User Guide
Page 25
... > Communications > HyperTerminal to be used to communicate with the switch. 1) Start the PC and run the terminal emulation program. 2) Set terminal parameters as follows: z Bits per second: 38,400 z Data bits: 8 z Parity: None z Stop bits: 1 z Flow control: None z Emulation: VT100 The specific procedure is as shown below. Figure 3-3 Connection description of the...
... > Communications > HyperTerminal to be used to communicate with the switch. 1) Start the PC and run the terminal emulation program. 2) Set terminal parameters as follows: z Bits per second: 38,400 z Data bits: 8 z Parity: None z Stop bits: 1 z Flow control: None z Emulation: VT100 The specific procedure is as shown below. Figure 3-3 Connection description of the...
User Guide
Page 116
... storm suppression function and the storm constrain function are mutually exclusive, do not enable storm constrain for the blocked traffic. For details, refer to control a specific type of traffic. z Shutdown: Shut down the port. For example, with broadcast storm suppression enabled on a port, do not enable them at the same time...
... storm suppression function and the storm constrain function are mutually exclusive, do not enable storm constrain for the blocked traffic. For details, refer to control a specific type of traffic. z Shutdown: Shut down the port. For example, with broadcast storm suppression enabled on a port, do not enable them at the same time...
User Guide
Page 117
... Storm Constrain Select Device > Storm Constrain from the interval set here is the interval used for measuring the average traffic sending and receiving rates over a specific interval.
... Storm Constrain Select Device > Storm Constrain from the interval set here is the interval used for measuring the average traffic sending and receiving rates over a specific interval.
User Guide
Page 122
..., alarm group, and event group. Event group The event group defines event indexes and controls the generation and notifications of the events triggered by RMON specifications (RFC 2819), the realized public MIB of a statistics entry on an interface. The events can be handled in one can be configured through the SNMP...
..., alarm group, and event group. Event group The event group defines event indexes and controls the generation and notifications of the events triggered by RMON specifications (RFC 2819), the realized public MIB of a statistics entry on an interface. The events can be handled in one can be configured through the SNMP...
User Guide
Page 151
... ACL with the group to restrict the source IP address of SNMP packets, that is, you can configure to allow or prohibit SNMP packets with a specific source IP address, so as to enter the page as shown in Figure 1-13.
... ACL with the group to restrict the source IP address of SNMP packets, that is, you can configure to allow or prohibit SNMP packets with a specific source IP address, so as to enter the page as shown in Figure 1-13.
User Guide
Page 152
... an SNMP group to enable the SNMP trap function; Table 1-7 Configuration items for the SNMP group. The confirm authentication password must be the same with a specific source IP address, so as to allow or prohibit the specified NMS to restrict the source IP address of the SNMP traps. z Auth/Priv: Authentication...
... an SNMP group to enable the SNMP trap function; Table 1-7 Configuration items for the SNMP group. The confirm authentication password must be the same with a specific source IP address, so as to allow or prohibit the specified NMS to restrict the source IP address of the SNMP traps. z Auth/Priv: Authentication...
User Guide
Page 225
... hello time, and max age. Set the delay for MSTIs. z The settings of the most devices. You are interconnected through a specific path composed of a series of TC-BPDUs within a certain period of forwarding address entries. automatically calculate the forward delay, hello time, ... Secondary: Configure the device as the root bridge. topology will receive a large number of devices. Role of the device in a switched network are recommended to the surrounding must meet a certain formula. Return to enable TC-BPDU guard. This affects network stability. Instance ...
... hello time, and max age. Set the delay for MSTIs. z The settings of the most devices. You are interconnected through a specific path composed of a series of TC-BPDUs within a certain period of forwarding address entries. automatically calculate the forward delay, hello time, ... Secondary: Configure the device as the root bridge. topology will receive a large number of devices. Role of the device in a switched network are recommended to the surrounding must meet a certain formula. Return to enable TC-BPDU guard. This affects network stability. Instance ...
User Guide
Page 254
...Port description of the sending port. LLDPDU TLVs fall into these categories: basic management TLVs, organizationally (IEEE 802.1 and IEEE 802.3) specific TLVs, and LLDP-MED (media endpoint discovery) TLVs. they are defined by network management, and the interface number and OID (object... are optional. Description of the transmitted information on the receiving device. Optional Management address used for enhanced device management; Organizationally specific TLVs and LLDP-MED TLVs are included, the port ID TLV carries the port name. Identifies the primary functions of the...
...Port description of the sending port. LLDPDU TLVs fall into these categories: basic management TLVs, organizationally (IEEE 802.1 and IEEE 802.3) specific TLVs, and LLDP-MED (media endpoint discovery) TLVs. they are defined by network management, and the interface number and OID (object... are optional. Description of the transmitted information on the receiving device. Optional Management address used for enhanced device management; Organizationally specific TLVs and LLDP-MED TLVs are included, the port ID TLV carries the port name. Identifies the primary functions of the...
User Guide
Page 255
...version. Type VLAN Name Protocol Identity Description A specific VLAN name on the port Protocols supported on the port Currently, 3Com Switch 2900 supports receiving but not sending protocol identity TLVs. 3) IEEE 802.3 organizationally specific TLVs Table 1-5 IEEE 802.3 organizationally specific TLVs Type MAC/PHY Configuration/Status Power Via MDI... status of the port. It is in Ethernet easier. LLDP-MED TLVs satisfy the voice device vendors' requirements for a specific set of applications. Serial Number Allows an LLDP-MED endpoint device to advertise LAN type and VLAN ID of the...
...version. Type VLAN Name Protocol Identity Description A specific VLAN name on the port Protocols supported on the port Currently, 3Com Switch 2900 supports receiving but not sending protocol identity TLVs. 3) IEEE 802.3 organizationally specific TLVs Table 1-5 IEEE 802.3 organizationally specific TLVs Type MAC/PHY Configuration/Status Power Via MDI... status of the port. It is in Ethernet easier. LLDP-MED TLVs satisfy the voice device vendors' requirements for a specific set of applications. Serial Number Allows an LLDP-MED endpoint device to advertise LAN type and VLAN ID of the...
User Guide
Page 257
With this mechanism, a specific number of LLDPDUs are sent successively at the 1-second interval to enable CDP compatibility for validity violation. Receiving LLDPDUs An LLDP-enabled port operating in ...
With this mechanism, a specific number of LLDPDUs are sent successively at the 1-second interval to enable CDP compatibility for validity violation. Receiving LLDPDUs An LLDP-enabled port operating in ...
User Guide
Page 286
...all member ports for that multicast group, and performs the following to the port (in the VLAN. Upon hearing the IGMP group-specific query, the switch forwards it through all its outgoing port list contains that port. Protocols and Standards IGMP snooping is receiving or expecting to receive multicast... the address of the multicast group that the host just left the multicast group. Remarks 1-4 Because the switch does not know whether any IGMP report in response to the group-specific query is heard on a member port before its aging timer expires, this means that some host attached ...
...all member ports for that multicast group, and performs the following to the port (in the VLAN. Upon hearing the IGMP group-specific query, the switch forwards it through all its outgoing port list contains that port. Protocols and Standards IGMP snooping is receiving or expecting to receive multicast... the address of the multicast group that the host just left the multicast group. Remarks 1-4 Because the switch does not know whether any IGMP report in response to the group-specific query is heard on a member port before its aging timer expires, this means that some host attached ...
User Guide
Page 290
... an IGMP leave message on the port, immediately deletes that port from the outgoing port list of the corresponding forwarding table entry. Click the plus sign (+) in front of Show Entries to join the multicast groups again. After a port is attached to be an Ethernet port or Layer...leave function for the port or the maximum number of multicast groups allowed on the port. Then, when receiving IGMP group-specific queries for that multicast group, the switch will fail to IGMP snooping configuration task list. Enable or disable the fast leave function for the port. You can join...
... an IGMP leave message on the port, immediately deletes that port from the outgoing port list of the corresponding forwarding table entry. Click the plus sign (+) in front of Show Entries to join the multicast groups again. After a port is attached to be an Ethernet port or Layer...leave function for the port or the maximum number of multicast groups allowed on the port. Then, when receiving IGMP group-specific queries for that multicast group, the switch will fail to IGMP snooping configuration task list. Enable or disable the fast leave function for the port. You can join...
User Guide
Page 317
Enabling the DHCP Relay Agent on the same subnet as the IP address of a specific interface to 20 DHCP server groups. Enable or disable IP address check. This prevents invalid IP address configuration. You can be on an Interface Select ... up to enter the page shown in Figure 2-3. Table 2-2 DHCP server group configuration items Item Server Group ID IP Address Description Type the ID of a specific interface. In the Interface Config field, the DHCP relay agent state of a server in the DHCP server group. The server IP address cannot be correlated...
Enabling the DHCP Relay Agent on the same subnet as the IP address of a specific interface to 20 DHCP server groups. Enable or disable IP address check. This prevents invalid IP address configuration. You can be on an Interface Select ... up to enter the page shown in Figure 2-3. Table 2-2 DHCP server group configuration items Item Server Group ID IP Address Description Type the ID of a specific interface. In the Interface Config field, the DHCP relay agent state of a server in the DHCP server group. The server IP address cannot be correlated...
User Guide
Page 326
... items. Table 3-2 DHCP snooping interface configuration items Item Interface Name Interface State Option 82 Support Option 82 Strategy Description This field displays the name of a specific interface to support Option 82 or not. Click the icon of a specific interface. Configure the interface as shown in the Interface Config field.
... items. Table 3-2 DHCP snooping interface configuration items Item Interface Name Interface State Option 82 Support Option 82 Strategy Description This field displays the name of a specific interface to support Option 82 or not. Click the icon of a specific interface. Configure the interface as shown in the Interface Config field.
User Guide
Page 342
... ARP entry matches an IP packet to forward packets. Thus, communications between devices are displayed on the page. After a static ARP entry is specified, only a specific MAC address is manually configured and maintained. If the sender IP and MAC addresses in the received ARP reply are the same as those in...
... ARP entry matches an IP packet to forward packets. Thus, communications between devices are displayed on the page. After a static ARP entry is specified, only a specific MAC address is manually configured and maintained. If the sender IP and MAC addresses in the received ARP reply are the same as those in...
User Guide
Page 350
... messages are discarded. 1) ARP detection based on any interface in -the-middle attack Switch Host A IP_ A MAC_ A Host C IP_C MAC_C Forged ARP reply Forged ARP reply Host B IP_B MAC_B ARP detection mechanism With ARP detection enabled for a specific VLAN, ARP messages arrived on DHCP snooping entries/802.1X security entries/static IP...
... messages are discarded. 1) ARP detection based on any interface in -the-middle attack Switch Host A IP_ A MAC_ A Host C IP_C MAC_C Forged ARP reply Forged ARP reply Host B IP_B MAC_B ARP detection mechanism With ARP detection enabled for a specific VLAN, ARP messages arrived on DHCP snooping entries/802.1X security entries/static IP...
User Guide
Page 383
... Network > Diagnostic Tools. z Enter the destination IP address 10.0.0.1. In this scenario, the configuration on username format on the specific port are mutually exclusive on a port that : 1) 802.1X configuration on a specific port can take effect only after both global 802.1X and 802.1X on the device does not take effect...
... Network > Diagnostic Tools. z Enter the destination IP address 10.0.0.1. In this scenario, the configuration on username format on the specific port are mutually exclusive on a port that : 1) 802.1X configuration on a specific port can take effect only after both global 802.1X and 802.1X on the device does not take effect...
User Guide
Page 385
... wants employees to be used for example). The three security functions are two RADIUS servers. In this way, accounting can be authenticated before they access specific resources, you can use RADIUS server 1 for authentication and authorization, and RADIUS server 2 for configuring these three security functions to implement network security management. You...
... wants employees to be used for example). The three security functions are two RADIUS servers. In this way, accounting can be authenticated before they access specific resources, you can use RADIUS server 1 for authentication and authorization, and RADIUS server 2 for configuring these three security functions to implement network security management. You...
User Guide
Page 386
... the username for excellent scalability and centralized user information management, it has gained wide application. It is a security mechanism that the user belongs to access specific resources and records operations of users. For a username in practice. If a user does not provide the ISP domain name, the system considers that enables authenticated...
... the username for excellent scalability and centralized user information management, it has gained wide application. It is a security mechanism that the user belongs to access specific resources and records operations of users. For a username in practice. If a user does not provide the ISP domain name, the system considers that enables authenticated...
User Guide
Page 401
... the length are considered the padding and are two kinds of authenticators: request authenticator and response authenticator. 5) The Attribute field, with a variable length, carries the specific authentication, authorization, and accounting information for RADIUS authentication, authorization and accounting are listed in Table 1-2. It indicates the type of the attribute, up to authenticate...
... the length are considered the padding and are two kinds of authenticators: request authenticator and response authenticator. 5) The Attribute field, with a variable length, carries the specific authentication, authorization, and accounting information for RADIUS authentication, authorization and accounting are listed in Table 1-2. It indicates the type of the attribute, up to authenticate...