view system-view — Enter VLAN view vlan vlan-id Required If the specified VLAN does not exist, thi

Seite 1003

1-4 Configuration Tasks Table 1-1 Smart Link configuration tasks Task Remarks Create a Smart Link group Add member ports to the Smart Link group Con

Seite 1004 - Network requirements

1-5 Operation Command Remarks Configure a link aggregation group as a member of the Smart Link group link-aggregation group group-id { master | sla

Seite 1005

1-6 5) When a Combo port operates as a member port of a Smart Link group, the optical port and the electrical port of the Combo port must not be bot

Seite 1006

1-7 Smart Link Configuration Example Implementing Link Redundancy Backup Network requirements As shown in Figure 1-3, Switch A is an H3C S3100 series

Seite 1007 - Troubleshooting PKI

1-8 # Configure Ethernet1/0/1 as the master port and Ethernet1/0/2 as the slave port for Smart Link group 1. [SwitchA-smlk-group1] port Ethernet 1/0

Seite 1008 - Failed to Retrieve CRLs

2-1 2 Monitor Link Configuration Currently, only S3100-EI series Ethernet switches support the monitor link feature. Introduction to Monitor Link

Seite 1009 - Solution

2-2 How Monitor Link Works Figure 2-2 Network diagram for a Monitor Link group implementation BLOCKSwitch A Switch BEth1/0/1Eth1/0/2Switch C Switch D

Seite 1010 - Table of Contents

2-3 Before configuring a Monitor Link group, you must create a Monitor Link group and configure member ports for it. A Monitor Link group consists o

Seite 1011 - 1 SSL Configuration

2-4 Operation Command Remarks Monitor Link group view port interface-type interface-number uplink quit interface interface-type interface-number C

Seite 1012 - SSL Configuration Task List

2-5 Table 2-5 Display Monitor Link configuration Operation Command Remarks Display the information about one or all Monitor Link groups display mon

Seite 1013 - Configuration Procedure

2-5 z To configure a Trunk port into a Hybrid port (or vice versa), you need to use the Access port as a medium. For example, the Trunk port has to

Seite 1014

2-6 [SwitchA-Ethernet1/0/1] stp disable [SwitchA-Ethernet1/0/1] quit [SwitchA] interface Ethernet 1/0/2 [SwitchA-Ethernet1/0/2] stp disable # Return

Seite 1015

i Table of Contents 1 ARP and IP Attack Defense Configuration ························································································

Seite 1016

1 1 ARP and IP Attack Defense Configuration ARP Packet Filtering Based on Gateway’s Address Introduction According to the ARP design, after receivin

Seite 1017 - Troubleshooting SSL

2 Among the S3100 series Ethernet switches, only the S3100-EI series support ARP Packet Filtering. Follow these steps to configure ARP packet filt

Seite 1018

3 To do… Use the command… Remarks Configure the maximum number of dynamic ARP entries that the VLAN interface can learn arp max-learning-num number

Seite 1019

4 Follow these steps to configure 802.1x-based ARP/IP attack defense: To do… Use the command… Remarks Enter system view system-view — Enable using

Seite 1020 - 1 HTTPS Configuration

5 z If they are not consistent, the ARP packet is considered invalid and the corresponding ARP entry is not learned. Enabling ARP Source MAC Addres

Seite 1021 - Enabling the HTTPS Service

6 [Switch] interface Ethernet 1/0/2 [Switch-Ethernet1/0/2] arp filter source 192.168.100.1 [Switch-Ethernet1/0/2] quit # Configure ARP packet filteri

Seite 1022 - Control Policy

7 [SwitchA-Vlan-interface1] arp max-learning-num 500 [SwitchA-Vlan-interface1] quit ARP/IP Attack Defense Configuration Example III Network Requireme

Seite 1023 - HTTPS Configuration Example

8 [Switch] interface ethernet1/0/1 [Switch-Ethernet1/0/1] dot1x # Enable IP filtering based on IP-MAC bindings of authenticated 802.1x clients. [Swi

Seite 1024

2-6 Port-Based VLAN Configuration Example Network requirements z As shown in Figure 2-1, Switch A and Switch B each connect to a server and a workst

Seite 1025

i Table of Contents 1 LLDP Configuration··············································································································

Seite 1026 - Ethernet OAM Configuration

1-1 1 LLDP Configuration When configuring LLDP, go to these sections for information you are interested in: z Overview z LLDP Configuration Task L

Seite 1027 - Ethernet OAMPDUs

1-2 Figure 1-1 Ethernet II-encapsulated LLDP frame format The fields in the frame are described in Table 1-1: Table 1-1 Description of the fields

Seite 1028 - How Ethernet OAM Works

1-3 Field Description Source MAC address The MAC address of the sending port. If the port does not have a MAC address, the MAC address of the sendin

Seite 1029 - Link monitoring

1-4 Type Description Remarks Port Description Port description of the sending port. System Name Assigned name of the sending device. System Descr

Seite 1030 - Standards and Protocols

1-5 LLDP-MED TLVs LLDP-MED TLVs provide multiple advanced applications for voice over IP (VoIP), such as basic configuration, network policy configur

Seite 1031

1-6 How LLDP Works Transmitting LLDP frames An LLDP-enabled port operating in TxRx mode or Tx mode sends LLDP frames to its directly connected device

Seite 1032 - Configuring Link Monitoring

1-7 Performing Basic LLDP Configuration Enabling LLDP To make LLDP take effect on certain ports, you need to enable LLDP both globally and on these p

Seite 1033

1-8 Enabling LLDP Polling With LLDP polling enabled, a device checks for local configuration changes periodically. Upon detecting a configuration ch

Seite 1034 - Enabling OAM Remote Loopback

1-9 To do… Use the command… Remarks Enter Ethernet interface view interface interface-type interface-number Required Enable LLDP to advertise manag

Seite 1035

2-7 Because the link between Switch A and Switch B need to transmit data of both VLAN 101 and VLAN 102, you can configure the ports at the end of the

Seite 1036

1-10 Setting an Encapsulation Format for LLDPDUs LLDPDUs can be encapsulated in Ethernet II or SNAP frames. z With Ethernet II encapsulation config

Seite 1037

1-11 With CDP compatibility enabled, the device can use LLDP to receive and recognize CDP packets from Cisco IP phones and respond with CDP packets c

Seite 1038

1-12 Follow these steps to configure LLDP trapping: To do… Use the command… Remarks Enter system view system-view — Enter Ethernet interface view i

Seite 1039 - 1 CFD Configuration

1-13 Figure 1-4 Network diagram for basic LLDP configuration NMSSwitch AMEDSwitch BEth1/0/2Eth1/0/1Eth1/0/1 Configuration procedure 1) Configure Sw

Seite 1040 - Maintenance point

1-14 Hold multiplier : 4 Reinit delay : 2s Transmit delay : 2s Trap interval :

Seite 1041

1-15 Port status of LLDP : Enable Admin status : Rx_Only Trap flag : No Roll time

Seite 1042 - CFD Functions

1-16 Figure 1-5 Network diagram for CDP-compatible LLDP configuration Configuration procedure 1) Configure a voice VLAN on Switch A # Create VLAN

Seite 1043 - CFD Configuration Task List

1-17 [SwitchA] display lldp neighbor-information CDP neighbor-information of port 1[Ethernet1/0/1]: CDP neighbor index : 1 Chassis ID : S

Seite 1044 - Enabling CFD

i Table of Contents 1 PKI Configuration ··············································································································

Seite 1045 - Configuring MEPs

1-1 1 PKI Configuration When configuring PKI, go to these sections for information you are interested in: z Introduction to PKI z PKI Configurati

Seite 1046

2-8 Configuring a MAC-Based VLAN Configuration prerequisites Create a VLAN before configuring the VLAN as a protocol-based VLAN. Configuration proce

Seite 1047 - Configuring CFD Functions

1-2 CAs are trusted by different users in a PKI system, the CAs will form a CA tree with the root CA at the top level. The root CA has a CA certifica

Seite 1048 - Configuring LT on MEPs

1-3 CA A CA is a trusted authority responsible for issuing and managing digital certificates. A CA issues certificates, specifies the validity period

Seite 1049 - CFD Configuration Example

1-4 2) The RA reviews the identity of the entity and then sends the identity information and the public key with a digital signature to the CA. 3)

Seite 1050

1-5 The configuration of an entity DN must comply with the CA certificate issue policy. You need to determine, for example, which entity DN paramete

Seite 1051

1-6 Configuring a PKI Domain Before requesting a PKI certificate, an entity needs to be configured with some enrollment information, which is referre

Seite 1052

1-7 To do… Use the command… Remarks Specify the entity for certificate request certificate request entity entity-name Required No entity is specifi

Seite 1053

1-8 Follow these steps to configure an entity to submit a certificate request in auto mode: To do… Use the command… Remarks Enter system view syste

Seite 1054 - Appendix A Acronyms

1-9 z If a PKI domain already has a local certificate, creating an RSA key pair will result in inconsistency between the key pair and the certifica

Seite 1055

1-10 z If a PKI domain already has a CA certificate, you cannot retrieve another CA certificate for it. This is in order to avoid inconsistency bet

Seite 1056

1-11 To do… Use the command… Remarks Enter PKI domain view pki domain domain-name — Disable CRL checking crl check disable Required Enabled by defa

Kommentare zu diesen Handbüchern

Keine Kommentare