H3c-technologies H3C WX6000 Series Access Controllers Manual de usuario

Busca en linea o descarga Manual de usuario para Routers H3c-technologies H3C WX6000 Series Access Controllers. H3C Technologies H3C WX6000 Series Access Controllers User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 678
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
H3C WX6103 Access Controller Switch
Interface Board
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W102-20100702
Vista de pagina 0
1 2 3 4 5 6 ... 677 678

Indice de contenidos

Pagina 1 - Configuration Guide

H3C WX6103 Access Controller SwitchInterface BoardConfiguration GuideHangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6

Pagina 2 - Trademarks

v Port Security Configuration Task List····································································································19-3 Enabl

Pagina 3 - Preface

12-1 12 QinQ Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with the swit

Pagina 4 - Conventions

12-2 Figure 12-1 Single-tagged frame structure vs. double-tagged Ethernet frame structure Advantages of QinQ: z Addresses the shortage of public

Pagina 5 - Documentation Feedback

12-3 For a WX6103 access controller switch interface board with both basic QinQ function and selective QinQ function enabled, packets received are p

Pagina 6 - Table of Contents

12-4 Protocol type Value MPLS 0x8847/0x8848 IPX/SPX 0x8137 IS-IS 0x8000 LACP 0x8809 802.1x 0x888E Cluster 0x88A7 Reserved 0xFFFD/0xFFFE/0xFFFF Conf

Pagina 7

12-5 To do... Use the command... Remarks Enter system view system-view — Enter Ethernet port view interface interface-type interface-number Enter

Pagina 8

12-6 z Frames of VLAN 10 of Customer A and frames of VLAN 10 of Customer B can be forwarded to each other through VLAN 1000 of the provider network;

Pagina 9

12-7 [ProviderA-GigabitEthernet0/0/1] qinq vid 1000 [ProviderA-GigabitEthernet0/0/1-vid-1000] raw-vlan-id inbound 10 [ProviderA-GigabitEthernet0/0/1-

Pagina 10

12-8 GigabitEthernet 0/0/3 of Provider A and the device connecting with GigabitEthernet 0/0/1 of Provider B so that their corresponding ports send ta

Pagina 11

13-1 13 BPDU Tunneling Configuration When configuring BPDU tunneling, go to these sections for information you are interested in: z Introduction to

Pagina 12

13-2 each customer network to implement independent spanning tree calculation, without affecting each other. Refer to Configuring BPDU Transparent Tr

Pagina 13

vi Enabling the Output of Port State Transition Information····························································20-27 Enabling the MSTP Featur

Pagina 14

13-3 To do... Use the command... Remarks Enter Ethernet port view interface interface-type interface-number Enter Ethernet port view or port group

Pagina 15

13-4 z BPDU tunneling must be enabled globally before the BPDU tunnel configuration for a port can take effect. z The BPDU tunneling feature is i

Pagina 16

13-5 Network diagram Figure 13-2 Network diagram for BPDU tunneling configuration GE0/0/1 GE0/0/2VLAN 2 VLAN 4VLAN 2VLAN 2GE0/0/3GE0/0/4TrunkTrunkTru

Pagina 17

13-6 [ProviderC] interface GigabitEthernet 0/0/4 [ProviderC-GigabitEthernet0/0/4] port access vlan 2 [ProviderC-GigabitEthernet0/0/4] stp disable [P

Pagina 18

14-1 14 Port Correlation Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured w

Pagina 19

14-2 Similarly, if you configure the transmission rate for an Ethernet port by using the speed command with the auto keyword specified, the transmiss

Pagina 20

14-3 Currently, only Dual-Combo ports are supported on WX6103 access controller switch boards. Configuring Combo port state Follow these steps to

Pagina 21

14-4 Follow these steps to enable Ethernet port loopback test: To do... Use the command... Remarks Enter system view system-view — Enter Ethernet p

Pagina 22

14-5 To do... Use the command... Remarks Enter system view system-view — Create a manual port group and enter manual port group view port-group man

Pagina 23

14-6 To do... Use the command... Remarks Configure unknown unicast storm suppression ratio unicast-suppression { ratio | pps max-pps } Optional By

Pagina 24

vii Displaying and Maintaining a Routing Table·························································································21-5 22 GR Ove

Pagina 25

14-7 z If loops are detected on a port that is of trunk or hybrid type, trap messages are sent to the terminal. If the loopback detection control fu

Pagina 26

14-8 Follow these steps to configure the cable type for an Ethernet Port: To do... Use the command... Remarks Enter system view system-view — Enter

Pagina 27

14-9 Although the storm suppression function and the storm constrain function can all be used to control specific type of traffic, they conflict wit

Pagina 28

14-10 z For network stability consideration, configure the interval for generating traffic statistics to a value that is not shorter than the defau

Pagina 29 - OAP Board Overview

15-1 15 Port Isolation Configuration When configuring port isolation, go to these sections for information you are interested in: z Introduction to

Pagina 30

15-2 Displaying Isolation Groups To do… Use the command… Remarks Display an isolation group and its information display port-isolate group Availab

Pagina 31 - 2 Logging In Through Telnet

15-3 <AC> display port-isolate group Port-isolate group information: Uplink port support: No Group ID: 1 GigabitEthernet0/0/1 Gigabit

Pagina 32 - Common Configuration

16-1 16 Link Aggregation Overview The term switch in this document refers to a switch in a generic sense or an access controller configured with t

Pagina 33

16-2 Table 16-1 Consistency considerations for ports in an aggregation Category Considerations STP State of port-level STP (enabled or disabled) Att

Pagina 34 - Table 2-4

16-3 Port states in a manual aggregation In a manual aggregation group, ports are either selected or unselected. Selected ports can receive and trans

Pagina 35

viii RIP Configuration Examples···············································································································24-14 C

Pagina 36

16-4 When setting the state of the ports in the local and remote static aggregation groups, the local and remote systems do the following: 1) Compar

Pagina 37

16-5 Link aggregation groups perform load sharing depending on availability of hardware resources. When hardware resources are available, link aggreg

Pagina 38

17-1 17 Link Aggregation Configuration When configuring link aggregation, go to these sections for information you are interested in: z Configuring

Pagina 39

17-2 To do… Use the command… Remarks Enter system view system-view –– Configure the system LACP priority lacp system-priority system-priority Optio

Pagina 40

17-3 Configuring an Aggregation Group Name Follow these steps to configure a name for an aggregation group: To do… Use the command… Remarks Enter

Pagina 41

17-4 form one link connected to AC B and performs load sharing among these ports. Network diagram Figure 17-1 Network diagram for link aggregation

Pagina 42

18-1 18 MAC Address Table Management Configuration When configuring MAC address table management, go to these sections for information you are inter

Pagina 43 - <H3C> system-view

18-2 Dynamically learned MAC addresses cannot overwrite static MAC address entries, but the latter can overwrite the former. As shown in Figure 18-

Pagina 44

18-3 Follow these steps to configure the MAC address aging timer: To do… Use the command… Remarks Enter system view system-view — Configure the agi

Pagina 45

18-4 MAC Address Table Management Configuration Example Network requirements Log onto your device from the Console port to configure MAC address tabl

Pagina 46 - Management System

ix Making External Route Selection Rules Defined in RFC1583 Compatible·································25-32 Logging Neighbor State Changes ·········

Pagina 47

19-1 19 Port Security Configuration When configuring port security, go to these sections for information you are interested in: z Introduction to P

Pagina 48 - 4 Logging In from an NMS

19-2 Intrusion protection The intrusion protection feature checks the source MAC addresses in inbound frames and takes a pre-defined action according

Pagina 49 - Packets

19-3 Security mode Description Features userLoginSecure In this mode, a port performs 802.1x authentication of users in portbased mode and services

Pagina 50

19-4 Task Remarks Enabling Port Security Required Setting the Maximum Number of Secure MAC Addresses Optional Setting the Port Security Mode Requ

Pagina 51 - 6 Controlling Login Users

19-5 3) Port security cannot be disabled if there is any user present on a port. For configuration information about 802.1x authentication and MAC

Pagina 52

19-6 z With port security disabled, you can configure the port security mode but your configuration does not take effect. z With port security en

Pagina 53

19-7 To do… Use the command… Remarks Enter Ethernet port view interface interface-type interface-number — Enable the userLoginWithOUI mode port-sec

Pagina 54

19-8 To do… Use the command… Remarks Configure the NTK feature port-security ntk-mode { ntk-withbroadcasts | ntk-withmulticasts | ntkonly } Require

Pagina 55

19-9 Secure MAC addresses can be learned by a port working in autoLearn mode. You can also manually configure them through the command line interface

Pagina 56 - 7 VLAN Configuration

19-10 Displaying and Maintaining Port Security To do… Use the command… Remarks Display port security configuration information, operation informati

Pagina 57 - VLAN Fundamental

x 28 Multicast Overview ·····························································································································

Pagina 58 - VLAN Classification

19-11 [AC-GigabitEthernet0/0/1] port-security intrusion-mode disableport-temporarily [AC-GigabitEthernet0/0/1] quit [AC] port-security timer disablep

Pagina 59

19-12 In addition, you will see that the port security feature has disabled the port if you issue the following command: <AC-GigabitEthernet0/0/1&

Pagina 60 - Port link type

19-13 1) Configure the RADIUS protocol # Create a RADIUS scheme named radsun. <AC> system-view [AC] radius scheme radsun # Set the IP addresse

Pagina 61 - Default VLAN

19-14 After completing the above configurations, you can use the following command to view the configuration information of the RADIUS scheme named r

Pagina 62

19-15 Stored MAC address number is 0 Authorization is permitted After an 802.1x user gets online, you can see that the number of secure MAC add

Pagina 63

19-16 Port Security Configuration for macAddressElseUserLoginSecure Mode Network requirements The client is connected to the switch through GigabitEt

Pagina 64

19-17 Disableport Timeout: 20s OUI value: GigabitEthernet0/0/1 is link-up Port mode is macAddressElseUserLoginSecure NeedToKnow mode is Nee

Pagina 65

19-18 Total current used 802.1X resource number is 1 GigabitEthernet0/0/1 is link-up 802.1X protocol is enabled Handshake is enabled The

Pagina 66 - VLAN Configuration Example

19-19 Error:Can not operate security MAC address for current port mode is not autoLearn! Analysis No secure MAC address can be configured on a port

Pagina 67 - Verification

20-1 20 MSTP Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with the swit

Pagina 68

xi Troubleshooting IGMP Snooping Configuration ·················································································29-24 Switch Fails in

Pagina 69 - 8 Voice VLAN Configuration

20-2 z Topology change notification (TCN) BPDUs, used for notifying concerned devices of network topology changes, if any. Basic concepts in STP 1)

Pagina 70 - Voice VLAN Modes on a Port

20-3 Figure 20-1 A schematic diagram of designated bridges and designated ports LANDevice ADevice B Device CAP 2BP 1BP 2CP 1CP 2AP 1 Path cost Path

Pagina 71 - Configuring Voice VLAN

20-4 For the convenience of description, the description and examples below involve only four parts of a configuration BPDU: z Root bridge ID (in

Pagina 72

20-5 compare one another’s root bridge ID. The device with the smallest root bridge ID is elected as the root bridge. z Selection of the root port

Pagina 73

20-6 Figure 20-2 Network diagram for the STP algorithm z Initial state of each device The following table shows the initial state of each device.

Pagina 74

20-7 Device Comparison process BPDU of port after comparison z Port BP1 receives the configuration BPDU of Device A {0, 0, 0, AP1}. Device B find

Pagina 75

20-8 Figure 20-3 The final calculated spanning tree To facilitate description, the spanning tree calculation process in this example is simplifi

Pagina 76

20-9 z Forward delay is the delay time for device state transition. A path failure will cause re-calculation of the spanning tree, and the spanning

Pagina 77

20-10 description about VLANs, refer to VLAN in H3C WX6103 Access Controller Switch Interface Board Configuration Guide. MSTP features the following

Pagina 78 - 9 GVRP Configuration

20-11 z They have the same VLAN-to-instance mapping configuration, z They have the same MSTP revision level configuration, and z They are physic

Pagina 79 - GARP message format

xii Enabling the ARP Entry Check ·····································································································33-5 ARP Config

Pagina 80

20-12 8) Common root bridge The common root bridge is the root bridge of the CIST. In Figure 20-4, for example, the common root bridge is a device

Pagina 81 - GVRP Configuration Task List

20-13 Figure 20-5 Port roles Connecting to the common root bridgeEdge portsPort 1Port 2Master port Alternate portDesignated portPort 3 Port 4Port 5AB

Pagina 82 - Configuring GVRP

20-14 Table 20-6 Ports states supported by different port roles Role State Root port/Master port Designated port Alternate port Backup port Forwar

Pagina 83 - GVRP Configuration Examples

20-15 z IEEE 802.1w: Rapid Spanning Tree Protocol z IEEE 802.1s: Multiple Spanning Tree Protocol Configuration Task List Before configuring MSTP, y

Pagina 84

20-16 Task Remarks Configuring No Agreement Check Optional Configuring Protection Functions Optional In a network containing switches with both

Pagina 85

20-17 z MSTP-enabled switches are in the same region only when they have the same format selector (a 802.1s-defined protocol selector, which is 0

Pagina 86

20-18 Specifying the current device as a secondary root bridge of a specific spanning tree Follow these steps to specify the current device as a sec

Pagina 87

20-19 Configuring the Work Mode of MSTP Device MSTP and RSTP can recognize each other’s protocol packets, so they are mutually compatible. However,

Pagina 88 - IP Addressing Configuration

20-20 z Upon specifying the current device as the root bridge or a secondary root bridge, you cannot change the priority of the device. z During

Pagina 89 - Subnetting and Masking

20-21 Configuring the Network Diameter of a Switched Network Any two stations in a switched network are interconnected through specific paths, which

Pagina 90 - Configuring IP Addresses

xiii Displaying and Maintaining the DHCP Client ·······················································································37-2 DHCP Clie

Pagina 91

20-22 These three timers set on the root bridge of the CIST apply on all the devices on the entire switched network. z The length of the forward

Pagina 92

20-23 Configuring the Timeout Factor After the network topology is stabilized, each non-root-bridge device forwards configuration BPDUs to the surrou

Pagina 93 - 172.16.2.0/24

20-24 To do... Use the command... Remarks Configure the maximum transmission rate of the port(s) stp transmit-limit packet-number Optional 10 by de

Pagina 94 - IP Performance Configuration

20-25 z With BPDU guard disabled, when a port set as an edge port receives a BPDU from another port, it will become a non-edge port again. In this

Pagina 95

20-26 z In the case of link aggregation, every port in the aggregation group can be configured to connect to a point-to-point link. If a port work

Pagina 96 - Configuring TCP Attributes

20-27 z In MSTP mode, if a port is configured to recognize/send MSTP packets in a mode other than auto, and if it receives a packet in the format

Pagina 97

20-28 To do... Use the command... Remarks Enable the MSTP feature on the port(s) stp enable Optional MSTP is disabled on ports by default and autom

Pagina 98

20-29 Configuring Path Costs of Ports Path cost is a parameter related to the rate of port-connected links. On an MSTP-compliant device, ports can ha

Pagina 99

20-30 In the calculation of the path cost value of an aggregated link, 802.1d-1998 does not take into account the number of ports in the aggregated

Pagina 100 - 12 QinQ Configuration

20-31 To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface view interface interface-type interface-number E

Pagina 101 - Implementations of QinQ

xiv Configuration Procedure················································································································41-2 Confi

Pagina 102

20-32 Performing mCheck Ports on an MSTP-compliant device have three working modes: STP compatible mode, RSTP mode, and MSTP mode. In a switched net

Pagina 103 - Configuring Selective QinQ

20-33 2) Method 2: Perform mCheck in Ethernet interface view. <Sysname> system-view [Sysname] interface GigabitEthernet 0/0/1 [Sysname-Gigabit

Pagina 104 - QinQ Configuration Example

20-34 z You can only enable the Digest Snooping feature on the device connected to another vendor’s device that uses a private key to calculate the

Pagina 105 - Configuration procedure

20-35 [AC A-GigabitEthernet0/0/1] quit [AC A] stp config-digest-snooping 2) Enable Digest Snooping on AC B (the same as above, omitted) Configuring

Pagina 106

20-36 and does not support RSTP mode, the root port on the downstream device receives no agreement packet from the upstream device and thus sends no

Pagina 107

20-37 Network diagram Figure 20-9 No Agreement Check configuration Root portDesignated portGE0/0/1GE0/0/1ACThird-party device Configuration procedur

Pagina 108 - BPDU Tunneling Configuration

20-38 ports as non-edge ports and start a new spanning tree calculation process. This will cause a change of network topology. Under normal condition

Pagina 109 - Configuring BPDU Isolation

20-39 To do... Use the command... Remarks Enter system view system-view — Enter Ethernet interface view interface interface-type interface-number E

Pagina 110

20-40 Enabling TC-BPDU Attack Guard When receiving a TC-BPDU (a PDU used as notification of topology change), the device will delete the correspondi

Pagina 111 - Network requirements

20-41 To do... Use the command... Remarks View root bridge information of all MSTP instances display stp root Available in any view Clear the stat

Pagina 112

Copyright © 2008-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors All Rights Reserved No part of this manual may be reproduced or transmi

Pagina 113

xv 44 Traffic Classification, Traffic Policing, and Line Rate Configuration···············································44-1 Traffic Classification

Pagina 114 - Ethernet Port Configuration

20-42 # Configure the region name, VLAN-to-instance mappings and revision level of the MST region. [AC A-mst-region] region-name example [AC A-mst-r

Pagina 115 - Combo Port Configuration

20-43 3 30 4 40 3) Configuration on AC C # Enter MST region view. <AC C> system-view [AC C] stp region-configuration

Pagina 116 - Configuring Combo port state

20-44 Revision level :0 Instance Vlans Mapped 0 1 to 9, 11 to 29, 31 to 39, 41 to 4094 1 10 3 30

Pagina 117 - Configuring a Port Group

21-1 21 IP Routing Overview Go to these sections for information you are interested in: z IP Routing and Routing Table z Routing Protocol Overvie

Pagina 118

21-2 made of a certain number of consecutive 1s. It can be expressed in dotted decimal format or by the number of the 1s. z Outbound interface: Spec

Pagina 119

21-3 Routing Protocol Overview Static Routing and Dynamic Routing Static routing is easy to configure and requires less system resources. It works we

Pagina 120

21-4 Routing Protocols and Routing Priority Different routing protocols may find different routes to the same destination. However, not all of those

Pagina 121

21-5 Route Recursion The nexthops of some static routes configured with nexthops may not be directly connected. To forward the packets, the outgoing

Pagina 122

21-6 To do… Use the command… Remarks Display the information of recursive routes display ip relay-route Display IPv6 recursive route information di

Pagina 123

22-1 22 GR Overview Go to these sections for information you are interested in: z Introduction to Graceful Restart z Basic Concepts in Graceful Re

Pagina 124 - Port Isolation Configuration

xvi Configuration Procedure················································································································47-4 Confi

Pagina 125 - Displaying Isolation Groups

22-2 Graceful Restart Communication Procedure Configure a device as GR Restarter in a network. This device and its GR Helper must support GR or be GR

Pagina 126 - Group ID: 1

22-3 2) GR Restarter restarting Figure 22-2 Restarting process for the GR Restarter As illustrated in Figure 22-2. The GR Helper detects that the

Pagina 127 - Link Aggregation Overview

22-4 Figure 22-4 The GR Restarter obtains topology and routing information from the GR Helper As illustrated in Figure 22-4, the GR Restarter obtai

Pagina 128 - Manual Link Aggregation

23-1 23 Static Routing Configuration When configuring a static route, go to these sections for information you are interested in: z Introduction z

Pagina 129 - Static LACP link aggregation

23-2 1) Destination address and mask In the ip route-static command, an IPv4 address is in dotted decimal format and a mask can be either in dotted

Pagina 130

23-3 z When configuring a static route, the static route does not take effect if you specify the next hop address first and then configure it as th

Pagina 131 - Aggregation Port Group

23-4 z To configure this feature for an existing static route, simply associate the static route with a track entry. For a non-existent static rout

Pagina 132 - Configuring Link Aggregation

23-5 Configuration procedure 1) Configuring IP addresses for interfaces (omitted) 2) Configuring static routes # Configure a default route on Switc

Pagina 133

23-6 # From Host A, use the ping command to verify the network layer reachability to Host B and Host C.

Pagina 134

24-1 24 RIP Configuration z The term “router” in this document refers to a router in a generic sense or a Layer 3 switch. z The switch interfac

Pagina 135

xvii SNMP Protocol Version·················································································································52-2 MIB O

Pagina 136

24-2 z Next hop: IP address of the adjacent router’s interface to reach the destination. z Egress interface: Packet outgoing interface. z Metric:

Pagina 137

24-3 4) RIP ages out routes by adopting an aging mechanism to keep only valid routes. RIP Version RIP has two versions, RIPv1 and RIPv2. RIPv1, a cl

Pagina 138 - Group Can Learn

24-4 RIPv2 message format The format of RIPv2 message is similar with RIPv1. Figure 24-2 shows it. Figure 24-2 RIPv2 Message Format The differences

Pagina 139

24-5 z RFC 1723 only defines plain text authentication. For information about MD5 authentication, refer to RFC2082 “RIPv2 MD5 Authentication”. z

Pagina 140 - Port Security Configuration

24-6 z If you make some RIP configurations in interface view before enabling RIP, those configurations will take effect after RIP is enabled. z R

Pagina 141 - Port Security Modes

24-7 To do… Use the command… Remarks Specify a global RIP version version { 1 | 2 } Optional By default, if an interface has a RIP version specifie

Pagina 142

24-8 To do… Use the command… Remarks Define an inbound additional routing metric rip metricin value Optional 0 by default Define an outbound additi

Pagina 143 - Enabling Port Security

24-9 Disabling Host Route Reception Sometimes a router may receive many host routes from the same network, which are not helpful for routing and occu

Pagina 144

24-10 To do… Use the command… Remarks Configure the filtering of incoming routes filter-policy { acl-number | gateway ip-prefix-name | ip-prefix ip

Pagina 145 - Enabling the autoLearn Mode

24-11 Configuring RIP Network Optimization Complete the following tasks before configuring RIP network optimization: z Configure network addresses f

Pagina 146 - Configuring NTK

xviii NTP Configuration Examples··············································································································54-15 C

Pagina 147 - Configuring Trapping

24-12 Disabling the split horizon function on a point-to-point link does not take effect. Enabling poison reverse The poison reverse function allow

Pagina 148 - Configuration Procedure

24-13 To do… Use the command… Remarks Enter system view system-view –– Enter RIP view rip [ process-id ] –– Enable source IP address check on inco

Pagina 149

24-14 You need not use the peer ip-address command when the neighbor is directly connected; otherwise the neighbor may receive both the unicast and

Pagina 150

24-15 [AC-rip-1] network 172.17.0.0 [AC-rip-1] quit # Configure Switch. <Switch> system-view [Switch] rip [Switch-rip-1] network 192.168.1.0 [

Pagina 151

24-16 Troubleshooting RIP No RIP Updates Received Symptom: No RIP updates are received when the links work well. Analysis: After enabling RIP, you m

Pagina 152

25-1 25 OSPF Configuration z The term “router” in this document refers to a router in a generic sense or a Layer 3 switch. z The WX6103 access

Pagina 153

25-2 z Fast convergence: Transmits updates instantly after network topology changes for routing information synchronization in the AS. z Loop-free:

Pagina 154

25-3 z LSR (link state request) packet: Requests needed LSAs from the neighbor. After exchanging the DD packets, the two routers know which LSAs of

Pagina 155

25-4 OSPF Area Partition and Route Summarization Area partition When a large number of OSPF routers are present on a network, LSDBs may become so lar

Pagina 156

25-5 4) Autonomous System Border Router (ASBR) The router exchanging routing information with another AS is an ASBR, which may not reside on the boun

Pagina 157 - Solution

xix Configuring the FTP Server ··················································································································57-6

Pagina 158

25-6 Another application of virtual links is to provide redundant links. If the backbone area cannot maintain internal connectivity due to a physical

Pagina 159 - 20 MSTP Configuration

25-7 On the left of the figure, RIP routes are translated into Type-5 LSAs by the ASBR of Area 2 and distributed into the OSPF AS. However, Area 1 is

Pagina 160 - Basic concepts in STP

25-8 z Type-1 external route z Type-2 external route The intra-area and inter-area routes describe the network topology of the AS, while external r

Pagina 161 - How STP works

25-9 z NBMA is the default network type, while P2MP is a conversion from other network types, such as NBMA in general. z On NBMA networks, packets

Pagina 162

25-10 z The DR election is available on broadcast, NBMA interfaces rather than P2P, or P2MP interfaces. z A DR is an interface of a router and belo

Pagina 163

25-11 MD5 authentication data is added following an OSPF packet rather than contained in the Authentication field. Hello packet A router sends hel

Pagina 164

25-12 LSA). The LSA header occupies small part of an LSA to reduce traffic between routers. The recipient checks whether the LSA is available using t

Pagina 165 - Figure 20-3

25-13 Figure 25-12 LSR packet format Major fields: z LS type: Type number of the LSA to be requested. Type 1 for example indicates the Router LSA.

Pagina 166

25-14 Figure 25-14 LSAck packet format ... LSA header format All LSAs have the same header, as shown in the following figure. Figure 25-15 LSA heade

Pagina 167 - Introduction to MSTP

25-15 Formats of LSAs 1) Router LSA Figure 25-16 Router LSA format Major fields: z Link State ID: ID of the router that originated the LSA. z V (

Pagina 168 - Basic concepts in MSTP

xx CLI Display ··································································································································60-1

Pagina 169

25-16 Figure 25-17 Network LSA format Major fields: z Link State ID: The interface address of the DR z Network Mask: The mask of the network (a b

Pagina 170

25-17 A Type-3 LSA can be used to advertise a default route, having the Link State ID and Network Mask set to 0.0.0.0. 4) AS external LSA An AS e

Pagina 171

25-18 An NSSA external LSA originates from the ASBR in a NSSA and is flooded in the NSSA area only. It has the same format as the AS external LSA. Fi

Pagina 172 - Protocols and Standards

25-19 After the restart, the GR Restarter will send an OSPF GR signal to its neighbors that will not reset their adjacencies with it. In this way, th

Pagina 173 - Configuration Task List

25-20 Task Remarks Logging Neighbor State Changes Optional Configuring OSPF Network Management Optional Enabling the Advertisement and Reception

Pagina 174 - Configuring the Root Bridge

25-21 To do… Use the command… Remarks Specify a network to enable OSPF on the interface attached to the network network ip-address wildcard-mask Re

Pagina 175 - Configuration example

25-22 z IP addresses for interfaces, making neighboring nodes accessible with each other at the network layer. z OSPF basic functions. Configuratio

Pagina 176

25-23 z OSPF basic functions z Corresponding filters if routing information filtering is needed. Configuring OSPF Route Summarization OSPF route su

Pagina 177

25-24 Configuring ABR Type-3 LSA Filtering Follow these steps to configure Type-3 LSA filtering on an ABR: To do… Use the command… Remarks Enter sy

Pagina 178

25-25 To do… Use the command… Remarks Enter system view system-view — Enter OSPF view ospf [ process-id | router-id router-id ] * — Configure the m

Pagina 179 - Configuring Timers of MSTP

xxi ICMP-echo Test Configuration Example·····················································································63-18 DHCP Test Configur

Pagina 180

25-26 To do… Use the command… Remarks Configure OSPF to redistribute routes from another protocol import-route protocol [ process-id ] [ cost cost

Pagina 181

25-27 Prerequisites Before configuring OSPF network optimization, you have configured: z IP addresses for interfaces; z OSPF basic functions. Confi

Pagina 182

25-28 Specifying an LSA Transmission Delay Since OSPF packets need time for traveling on links, extending LSA age time with a delay is necessary, esp

Pagina 183

25-29 To do… Use the command… Remarks Configure the LSA minimum repeat arrival interval lsa-arrival-interval interval Optional Defaults to 1000 mil

Pagina 184

25-30 z Different OSPF processes can disable the same interface from sending OSPF packets. Use of the silent-interface command disables only the i

Pagina 185 - Enabling the MSTP Feature

25-31 To do… Use the command… Remarks Configure the authentication mode authentication-mode { simple | md5 } Required Not configured by default Exi

Pagina 186 - Configuring Leaf Nodes

25-32 Making External Route Selection Rules Defined in RFC1583 Compatible The selection of an external route from multiple LSAs defined in RFC2328 is

Pagina 187

25-33 Enabling the Advertisement and Reception of Opaque LSAs With this feature enabled, the OSPF router can receive and advertise Type 9, Type 10 a

Pagina 188 - Configuring Port Priority

25-34 To do… Use the command… Remarks Enable the use of link-local signaling enable link-local-signaling Required Disabled by default Enable out-of

Pagina 189

25-35 To do… Use the command… Remarks Trigger OSPF Graceful Restart reset ospf [ process-id ] process graceful-restart Required Available in user v

Pagina 190 - Performing mCheck

xxii Displaying Help Information ··········································································································65-4 Termi

Pagina 191 - Configuring Digest Snooping

25-36 OSPF Configuration Examples These examples only cover commands for OSPF configuration. Configuring OSPF Basic Functions Network requirements

Pagina 192 - Configuration Example

25-37 [SwitchA] ospf [SwitchA-ospf-1] area 0 [SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.0] quit [SwitchA-osp

Pagina 193

25-38 # Display OSPF routing information on AC. [AC] display ospf routing OSPF Process 1 with Router ID 10.2.1.1 Routin

Pagina 194 - Prerequisites

25-39 10.4.1.0/24 25 Inter 10.3.1.1 10.3.1.1 0.0.0.2 10.5.1.0/24 10 Stub 10.5.1.1 10.5.1.1

Pagina 195

25-40 [SwitchC] ip route-static 3.1.2.1 24 10.5.1.2 [SwitchC] ospf [SwitchC-ospf-1] import-route static [SwitchC-ospf-1] quit # Display ABR/ASBR info

Pagina 196 - Enabling Root Guard

25-41 # Configure Switch B. [SwitchB] ospf [SwitchB-ospf-1] area 1 [SwitchB-ospf-1-area-0.0.0.1] stub [SwitchB-ospf-1-area-0.0.0.1] quit [SwitchB-osp

Pagina 197 - Enabling Loop Guard

25-42 Intra Area: 2 Inter Area: 1 ASE: 0 NSSA: 0 After this configuration, routing entries on the stub router are further reduced, containing

Pagina 198

25-43 [SwitchB-ospf-1-area-0.0.0.1] quit [SwitchB-ospf-1] quit It is recommended to configure the nssa command with the keyword default-route-adve

Pagina 199 - MSTP Configuration Example

25-44 Intra Area: 2 Inter Area: 3 ASE: 1 NSSA: 0 You can see on Switch C an external route imported from the NSSA area. Configuring OSPF DR E

Pagina 200

25-45 # Configure Switch B. <SwitchB> system-view [SwitchB] router id 3.3.3.3 [SwitchB] ospf [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0

Pagina 201

xxiii Configuring a PKI Entity to Request a Certificate from a CA ······················································68-12 Configuring a Certifica

Pagina 202

25-46 [AC-Vlan-interface1] quit # Configure Switch A. [SwitchA] interface vlan-interface 1 [SwitchA-Vlan-interface1] ospf dr-priority 0 [SwitchA-Vlan

Pagina 203 - 21 IP Routing Overview

25-47 Neighbors Area 0.0.0.0 interface 192.168.1.4(Vlan-interface1)'s neighbors Router ID: 1.1.1.1 Address: 192.168

Pagina 204

25-48 Area: 0.0.0.0 IP Address Type State Cost Pri DR BDR 192.168.1.2 Broadcast DROther 1 0 192.168.1.1

Pagina 205 - Routing Protocol Overview

25-49 [Switch-ospf-1] area 2 [Switch–ospf-1-area-0.0.0.2] network 172.16.0.0 0.0.255.255 [Switch–ospf-1-area-0.0.0.2] quit # Display OSPF routing inf

Pagina 206 - Route backup

25-50 OSPF Graceful Restart Configuration Example Network requirements z AC, Switch A and Switch B that belong to the same autonomous system and the

Pagina 207 - Route Recursion

25-51 [SwitchA-ospf-100] area 0 [SwitchA-ospf-100-area-0.0.0.0] network 192.1.1.0 0.0.0.255 [SwitchA-ospf-100-area-0.0.0.0] quit 3) Configure Switch

Pagina 208

25-52 Analysis The backbone area must maintain connectivity to all other areas. If a router connects to more than one area, at least one area must be

Pagina 209 - 22 GR Overview

26-1 26 IP Source Guard Configuration The term switch in this document refers to a switching device in a generic sense or an access controller con

Pagina 210

26-2 Configuring a Static Binding Entry Follow these steps to configure a static binding entry: To do… Use the command… Remarks Enter system view s

Pagina 211

26-3 IP Source Guard Configuration Examples Static Binding Entry Configuration Example Network requirements As shown in Figure 26-1, an access contro

Pagina 212

1-1 1 Logging In Through an OAP Board When logging in through an OAP board, go to these sections for information you are interested in: z OAP Board

Pagina 213 - Static Routing Configuration

26-4 [AC-GigabitEthernet0/0/1] user-bind ip-address 192.168.0.1 mac-address 0001-0203-0406 2) Configure Switch # Configure the IP addresses of variou

Pagina 214 - Configuring a Static Route

26-5 For detailed configuration of DHCP Server, refer to DHCP in H3C WX6103 Access Controller Switch Interface Board Configuration Guide. Network

Pagina 215

26-6 Troubleshooting Failed to Configure Static Binding Entries and Dynamic Binding Function Symptom Configuring static binding entries and dynamic b

Pagina 216

27-1 27 DLDP Configuration When performing DLDP configuration, go to these sections for information you are interested in: z Overview z DLDP Confi

Pagina 217

27-2 Figure 27-1 Unidirectional fiber link: cross-connected fiber Device AGE1/0/50 GE1/0/51Device BPCGE1/0/50GE1/0/51 Figure 27-2 Unidirectional fib

Pagina 218

27-3 DLDP Fundamentals DLDP link states A device is in one of these DLDP link states: Initial, Inactive, Active, Advertisement, Probe, Disable, and D

Pagina 219 - 24 RIP Configuration

27-4 DLDP timer Description Entry timer When a new neighbor joins, a neighbor entry is created and the corresponding entry timer is triggered. And w

Pagina 220 - Operation of RIP

27-5 device, the situation shown in Figure 27-3 may occur, where Port B is actually down but the state of Port B cannot be detected by common data li

Pagina 221 - RIP Message Format

27-6 DLDP implementation 1) On a DLDP-enabled link that is in up state, DLDP sends DLDP packets to the peer device and processes the DLDP packets re

Pagina 222 - RIPv2 authentication

27-7 Packet type Processing procedure If the corresponding neighbor entry does not exist, creates the neighbor entry, triggers the Entry timer, and

Pagina 223 - Supported RIP Features

Preface The H3C WX6103 Access Controller Switch Interface Board Configuration Guide describes the software features for the H3C WX6103 access control

Pagina 224 - Configuring a RIP version

1-2 the system and application software on the OAP board. After the switch, you can press Ctrl+K to return to the command line interface on the devic

Pagina 225

27-8 DLDP neighbor state Description Unidirectional A neighbor is in this state when the link connecting it is detected to be a unidirectional link.

Pagina 226 - Advertising a summary route

27-9 To do… Use the command… Remarks Enter Ethernet port view interface interface-type interface-number Enter Ethernet port view or port group view

Pagina 227 - Advertising a Default Route

27-10 z Set the interval for sending Advertisement packets to a value not longer than one-third of the STP convergence time. If the interval is too

Pagina 228

27-11 z On a port with both remote OAM loopback and DLDP enabled, if the port shutdown mode is auto mode, the port will be shut down by DLDP when i

Pagina 229 - Configuring RIP Timers

27-12 To do… Use the command… Remarks Enter system view system-view — Reset DLDP state dldp reset Required Resetting DLDP State in Port view/Port

Pagina 230 - Enabling poison reverse

27-13 Network diagram Figure 27-4 Network diagram for DLDP configuration Configuration procedure 1) Configuration on AC # Enable DLDP on GigabitEt

Pagina 231 - Specifying a RIP Neighbor

27-14 DLDP port state : disable DLDP link state : down The neighbor number of the port is 0. Interface GigabitEthernet0/0/26 DLDP port state : d

Pagina 232 - RIP Configuration Examples

28-1 28 Multicast Overview z This manual chiefly focuses on the IP multicast technology and device operations. Unless otherwise stated, the term

Pagina 233

28-2 Figure 28-1 Unicast transmission Assume that Hosts B, D and E need this information. The information source establishes a separate transmissio

Pagina 234 - Troubleshooting RIP

28-3 Figure 28-2 Broadcast transmission Assume that only Hosts B, D, and E need the information. If the information source broadcasts the informati

Pagina 235 - 25 OSPF Configuration

2-1 2 Logging In Through Telnet When logging in through Telnet, go to these sections for information you are interested in: z Introduction z Telne

Pagina 236 - Basic Concepts

28-4 Figure 28-3 Multicast transmission Assume that Hosts B, D and E need the information. To receive the information correctly, these hosts need t

Pagina 237 - Neighbor and Adjacency

28-5 Table 28-1 An analogy between TV transmission and multicast transmission Step TV transmission Multicast transmission 1 A TV station transmit

Pagina 238 - Classification of Routers

28-6 information addressed to that multicast group. In this model, receivers are not aware of the position of multicast sources in advance. However,

Pagina 239

28-7 Table 28-2 Class D IP address blocks and description Address block Description 224.0.0.0 to 224.0.0.255 Reserved permanent group addresses. Th

Pagina 240 - NSSA area

28-8 Address Description 224.0.0.18 Virtual Router Redundancy Protocol (VRRP) IPv6 Multicast Addresses As defined in RFC 4291, the format of an IPv

Pagina 241 - Route types

28-9 As defined by IANA, the high-order 24 bits of an IPv4 multicast MAC address are 0x01005e, bit 25 is 0x0, and the low-order 23 bits are the low-o

Pagina 242 - OSPF network types

28-10 Multicast Protocols z Generally, we refer to IP multicast working at the network layer as Layer 3 multicast and the corresponding multicast

Pagina 243 - DR and BDR

28-11 In the ASM model, multicast routes come in intra-domain routes and inter-domain routes. z An intra-domain multicast routing protocol is used t

Pagina 244 - OSPF packet header

28-12 Multicast Packet Forwarding Mechanism In a multicast model, a multicast source sends information to the host group identified by the multicast

Pagina 245 - DD packet

29-1 29 IGMP Snooping Configuration When configuring IGMP Snooping, go to the following sections for information you are interested in: z IGMP Snoo

Pagina 246 - LSR packet

2-2 z After you log in to the access controller switch interface board through Telnet, you can issue commands to the board by way of pasting sessio

Pagina 247 - LSAck packet

29-2 Basic Concepts in IGMP Snooping IGMP Snooping related ports As shown in Figure 29-2, Router A connects to the multicast source, IGMP Snooping r

Pagina 248 - LSA header format

29-3 Aging timers for dynamic ports in IGMP Snooping and related messages and actions Table 29-1 Aging timers for dynamic ports in IGMP Snooping and

Pagina 249 - Formats of LSAs

29-4 z If a forwarding table entry exists for the reported group and the port is included in the outgoing port list, which means that this port is a

Pagina 250

29-5 Protocols and Standards IGMP Snooping is documented in: RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and Multicast Li

Pagina 251

29-6 Configuring Basic Functions of IGMP Snooping Configuration Prerequisites Before configuring the basic functions of IGMP Snooping, complete the f

Pagina 252 - Supported OSPF Features

29-7 If you switch IGMP Snooping from version 3 to version 2, the system will clear all IGMP Snooping forwarding entries from dynamic joins, and wil

Pagina 253 - OSPF Configuration Task List

29-8 Configuring aging timers for dynamic ports in a VLAN Follow these steps to configure aging timers for dynamic ports in a VLAN: To do... Use t

Pagina 254

29-9 Configuring Simulated Joining Generally, a host running IGMP responds to IGMP queries from the IGMP querier. If a host fails to respond due to

Pagina 255

29-10 Configuring fast leave processing globally Follow these steps to configure fast leave processing globally: To do... Use the command... Rema

Pagina 256

29-11 Enabling IGMP Snooping Querier In an IP multicast network running IGMP, a multicast router or Layer 3 multicast switch is responsible for send

Pagina 257

2-3 z The auto-execute command command may cause you unable to perform common configuration in the user interface, so use it with caution. z Befor

Pagina 258

29-12 Configuring IGMP queries and responses globally Follow these steps to configure IGMP queries and responses globally: To do... Use the command

Pagina 259

29-13 To do... Use the command... Remarks Configure the source address of IGMP general queries igmp-snooping general-query source-ip { current-in

Pagina 260

29-14 Configuring a multicast group filter on a port or a group of ports Follow these steps to configuring a multicast group filter on a port or a g

Pagina 261

29-15 When enabled to filter IPv4 multicast data based on the source ports, the device is automatically enabled to filter IPv6 multicast data based

Pagina 262

29-16 To do... Use the command... Remarks Enter system view system-view — Enter IGMP Snooping view igmp-snooping — Enable IGMP report suppressio

Pagina 263

29-17 To address such situations, you can enable the multicast group replacement function on the switch or certain ports. When the number of multicas

Pagina 264 - Configuring Stub Routers

29-18 To do... Use the command... Remarks Clear IGMP Snooping multicast group information reset igmp-snooping group { group-address | all } [ vlan

Pagina 265

29-19 Configuration procedure 1) Configure the IP address of each interface Configure an IP address and subnet mask for each interface as per Figure

Pagina 266

29-20 GE0/0/1 (D) ( 00:01:30 ) IP group(s):the following ip group(s) match to one mac group. IP group address:224

Pagina 267

29-21 Network diagram Figure 29-4 Network diagram for static router port configuration Source1.1.1.1/24RouterIGMP querierGE0/0/110.1.1.1/24GE0/0/21.1

Pagina 268

2-4 To do… Use the command… Remarks Enable the Telnet server function telnet server enable Required Enter one or more VTY user interface views user

Pagina 269

29-22 # Configure GigabitEthernet 0/0/3 to be a static router port. [AC] interface GigabitEthernet 0/0/3 [AC-GigabitEthernet0/0/3] igmp-snooping sta

Pagina 270 - OSPF Configuration Examples

29-23 MAC group(s): MAC group address:0100-5e01-0101 Host port(s):total 1 port. GE0/0/2 As shown above, GigabitEthern

Pagina 271 - 3) Verify the configuration

29-24 [AC-vlan100] igmp-snooping general-query source-ip 192.168.1.1 [AC-vlan100] igmp-snooping special-query source-ip 192.168.1.1 2) Configure Swi

Pagina 272

29-25 Solution 1) Enter the display current-configuration command to view the running status of IGMP Snooping. 2) If IGMP Snooping is not enabled,

Pagina 273

30-1 30 Multicast VLAN Configuration Introduction to Multicast VLAN As shown in Figure 30-1, in the traditional multicast programs-on-demand mode, w

Pagina 274

30-2 To do… Use the command… Remarks Configure sub-VLANs for a specific multicast VLAN multicast-vlan vlan-id subvlan vlan-list Required No sub-VLA

Pagina 275

30-3 Network diagram Figure 30-2 Network diagram for multicast VLAN configuration Configuration procedure 1) Configure an IP address for each inte

Pagina 276

30-4 # Create VLAN 1024, assign GigabitEthernet 0/0/1 to this VLAN and enable IGMP Snooping in the VLAN. [AC] vlan 1024 [AC-vlan1024] port GigabitEt

Pagina 277

31-1 31 LLDP Configuration When configuring LLDP, go to these sections for information you are interested in: z LLDP Configuration Tasks List z Pe

Pagina 278

31-2 Sending LLDPDUs An LLDP-enabled device operating in the TxRx mode or Tx mode sends LLDPDUs to its directly connected devices periodically. It al

Pagina 279

2-5 Table 2-4 Determine the command level when users logging in to access controller switch interface board are not authenticated Scenario Authentica

Pagina 280

31-3 Table 31-1 Basic LLDP TLVs Type Description Remarks End of LLDPDU TLV Marks the end of an LLDPDU. Chassis ID TLV Carries the bridge MAC add

Pagina 281

31-4 MED related LLDP TLVs z LLDP-MED capabilities TLV, which carries the MED type of the current device and the types of the LLDP MED TLVs that can

Pagina 282

31-5 Performing Basic LLDP Configuration Enabling LLDP Follow these steps to enable LLDP: To do… Use the command… Remarks Enter system view system-

Pagina 283

31-6 To do… Use the command… Remarks Enter system view system-view — Set the TTL multiplier lldp hold-multiplier value Optional 4 by default. Enter

Pagina 284

31-7 z To enable MED related LLDP TLV sending, you need to enable LLDP-MED capabilities TLV sending first. Conversely, to disable LLDP-MED capabili

Pagina 285 - Processing steps

31-8 To do… Use the command… Remarks Set the delay period to send LLDPDUs lldp timer tx-delay value Optional 2 seconds by default To enable local

Pagina 286

31-9 Displaying and Maintaining LLDP To do… Use the command… Remarks Display the global LLDP information or the information contained in the LLDP T

Pagina 287 - IP Source Guard Overview

31-10 <AC> system-view # Enable LLDP globally. [AC] lldp enable # Enable LLDP on GigabitEthernet 0/0/1 and GigabitEthernet 0/0/2, setting the L

Pagina 288 - Displaying IP Source Guard

31-11 Trap flag : No Roll time : 0s Number of neighbors : 1 Number of MED neighbors

Pagina 289

32-1 32 sFlow Configuration When configuring sFlow, go to these sections for information you are interested in: z sFlow Overview z Configuring sFl

Pagina 290

2-6 # Set the maximum number of lines the screen can contain to 30. [H3C-ui-vty0] screen-length 30 # Set the maximum number of commands the history c

Pagina 291

32-2 2) The sFlow agent periodically collects interface statistics on all sFlow enabled ports. 3) When the sFlow packet buffer overflows or the one

Pagina 292 - Troubleshooting

32-3 sFlow Configuration Example Network requirements z Host A and Server are connected to AC through GigabitEthernet 0/0/1 and GigabitEthernet 0/0/

Pagina 293 - 27 DLDP Configuration

32-4 GE0/0/1 Both 100000 Random Active Troubleshooting sFlow Configuration The Remote sFlow Collector Cannot Re

Pagina 294 - Device B

33-1 33 ARP Configuration When configuring ARP, go to these sections for information you are interested in: z ARP Overview z Configuring ARP z Co

Pagina 295 - DLDP Fundamentals

33-2 ARP Message Format Figure 33-1 ARP message format The following explains the fields in Figure 33-1. z Hardware type: This field specifies the

Pagina 296 - DLDP mode

33-3 2) If Host A finds no entry for Host B, Host A buffers the packet and broadcasts an ARP request, in which the source IP address and source MAC

Pagina 297 - DLDP authentication mode

33-4 z A non-permanent static ARP entry cannot be directly used for forwarding data. When configuring a non-permanent static ARP entry, you only nee

Pagina 298 - DLDP implementation

33-5 To do… Use the command… Remarks Enter system view system-view — Enter VLAN interface view interface Vlan-interface vlan-id — Set the maximum n

Pagina 299 - DLDP neighbor state

33-6 [Sysname] arp timer aging 10 [Sysname] vlan 10 [Sysname-vlan10] port gigabitethernet 0/0/10 [Sysname-vlan10] quit [Sysname] interface vlan-inter

Pagina 300 - Enabling DLDP

33-7 To do… Use the command… Remarks Clear ARP entries from the ARP mapping table reset arp { all | dynamic | static | interface interface-type int

Pagina 301 - Setting DLDP Mode

2-7 To do… Use the command… Remarks Set the timeout time of the user interface idle-timeout minutes [ seconds ] Optional The default timeout time o

Pagina 302 - Setting the DelayDown Timer

34-1 34 Proxy ARP Configuration When configuring proxy ARP, go to these sections for information you are interested in: z Proxy ARP Overview z Ena

Pagina 303 - Resetting DLDP State

34-2 Proxy ARP Configuration Examples Proxy ARP Configuration Example Network requirements Host A and Host D have IP addresses of the same network se

Pagina 304 - DLDP Configuration Example

34-3 z GigabitEthernet 0/0/2 and GigabitEthernet 0/0/3 isolated at Layer 2 can implement Layer 3 communication. Network diagram Figure 34-2 Network

Pagina 305

34-4 Ping Host B on Host A to verify that the two hosts can be pinged through, which indicates Layer 3 communication is implemented.

Pagina 306

35-1 35 DHCP Overview When configuring ARP, go to these sections for information you are interested in: z Introduction to DHCP z DHCP Address Allo

Pagina 307 - 28 Multicast Overview

35-2 When residing in a different subnet from the DHCP server, the DHCP client can get the IP address and other configuration parameters from the se

Pagina 308 - Broadcast

35-3 4) All DHCP servers receive the DHCP-REQUEST message, but only the server to which the client sent a formal request for the offered IP address

Pagina 309 - Multicast

35-4 Figure 35-3 DHCP message format z op: Message type defined in option field. 1 = REQUEST, 2 = REPLY z htype,hlen: Hardware address type and l

Pagina 310 - Roles in Multicast

35-5 Figure 35-4 DHCP option format Introduction to DHCP Options The common DHCP options are: z Option 6: DNS server option. It specifies the DNS

Pagina 311 - Multicast Models

35-6 Figure 35-5 Sub-option 1 in normal padding format z sub-option 2: Padded with the MAC address of the interface that received the client’s req

Pagina 312 - Multicast Architecture

2-8 Configuration procedure # Enter the OAP board view from the user view of the WX6103 main control board. <WX6103> oap connect slot 0 Connect

Pagina 313

35-7 z Sub-option 2: IP address of the backup network calling processor that DHCP clients will contact when the primary one is unreachable. z Sub-o

Pagina 314 - IPv6 Multicast Addresses

36-1 36 DHCP Relay Agent Configuration When configuring the DHCP relay agent, go to these sections for information you are interested in: z Introdu

Pagina 315

36-2 Figure 36-1 DHCP relay agent application IP networkDHCP serverDHCP relay agentDHCP client DHCP clientDHCP clientDHCP client No matter whether a

Pagina 316 - Multicast Protocols

36-3 If a reply returned by the DHCP server contains Option 82, the DHCP relay agent will remove the Option 82 before forwarding the reply to the cli

Pagina 317 - Layer 2 multicast protocols

36-4 Enabling the DHCP Relay Agent on an Interface With this task completed, upon receiving a DHCP request from the enabled interface, the relay agen

Pagina 318

36-5 z You can specify at most twenty DHCP server groups on the relay agent and at most eight DHCP server addresses for each DHCP server group. z

Pagina 319 - IGMP Snooping Configuration

36-6 To do… Use the command… Remarks Enter interface view interface interface-type interface-number — Enable invalid IP address check dhcp relay ad

Pagina 320 - IGMP Snooping related ports

36-7 With this feature enabled, upon receiving a DHCP request, the DHCP relay agent will record the IP address of the DHCP server which assigned an I

Pagina 321

36-8 z To support Option 82, it is required to perform related configuration on both the DHCP server and relay agent. Since the DHCP server configu

Pagina 322

36-9 Network diagram Figure 36-3 Network diagram for DHCP relay agent Configuration procedure # Enable DHCP. <AC> system-view [AC] dhcp enabl

Pagina 323

2-9 To do… Use the command… Remarks Enter the default ISP domain view domain domain-name Configure the AAA scheme to be applied to the domain authe

Pagina 324 - Enabling IGMP Snooping

36-10 Analysis Some problems may occur with the DHCP relay agent or server configuration. Enable debugging and execute the display command on the DHC

Pagina 325

37-1 37 DHCP Client Configuration When configuring the DHCP client, go to these sections for information you are interested in: z Introduction to D

Pagina 326 - Configuring Static Ports

37-2 z An interface can be configured to acquire an IP address in multiple ways, but these ways are exclusive. The latest configuration will overwr

Pagina 327

37-3 [AC-Vlan-interface1] ip address dhcp-alloc To implement the DHCP client-server model, you need to perform related configuration on the DHCP se

Pagina 328

38-1 38 DHCP Snooping Configuration When configuring DHCP snooping, go to these sections for information you are interested in: z DHCP Snooping Ove

Pagina 329

38-2 z Trusted: A trusted port forwards DHCP messages, ensuring that DHCP clients can obtain valid IP addresses. z Untrusted: The DHCP-ACK or DHCP-

Pagina 330

38-3 Figure 38-2 Configure trusted ports in a cascaded network DHCP Snooping Support for Option 82 Option 82 records the location information of th

Pagina 331

38-4 The handling strategy and padding format for Option 82 on the DHCP-Snooping device are the same as those on the relay agent. Configuring DHCP

Pagina 332

38-5 To do… Use the command… Remarks Configure the handling strategy for requesting messages containing Option 82 dhcp-snooping information strateg

Pagina 333

38-6 Network diagram Figure 38-3 Network diagram for DHCP snooping configuration Configuration procedure # Enable DHCP snooping. <AC> system-

Pagina 334

Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text rep

Pagina 335

2-10 To do… Use the command… Remarks Set the maximum number of lines the screen can contain screen-length screen-length Optional By default, the sc

Pagina 336

39-1 39 BOOTP Client Configuration While configuring a BOOTP client, go to these sections for information you are interested in: z Introduction to

Pagina 337

39-2 Because a DHCP server can interact with a BOOTP client, you can use the DHCP server to configure an IP address for the BOOTP client, without an

Pagina 338

39-3 Displaying and Maintaining BOOTP Client Configuration To do… Use the command… Remarks Display related information on a BOOTP client display bo

Pagina 339

40-1 40 ACL Overview In order to filter traffic, network devices use sets of rules, called access control lists (ACLs), to identify and handle packe

Pagina 340

40-2 z Software-based application: An ACL is referenced by a piece of upper layer software. For example, an ACL can be referenced to configure login

Pagina 341

40-3 An IPv4 ACL can have only one name. Whether to specify a name for an ACL is up to you. After creating an ACL, you cannot specify a name for it,

Pagina 342

40-4 2) If two rules are present with the same number of ones in their source MAC address masks, look at the destination MAC address masks. Then, co

Pagina 343

40-5 z IPv6 ACL Classification z IPv6 ACL Naming z IPv6 ACL Match Order z IPv6 ACL Step z Effective Period of an IPv6 ACL IPv6 ACL Classificatio

Pagina 344 - Multicast VLAN Configuration

40-6 Depth-first match for an advanced IPv6 ACL The following shows how your switch performs depth-first match in an advanced IPv6 ACL: 1) Sort rul

Pagina 345

41-1 41 IPv4 ACL Configuration When configuring an IPv4 ACL, go to these sections for information you are interested in: z Creating a Time Range z

Pagina 346

2-11 Table 2-6 Determine the command level when users logging in to the access controller switch interface board are authenticated in the scheme mode

Pagina 347

41-2 2004 23:59, you may use the time-range test 12:00 to 14:00 wednesday from 00:00 01/01/2004 to 23:59 12/31/2004 command. z You may create indiv

Pagina 348 - 31 LLDP Configuration

41-3 To do… Use the command… Remarks Create or modify a rule rule [ rule-id ] { deny | permit } [ fragment | logging | source { sour-addr sour-wil

Pagina 349 - TLV Types

41-4 In addition, advanced IPv4 ACLs allow you to filter packets based on three priority criteria: type of service (ToS), IP precedence, and differen

Pagina 350

41-5 z You can modify the match order of an ACL with the acl number acl-number [ name acl-name ] match-order { auto | config } command but only wh

Pagina 351

41-6 To do… Use the command… Remarks Create or modify a rule rule [ rule-id ] { deny | permit } [ cos vlan-pri | dest-mac dest-addr dest-mask | ls

Pagina 352 - Configuring LLDPDU TLVs

41-7 Copying an IPv4 ACL This feature allows you to copy an existent IPv4 ACL to generate a new one, which is of the same type and has the same match

Pagina 353

41-8 Network Diagram Figure 41-1 Network diagram for IPv4 ACL configuration GE0/0/4GE0/0/1GE0/0/2 GE0/0/3192.168.1.0/24192.168.4.1ACR&D departme

Pagina 354 - Enable LLDP Polling

41-9 [AC-classifier-c_market] if-match acl 3001 [AC-classifier-c_market] quit # Configure traffic behavior b_ market to deny matching packets. [AC] t

Pagina 355 - Configuring LLDP Trap

42-1 42 IPv6 ACL Configuration When configuring IPv6 ACLs, go to these sections for information you are interested in: z Creating a Time Range z

Pagina 356 - LLDP Configuration Example

42-2 To do… Use the command… Remarks Create an IPv6 ACL description description text Optional By default, no IPv6 ACL description is present. Cre

Pagina 357

2-12 Configuration Example Network requirements Assume that you are a level 3 Console user and want to perform the following configuration for Telnet

Pagina 358

42-3 Configuration Prerequisites If you want to reference a time range to a rule, define it with the time-range command first. Configuration Procedu

Pagina 359 - 32 sFlow Configuration

42-4 z You can modify the match order of an IPv6 ACL with the acl ipv6 number acl6-number [ name acl6-name ] match-order { auto | config } command

Pagina 360 - Displaying sFlow

42-5 Displaying and Maintaining IPv6 ACLs To do… Use the command… Remarks Display information about a specified or all IPv6 ACLs display acl ipv6 {

Pagina 361

42-6 [AC-behavior-b_rd] filter deny [AC-behavior-b_rd] quit # Configure QoS policy p_rd to use traffic behavior b_rd for class c_rd. [AC] qos policy

Pagina 362

43-1 43 QoS Overview The term switch in this document refers to a switch in a generic sense or an access controller configured with the switching

Pagina 363 - 33 ARP Configuration

43-2 locations through the VPN technology to develop some transaction applications, such as to access to the database of the company or to manage rem

Pagina 364 - ARP Message Format

43-3 z Excessively high delay will cause retransmission of packets. z Congestion decreases the effective throughput of the network and the utilizat

Pagina 365 - ARP Mapping Table

43-4 assigned resources from different approaches, and are the concrete ways of providing differentiated services.

Pagina 366 - Configuring ARP

44-1 44 Traffic Classification, Traffic Policing, and Line Rate Configuration When configuring traffic classification, traffic policing, and line ra

Pagina 367 - ARP Configuration Example

44-2 1) IP precedence, ToS precedence, and DSCP precedence Figure 44-1 DS field and ToS field The ToS field in an IP header contains eight bits, w

Pagina 368 - Configuring Gratuitous ARP

2-13 # Set the timeout time to 6 minutes. [H3C-ui-vty0] idle-timeout 6 Telnet Connection Establishment Telnetting to the Access controller Switch Int

Pagina 369

44-3 Table 44-2 Description on DSCP precedence values DSCP value (decimal) DSCP value (binary) Description 46 101110 ef 10 001010 af11 12 001100 af

Pagina 370 - 34 Proxy ARP Configuration

44-4 Figure 44-3 802.1Q tag headers In the figure above, the 3-bit priority field in TCI is 802.1p precedence in the range of 0 to 7. In the figure

Pagina 371

44-5 Traffic Evaluation and Token Bucket Token Bucket A token bucket can be considered as a container with a certain capacity to hold tokens. The sys

Pagina 372

44-6 z Excess burst size (EBS) Two token buckets are used in this evaluation. Their rates of putting tokens into the buckets are CIR and PIR respect

Pagina 373

44-7 Line Rate Configuration Line Rate Configuration Procedure Follow these steps to configure line rate: To do… Use the command… Remarks Enter sy

Pagina 374 - 35 DHCP Overview

45-1 45 QoS Policy Configuration When configuring QoS policy, go to these sections for information that you are interested in: z Overview z Config

Pagina 375 - DHCP Address Allocation

45-2 z The policy name is determined. z Apply the QoS policy in Ethernet port view/port group view. Defining a Class To define a class, you need t

Pagina 376 - DHCP Message Format

45-3 Form Description ip-precedence ip-precedence-list Specifies to match packets by IP precedence. The ip-precedence-list argument is a list of IP

Pagina 377 - DHCP Options

45-4 Configuration procedure Follow these steps to define a traffic behavior: To do… Use the command… Remarks Enter system view system-view — Creat

Pagina 378 - Self-Defined Options

45-5 # Configure traffic policing action for the traffic behavior. [Sysname-behavior-test] car cir 640 Defining a Policy A policy associates a class

Pagina 379 - Option 184

2-14 Figure 2-5 Network diagram for Telnet connection establishment Step 4: Launch Telnet on your PC, input the IP address of the management Ethern

Pagina 380

45-6 [Sysname-GigabitEthernet0/0/1] # Apply the policy to the port. [Sysname-GigabitEthernet0/0/1] qos apply policy test inbound Displaying and Main

Pagina 381 - Fundamentals

46-1 46 Congestion Management When configuring congestion management, go to these section for information that you are interested in: z Overview z

Pagina 382 - IP network

46-2 Figure 46-1 Diagram for SP queuing SP queue-scheduling algorithm is specially designed for critical service applications. An important feature

Pagina 383

46-3 Figure 46-2 Diagram for WRR queuing A port of the switch supports eight outbound queues. The WRR queue-scheduling algorithm schedules all the

Pagina 384

46-4 Configuring an SP Queue Configuration Procedure Follow these steps to configure SP queues: To do… Use the command… Remarks Enter system view s

Pagina 385

46-5 To do… Use the command… Remarks Enter system view system-view — Enter port view interface interface-type interface-number Enter port view or p

Pagina 386

46-6 To do… Use the command… Remarks Enter system view system-view — Enter port view interface interface-type interface-number Enter port view or p

Pagina 387

47-1 47 Priority Mapping When configuring priority mapping, go to these sections for information you are interested in: z Priority Mapping Overview

Pagina 388

47-2 Imported priority value dot1p-lp mapping dot1p-dp mapping 1 0 0 2 1 0 3 3 0 4 4 0 5 5 0 6 6 0 7 7 0 Table 47-2 The default values of dscp-dp

Pagina 389

47-3 To do… Use the command… Remarks Enter system view system-view — Enter priority mapping table view qos map-table { dot1p-dp | dot1p-lp | dscp-d

Pagina 390

2-15 Telnetting to Another Access controller from the Current One You can Telnet to another access controller switch interface board from the current

Pagina 391 - DHCP Client Configuration

47-4 received packets, and then marks the received packets with the corresponding local precedence and drop precedence. Port priority is in the range

Pagina 392

47-5 To do… Use the command… Remarks Enter system view system-view — Enter port view interface interface-type interface-number Enter port view or p

Pagina 393

48-1 48 Applying a QoS Policy to VLANs When applying a QoS policy to VLANs, go to these sections for information that you are interested in: z Over

Pagina 394 - DHCP Snooping Configuration

48-2 Configuration Examples Network Requirements z The QoS policy test is defined to perform traffic policing for the packets matching basic IPv4 AC

Pagina 395

49-1 49 Traffic Mirroring Configuration When configuring traffic mirroring, go to these sections for information that you are interested in: z Over

Pagina 396

49-2 Displaying and Maintaining Traffic Mirroring To do… Use the command… Remarks Display the configuration information about the user-defined traf

Pagina 397

49-3 [Sysname] traffic behavior 1 [Sysname-behavior-1] mirror-to interface GigabitEthernet 0/0/2 [Sysname-behavior-1] quit # Configure a QoS policy a

Pagina 398

50-1 50 Port Mirroring Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured wit

Pagina 399

50-2 z Local port mirroring copies packets passing through one or more ports (known as source ports) of a device to the monitor port (also destinati

Pagina 400 - BOOTP Client Configuration

50-3 Destination device contains destination mirroring port, and remote destination port mirroring groups are created on destination devices. Upon re

Pagina 401 - Through BOOTP

3-1 3 Logging In Through the Web-Based Network Management System When logging in through the Web-based network management system, go to these sectio

Pagina 402 - Network requirement

50-4 Configuring Remote Port Mirroring You can configure a remote source port mirroring group as well as a remote destination port mirroring group

Pagina 403 - 40 ACL Overview

50-5 z All ports in a remote mirroring group belong to the same device. A remote source mirroring group can have only one outbound mirroring port.

Pagina 404 - Introduction to IPv4 ACL

50-6 z The remote destination mirroring port cannot be a member port of the current mirroring group. z The remote destination mirroring port can b

Pagina 405 - IPv4 ACL Match Order

50-7 Network diagram Figure 50-3 Network diagram for local port mirroring configuration Configuration procedure Configure AC. # Create a local port

Pagina 406 - Introduction to IPv6 ACL

50-8 The administrator wants to monitor the packets sent from Department 1 and 2 through the data monitoring device. Use the remote port mirroring fu

Pagina 407 - IPv6 ACL Match Order

50-9 [AC-GigabitEthernet0/0/3] port link-type trunk [AC-GigabitEthernet0/0/3] port trunk permit vlan 2 2) Configure Switch A (the intermediate devic

Pagina 408 - IPv6 ACL Step

51-1 51 UDP Helper Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with th

Pagina 409 - 41 IPv4 ACL Configuration

51-2 To do… Use the command… Remarks Enter VLAN interface view interface Vlan-interface vlan-id — Specify the destination server to which UDP packe

Pagina 410 - Configuring a Basic IPv4 ACL

51-3 Configuration procedure The following configuration assumes that a route from AC to the network segment 10.2.0.0/16 is available. # Enable UD

Pagina 411 - Configuration Examples

52-1 52 SNMP Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with the swit

Pagina 412

3-2 2) Establish an HTTP connection between your PC and the switch interface board, as shown in the following figure. Figure 3-1 Establish an HTTP c

Pagina 413

52-2 z NMS manages an SNMP enabled network, whereas Agent is the managed network device. They exchange management information through the SNMP proto

Pagina 414

52-3 B can be uniquely identified by a string of numbers {1.2.1.1}. This string of numbers is the OID of the managed object B. Figure 52-2 MIB tree A

Pagina 415 - Copying an IPv4 ACL

52-4 To do… Use the command… Remarks Configure the maximum size of an SNMP packet that can be received or sent by an SNMP agent snmp-agent packet m

Pagina 416 - Network Diagram

52-5 The validity of a USM user depends on the engine ID of the SNMP agent. If the engine ID used for USM user creation is not identical to the curr

Pagina 417

52-6 z Logs occupy storage space of the device, thus affecting the performance of the device. Therefore, you are recommended to disable SNMP loggin

Pagina 418 - 42 IPv6 ACL Configuration

52-7 To enable an interface to send SNMP Traps when its state changes, you need to enable the Link up/down Trap packet transmission function on an i

Pagina 419

52-8 Displaying and Maintaining SNMP To do… Use the command… Remarks Display SNMP-agent system information, including the contact, location, and ve

Pagina 420

52-9 [Sysname] snmp-agent community write private # Configure VLAN-interface 2 (with the IP address of 1.1.1.1/24). Add the port GigabitEthernet 0/0/

Pagina 421 - Copying an IPv6 ACL

52-10 Configuration procedure The configurations for NMS and Agent are omitted. # Enable logging display on the terminal (optional, enabled by def

Pagina 422 - Network Requirements

52-11 The system information of the information center can be output to the terminal or to the log buffer. In this example, SNMP log is output to th

Pagina 423

4-1 4 Logging In from an NMS When logging in from an NMS, go to these sections for information you are interested in: z Introduction z Connection

Pagina 424 - 43 QoS Overview

53-1 53 RMON Configuration When configuring RMON, go to these sections for information you are interested in: z RMON Overview z Configuring RMON z

Pagina 425 - Influence of Congestion

53-2 RMON Groups Among the ten RMON groups defined by RMON specifications (RFC 1757), H3C series Ethernet switches support the event group, alarm gro

Pagina 426 - Countermeasures

53-3 If the count result overpasses the same threshold multiple times, only the first one can cause an alarm event. That is, the rising alarm and fa

Pagina 427

53-4 To do… Use the command… Remarks Create an entry in the private alarm table rmon prialarm entry-number prialarm-formula prialarm-des sampling-

Pagina 428 - Rate Configuration

53-5 To do… Use the command… Remarks Display RMON prialarm configuration information display rmon prialarm [ entry-number ] Available in any view D

Pagina 429

53-6 # Configure an alarm group to sample received bytes on GigabitEthernet 0/0/1. When the received bytes exceed the upper or below the lower limit,

Pagina 430

54-1 54 NTP Configuration z The term switch in this document refers to a switch in a generic sense or an access controller configured with the sw

Pagina 431

54-2 z All devices must use the same reference clock in a charging system. z To implement certain functions, such as scheduled restart of all devic

Pagina 432 - Complicated Evaluation

54-3 The process of system clock synchronization is as follows: z Switch A sends Switch B an NTP message, which is timestamped when it leaves Switch

Pagina 433 - Line Rate

54-4 Figure 54-2 Clock synchronization message format LI VN Mode Stratum Poll Precision0 7 15 23 31Root delay (32 bits)Root dispersion (32 bits)Refer

Pagina 434 - Line Rate Configuration

5-1 5 Configuring Source IP Address for Telnet Service Packets Go to these sections for information you are interested in: z Overview z Configurin

Pagina 435 - 45 QoS Policy Configuration

54-5 Operation Modes of NTP Switches running NTP can implement clock synchronization in one of the following modes: Server/client mode Figure 54-3 Se

Pagina 436 - Defining a Class

54-6 Broadcast mode Figure 54-5 Broadcast mode In the broadcast mode, a server periodically sends clock synchronization messages to the broadcast a

Pagina 437 - Defining a Traffic Behavior

54-7 In symmetric peers mode, broadcast mode and multicast mode, the client (or the symmetric active peer) and the server (the symmetric passive pee

Pagina 438

54-8 A single switch can have a maximum of 128 associations at the same time, including static associations and dynamic associations. A static asso

Pagina 439 - Applying a Policy

54-9 Configuring the NTP Symmetric Mode For switches working in the symmetric mode, you need to specify a symmetric-passive on a symmetric-active pee

Pagina 440

54-10 Configuring a broadcast client To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type

Pagina 441 - 46 Congestion Management

54-11 To do… Use the command… Remarks Configure the switch to work in the NTP multicast server mode ntp-service multicast-server [ ip-address ] [ a

Pagina 442

54-12 Configuring the Maximum Number of Dynamic Sessions Allowed To do… Use the command… Remarks Enter system view system-view — Configure the maxi

Pagina 443

54-13 The access-control right mechanism provides only a minimum degree of security protection for the system running NTP. A more secure method is i

Pagina 444 - Configuring a WRR Queue

54-14 To do… Use the command… Remarks Configure an NTP authentication key ntp-service authentication-keyid keyid authentication-mode md5 value Requ

Pagina 445 - Configuring SP+WRR Queues

Convention Description Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or

Pagina 446

5-2 Configuration in system view Table 5-2 Configure a source IP address for service packets in system view To do… Use the command… Remarks Enter s

Pagina 447 - 47 Priority Mapping

54-15 The procedure of configuring NTP authentication on a server is the same as that on a client, and the same authentication key must be configure

Pagina 448

54-16 Clock offset: 0.0000 ms Root delay: 0.00 ms Root dispersion: 0.00 ms Peer dispersion: 0.00 ms Reference time: 00:00:00.000 UTC Jan 1 1900 (0000

Pagina 449

54-17 Network diagram Figure 54-8 Network diagram for NTP symmetric peers mode configuration Configuration procedure 1) Configuration on AC A: #

Pagina 450

54-18 # View the NTP session information of AC B, which shows that an association has been set up between AC B and AC C. [AC B] display ntp-service s

Pagina 451

54-19 <AC C> system-view [AC C] interface vlan-interface 2 [AC C-Vlan-interface2] ntp-service broadcast-client 3) Configuration on AC A: # Co

Pagina 452 - Overview

54-20 Network diagram Figure 54-10 Network diagram for NTP multicast mode configuration Vlan-int31.0.1.11/24Vlan-int31.0.1.10/24Vlan-int23.0.1.31/24V

Pagina 453

54-21 As shown above, AC D has been synchronized to AC C, and the clock stratum level of AC D is 3, while that of AC C is 2. # View the NTP session

Pagina 454

54-22 As shown above, AC A has been synchronized to AC C, and the clock stratum level of AC A is 3, while that of AC C is 2. # View the NTP session

Pagina 455

54-23 [AC B] ntp-service unicast-server 1.0.1.11 authentication-keyid 42 Before AC B can synchronize its clock to that of AC A, you need to enable NT

Pagina 456

54-24 Network diagram Figure 54-12 Network diagram for configuration of NTP broadcast mode with authentication Configuration procedure 1) Configur

Pagina 457 - Port Mirroring Configuration

6-1 6 Controlling Login Users To control login users, go to these sections for information you are interested in: z Introduction z Controlling Tel

Pagina 458 - Implementing Port Mirroring

54-25 Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion: 34.30 ms Reference time:

Pagina 459

55-1 55 DNS Configuration When configuring DNS, go to these sections for information you are interested in: z DNS Overview z Configuring the DNS

Pagina 460

55-2 1) A user program sends a name query to the resolver of the DNS client. 2) The DNS resolver looks up the local domain name cache for a match.

Pagina 461

55-3 Currently, the device supports static and dynamic DNS services. If an alias is configured for a domain name on the DNS server, the device can

Pagina 462 - Displaying Port Mirroring

55-4 To do… Use the command… Remarks Enter system view system-view –– Configure a mapping between a host name and IP address in the static name res

Pagina 463

55-5 Displaying and Maintaining DNS To do… Use the command… Remarks Display the static domain name resolution table display ip host Display DNS ser

Pagina 464

55-6 round-trip min/avg/max = 2/2/2 ms Dynamic Domain Name Resolution Configuration Example Network requirements z The IP address of the DNS ser

Pagina 465

55-7 Figure 55-5 Create a zone # Create a mapping between the host name and IP address. Figure 55-6 Add a host In Figure 55-6, right click zone c

Pagina 466 - 51 UDP Helper Configuration

55-8 Figure 55-7 Add a mapping between domain name and IP address 2) Configure the DNS client # Enable dynamic domain name resolution. <AC>

Pagina 467

55-9 DNS Proxy Configuration Example Network requirements z Specify AC A as the DNS server of AC B (the DNS client). z AC A acts as a DNS proxy. Th

Pagina 468

6-2 To do… Use the command… Remarks Quit to system view quit — Enter user interface view user-interface [ type ] first-number [ last-number ] — App

Pagina 469 - 52 SNMP Configuration

55-10 [AC B] dns server 2.1.1.2 4) Configuration verification # Execute the ping host.com command on AC B to verify that the host can be pinged after

Pagina 470 - MIB Overview

56-1 56 File System Management Configuration z The term switch in this document refers to a switch in a generic sense or an access controller con

Pagina 471 - SNMP Configuration

56-2 Directory Operations Directory operations include create, delete, display the current path, display specified directory or file information as s

Pagina 472

56-3 To do… Use the command… Remarks Copy a file copy fileurl-source fileurl-dest Optional Available in user view Move a file move fileurl-source f

Pagina 473 - Configuring SNMP Logging

56-4 Currently, the storage device on an H3C WX6103 access controller switch interface board is the Flash only, which is named flash:. Memory space

Pagina 474 - Trap Configuration

56-5 Directory of flash:/ 0 drw- - Feb 16 2006 11:45:36 logfile 1 -rw- 1218 Feb 16 2006 11:46:19 config.cfg 2 drw-

Pagina 475

56-6 z Current configuration, which refers to the user’s configuration during the operation of a device. This configuration is stored in the flash.

Pagina 476 - SNMP Configuration Example

56-7 Deleting the Startup Configuration File With the configuration file deleted, your device will boot up with the default configuration next time i

Pagina 477

56-8 For an H3C WX6103 access controller switch interface board, the file to be backed up or restored is the main configuration file for next startu

Pagina 478

56-9 Displaying and Maintaining Device Configuration To do… Use the command… Remarks Display the configuration file saved in the storage device dis

Pagina 479

6-3 To do… Use the command… Remarks Enter system view system-view — Create a basic ACL or enter basic ACL view acl number acl-number [ name acl-nam

Pagina 480 - 53 RMON Configuration

57-1 57 FTP Configuration When configuring FTP, go to these sections for information you are interested in: z FTP Overview z Configuring the FTP C

Pagina 481 - RMON Groups

57-2 z The FTP function is available when a route exists between the FTP server and the FTP client. z When a device serving as the FTP server logs

Pagina 482 - Configuring RMON

57-3 To do… Use the command… Remarks Log onto the remote FTP server directly in user view ftp [ server-address [ service-port ] [ source { interfac

Pagina 483

57-4 To do… Use the command… Remarks Set the file transfer mode to binary binary Optional ASCII by default Change the working path on the remote FT

Pagina 484 - RMON Configuration Example

57-5 z On the FTP server, an FTP user account has been created for the FTP client, with the username being abc and the password being pwd. z The PC

Pagina 485

57-6 [ftp] bye # You can use the boot-loader command to specify the downloaded file as the main startup file for next startup. Then restart the devic

Pagina 486 - 54 NTP Configuration

57-7 Follow these steps to configure authentication and authorization for FTP server: To do… Use the command… Remarks Enter system view system-view

Pagina 487 - How NTP Works

57-8 Network diagram Figure 57-3 Smooth upgrading using the FTP server Configuration procedure 1) Configure access controller (FTP Server) # Creat

Pagina 488 - NTP Message Format

57-9 z When upgrading the configuration file with FTP, put the new file under the root directory. z After you finish upgrading the Boot ROM progra

Pagina 489

58-1 58 TFTP Configuration When configuring TFTP, go to these sections for information you are interested in: z TFTP Overview z Configuring the TF

Pagina 490 - Operation Modes of NTP

6-4 z Defining an ACL z Applying the ACL to control users accessing the access controller through SNMP Prerequisites The controlling policy against

Pagina 491 - Multicast mode

58-2 Before using TFTP, the administrator needs to configure IP addresses for the TFTP client and server, and make sure that there is a route between

Pagina 492 - NTP Configuration Task list

58-3 To do… Use the command… Remarks Download or upload a file in IPv4 network tftp server-address { get | put | sget } source-filename [ destinati

Pagina 493

58-4 z Configure a TFTP working directory 2) Configure the device (TFTP Client) If the free memory space of the device is not big enough, you sho

Pagina 494

59-1 59 Information Center Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured

Pagina 495

59-2 Table 59-1 Severity description Severity Severity value Description emergencies 0 The system is unavailable. alerts 1 Information that dem

Pagina 496

59-3 Configurations for the six output destinations function independently and take effect only after the information center is enabled. Outputting

Pagina 497

59-4 Module name Description OSPF Open Shortest Path First module QoS Quality of Service module RDS Radius module RM Routing Management module RM

Pagina 498

59-5 What follows is a detailed explanation of the fields involved: Priority The priority is calculated using the following formula: facility*8+sever

Pagina 499

59-6 Task Remarks Setting to Output System Information to the Trap Buffer Optional Setting to Output System Information to the Log Buffer Optional S

Pagina 500 - NTP Configuration Examples

59-7 LOG TRAP DEBUG Output destination Modules allowed Enabled/disabled Severity Enabled/disabled Severity Enabled/disabled Severity SNMP NMS defau

Pagina 501

6-5 As SNMP community name is a feature of SNMPv1 and SNMPv2c, the specified ACLs in the command that configures SNMP community names (the snmp-agent

Pagina 502

59-8 To do… Use the command… Remarks Configure the format of the time stamp info-center timestamp { debugging | log | trap } { boot | date | none }

Pagina 503

59-9 To do… Use the command… Remarks Configure the output rules of the system information info-center source { module-name | default } channel { ch

Pagina 504

59-10 To do… Use the command… Remarks Configure the channel through which system information can be output to the log buffer and specify the buffer

Pagina 505

59-11 Configuring Synchronous Information Output Synchronous information output refers to the feature that if the user’s input is interrupted by syst

Pagina 506 - Root delay: 40.00 ms

59-12 Support for the display logfile buffer and display logfile summary commands varies with devices. Information Center Configuration Examples Ou

Pagina 507

59-13 [Sysname] info-center source ip channel loghost log level informational state on 2) Configuring the log host The following configurations were

Pagina 508

59-14 1) Configuring the device # Enable information center. <Sysname> system-view [Sysname] info-center enable # Specify the host with IP add

Pagina 509

59-15 # ps -ae | grep syslogd 147 # kill -9 147 # syslogd -r & Ensure that the syslogd process is started with the -r option on a Linux log hos

Pagina 510 - AC B and AC A

59-16 # Enable the display of log information on a monitor terminal. <Sysname> terminal monitor % Current terminal monitor is on <Sysname>

Pagina 511 - 55 DNS Configuration

60-1 60 Basic Configurations The term switch in this document refers to a switch in a generic sense or an access controller configured with the sw

Pagina 512 - DNS suffixes

7-1 7 VLAN Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with the switch

Pagina 513 - Configuring the DNS Client

60-2 Configuring the Device Name To do… Use the command… Remarks Enter system view system-view — Configure the device name sysname sysname Option

Pagina 514 - Configuring the DNS Proxy

60-3 Configuration System clock displayed by the display clock command Example [1], 2 and 1 date-time Configure: clock timezone zone-time add 1 and c

Pagina 515 - DNS Configuration Examples

60-4 Configuration System clock displayed by the display clock command Example If the value of "date-time"±"zone-offset" is not i

Pagina 516

60-5 the same but are not part of the banner information. In this case, the input text, together with the command keywords, cannot exceed 510 charact

Pagina 517

60-6 By default, the <Ctrl+G>, <Ctrl+L> and <Ctrl+O> hotkeys are configured with command line and the <Ctrl+T> and <Ctrl+

Pagina 518

60-7 These hotkeys are defined by the device. When you interact with the device from terminal software, these keys may be defined to perform other o

Pagina 519

60-8 z When you configure the password for switching user level with the super password command, the user level is defaulted to 3 if no user level

Pagina 520

60-9 z For the detailed description of the display users command, refer to the Login in H3C WX6103 Access Controller Switch Interface Board Command

Pagina 521 - File System Management

60-10 <Sysname> ? User view commands: backup Backup next startup-configuration file to TFTP server boot-loader Set boot

Pagina 522 - File Operations

60-11 You can use the info-center synchronous command to enable synchronous information output. For the detailed description of this function, refer

Pagina 523 - Storage Device Operations

7-2 Figure 7-1 A VLAN diagram VLAN 2VLAN 5Switch BSwitch ARouter A VLAN is not restricted by physical factors, that is to say, hosts that reside in

Pagina 524 - Memory space management

60-12 The regular expression is a string of 1 to 256 characters, case sensitive, and space allowed. It supports multiple mapping rules: z begin: Dis

Pagina 525 - Configuration File Overview

60-13 Saving History Commands The CLI can automatically save the commands that have been used. You can invoke and repeatedly execute them as needed.

Pagina 526 - Format of configuration file

61-1 61 System Maintaining and Debugging When maintaining and debugging the system, go to these sections for information you are interested in: z S

Pagina 527

61-2 3) The source device sends a packet with a TTL value of 2 to the destination device. 4) The second hop responds with a TTL-expired ICMP messag

Pagina 528

61-3 System Maintaining and Debugging System Maintaining To do… Use the command… Remarks ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i i

Pagina 529

61-4 z The debugging commands are usually used by administrators in diagnosing network failure. z Output of the debugging information may reduce s

Pagina 530 - 57 FTP Configuration

62-1 62 Device Management When configuring device management, go to these sections for information you are interested in: z Device Management Overv

Pagina 531 - Configuring the FTP Client

62-2 To do… Use the command… Remarks Enable the scheduled reboot function and specify a specific reboot time and date schedule reboot at hh:mm [ da

Pagina 532

62-3 Upgrading Boot ROM During the operation of the device, you can use Boot ROM in the storage device to upgrade Boot ROM programs that are running

Pagina 533

62-4 A confirmation is required when you execute this command. If you fail to make a confirmation within 30 seconds or enter “N” to cancel the opera

Pagina 534

7-3 IEEE802.1Q defines a four-byte VLAN Tag between the DA&SA field and the Type field to carry VLAN-related information, as shown in Figure 7-3.

Pagina 535 - Configuring the FTP Server

63-1 63 NQA Configuration When configuring NQA, go to these sections for information you are interested in: z NQA Overview z NQA Configuration Tas

Pagina 536

63-2 At present, NQA supports nine test types: ICMP-echo, DHCP, FTP, HTTP, UDP-jitter, SNMP, TCP, UDP-echo and DLSw. In an NQA test, the client sends

Pagina 537

63-3 For the detailed description of the Track module, refer to Track in H3C WX6103 Access Controller Switch Interface Board Configuration Guide. S

Pagina 538 - <Sysname> reboot

63-4 specified for a listening service on the server must be consistent with those on the client and must be different from those of an existing list

Pagina 539 - 58 TFTP Configuration

63-5 To do… Use the command… Remarks Enter system view system-view — Enable the NQA server nqa server enable Required Disabled by default. Configu

Pagina 540 - Configuring the TFTP Client

63-6 Follow these steps to configure the ICMP-echo test: To do… Use the command… Remarks Enter system view system-view — Enter NQA test group view

Pagina 541

63-7 Configuring the DHCP Test The DHCP test is mainly used to test the existence of a DHCP server on the network as well as the time necessary for t

Pagina 542

63-8 To do… Use the command… Remarks Enter system view system-view — Enter NQA test group view nqa entry admin-name operation-tag — Configure the t

Pagina 543 - Information Center Overview

63-9 To do… Use the command… Remarks Enter system view system-view — Enter NQA test group view nqa entry admin-name operation-tag — Configure the t

Pagina 544

63-10 Delay jitter refers to the difference between the interval of receiving two packets consecutively and the interval of sending these two packets

Pagina 545

7-4 z Other types The H3C WX6103 access controller switch interface boards support port-based VLAN and MAC address-based VLAN. Configuring Basic VL

Pagina 546 - System Information Format

63-11 To do… Use the command… Remarks Configure the time for waiting for a response in a UDP-jitter test probe packet-timeout packet-timeout Option

Pagina 547

63-12 To do… Use the command… Remarks Configure the source IP address of a probe request in a test operation source ip ip-address Optional By defau

Pagina 548

63-13 To do… Use the command… Remarks Configure the destination port destination port port-number Required By default, no destination port number i

Pagina 549

63-14 To do… Use the command… Remarks Configure the destination address for a test operation destination ip ip-address Required By default, no dest

Pagina 550

63-15 To do… Use the command… Remarks Configure the test type as DLSw and enter test type view type dlsw Required Configure the destination addres

Pagina 551

63-16 Configuring Trap Delivery Traps can be sent to the network management server when test is completed, test fails or probe fails. Configuration p

Pagina 552

63-17 To do… Use the command… Remarks Configure the number of probes in a test probe count times Optional By default, one probe is performed in a t

Pagina 553

63-18 After an NQA test group is scheduled, you cannot enter the test group view or test type view. Displaying and Maintaining NQA To do… Use the

Pagina 554

63-19 Square-Sum of round trip time: 256 Last succeeded probe time: 2007-03-14 17:21:07.8 Extend results: Packet lost in test:

Pagina 555

63-20 FTP Test Configuration Example Network requirements Use the NQA FTP function to test the connection with a specified FTP server and the time ne

Pagina 556

i Table of Contents 1 Logging In Through an OAP Board ·······························································································

Pagina 557

7-5 Follow these steps to configure VLAN interface basic attributes: To do… Use the command… Remarks Enter system view system-view — Create a VLAN

Pagina 558

63-21 HTTP Test Configuration Example Network requirements Use the HTTP function to test the connection with a specified HTTP server and the time req

Pagina 559 - 60 Basic Configurations

63-22 Network diagram Figure 63-7 Network diagram for UDP-jitter test Configuration procedure 1) Configure Switch. # Enable the NQA server and conf

Pagina 560 - Configuring the System Clock

63-23 Positive SD square sum: 2 Positive DS square sum: 226 Min negative SD: 1 Min negative DS: 1

Pagina 561

63-24 Extend results: Packet lost in test: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no

Pagina 562 - Configuring a Banner

63-25 Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence erro

Pagina 563 - Configuring CLI Hotkeys

63-26 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to ot

Pagina 564

64-1 64 SSH Configuration When configuring SSH, go to these sections for information you are interested in: z SSH2.0 Overview z Configuring the De

Pagina 565

64-2 Figure 64-1 Encryption and decryption Key-based algorithm is usually classified into symmetric key algorithm and asymmetric key algorithm. Asy

Pagina 566

64-3 Version negotiation z The server opens port 22 to listen to connection requests from clients. z The client sends a TCP connection request to t

Pagina 567 - CLI Features

64-4 z The server authenticates the client. If the authentication fails, the server informs the client by sending a message, which includes a list o

Pagina 568

7-6 Default VLAN You can configure the default VLAN for a port. By default, VLAN 1 is the default VLAN for all ports. However, this can be changed as

Pagina 569 - CLI Display

64-5 z During interactive session, the client can send the commands to be performed by pasting the text, which must be within 2000 bytes. It is re

Pagina 570 - Display functions

64-6 Configuring the User Interfaces for SSH Clients An SSH client accesses the device through a VTY user interface. Therefore, you need to configure

Pagina 571 - Saving History Commands

64-7 z Configuration of the rsa local-key-pair create and public-key local create dsa command can survive a reboot. You only need to configure it o

Pagina 572 - The tracert command

64-8 automatically converts the public key to a string coded using the PKCS standard. Before importing the public key, you must upload the public key

Pagina 573

64-9 To do… Use the command… Remarks Enter system view system-view — For stelnet users ssh user username service-type stelnet authentication-type {

Pagina 574 - System Debugging

64-10 For users using publickey authentication: z You must configure on the device the corresponding username and public keys. z After login, the

Pagina 575 - System Maintaining Example

64-11 Configuring the Device as an SSH Client SSH Client Configuration Task List Complete the following tasks to configure an SSH client: Task Remar

Pagina 576 - 62 Device Management

64-12 Disable first-time authentication For successful authentication of an SSH client not supporting first-time authentication, the server host publ

Pagina 577

64-13 To do… Use the command… Remarks Display the source IP address or interface currently set for the SSH client display ssh client source Availab

Pagina 578 - Upgrading Boot ROM

64-14 [AC-luser-client001] password simple aabbcc [AC-luser-client001] service-type ssh level 3 [AC-luser-client001] quit # Specify the service type

Pagina 579

7-7 Configuring an Access-Port-Based VLAN There are two ways to configure Access-port-based VLAN: one way is to configure in VLAN view, the other way

Pagina 580 - 63 NQA Configuration

64-15 When Using Publickey Authentication Network requirements z As shown in Figure 64-4, a local SSH connection is established between the host (SS

Pagina 581

64-16 # Specify the authentication type for user “client002” as publickey, and assign the public key “AC001” for the user. [AC] ssh user client002 se

Pagina 582 - Basic Concepts of NQA

64-17 Figure 64-6 Generate a client key pair (2) After the key pair is generated, click Save public key to save the key in a file by entering a fil

Pagina 583 - Configuring the NQA Server

64-18 Likewise, to save the private key, click Save private key. A warning window pops up to prompt you whether to save the private key without any p

Pagina 584 - Creating an NQA Test Group

64-19 Figure 64-10 SSH client configuration interface (2) From the window shown in Figure 64-10, click Open. The following SSH client interface app

Pagina 585

64-20 Configuration procedure 1) Configure the SSH server # Create an RSA and DSA key pair and enable the SSH server. <Switch> system-view [Sw

Pagina 586 - Configuring the FTP Test

64-21 [AC-pkey-key-code]B374E16DD00132CE71B020217091AC717B612391C76C1FB2E 88317C1BD8171D41ECB83E210C03CC9 [AC-pkey-key-code]B32E810561C21621C73D6DAAC

Pagina 587 - Configuring the HTTP Test

64-22 <Switch> system-view [Switch] public-key local create rsa [Switch] public-key local create dsa [Switch] ssh server enable # Configure an

Pagina 588

64-23 After generating a key pair on a client, you need to transmit the saved public key file to the server through FTP or TFTP and have the configu

Pagina 589 - Configuration prerequisites

65-1 65 SFTP Service When configuring SFTP, go to these sections for information you are interested in: z SFTP Overview z Configuring an SFTP Serv

Pagina 590 - Configuring the SNMP Test

7-8 Follow these steps to configure the Trunk-port-based VLAN: To do… Use the command… Remarks Enter system view system-view — Enter Ethernet port

Pagina 591 - Configuring the TCP Test

65-2 When the device functions as the SFTP server, only one client can access the SFTP server at a time. If the SFTP client uses WinSCP, a file on t

Pagina 592

65-3 To do… Use the command… Remarks Establish a connection to the remote IPv4 SFTP server and enter SFTP client view sftp server [ port-number ] [

Pagina 593 - Configuring the DLSw Test

65-4 Working with SFTP Files SFTP file operations include: z Changing the name of a file z Downloading a file z Uploading a file z Displaying a l

Pagina 594

65-5 To do… Use the command… Remarks Display a list of all commands or the help information of an SFTP client command help [ all | command-name ] R

Pagina 595 - Configuring Trap Delivery

65-6 # Configure an IP address for VLAN interface 1, which the SSH client uses as the destination for SSH connection. [Switch] interface Vlan-interfa

Pagina 596 - Scheduling an NQA Test Group

65-7 # Display files under the current directory of the server, delete the file named “z”, and check if the file is deleted successfully. sftp-client

Pagina 597 - NQA Configuration Examples

65-8 Uploading file successfully ended sftp-client> dir -rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg -rwxrwxrwx 1 noone

Pagina 598

66-1 66 SSL Configuration When configuring SSL, go to these sections for information you are interested in: z SSL Overview z SSL Configuration Tas

Pagina 599

66-2 algorithm, and master key. An SSL session can be used to establish multiple connections, reducing session negotiation cost. z SSL change cipher

Pagina 600

66-3 To do... Use the command... Remarks Configure the SSL connection close mode close-mode wait Optional Not wait by default Set the maximum numbe

Pagina 601

7-9 To do… Use the command… Remarks Enter system view system-view — Enter Ethernet port view interface interface-type interface-number Enter Ethern

Pagina 602

66-4 Configuration procedure 1) Request a certificate for AC # Create a PKI entity named en and configure it. <Sysname> system-view [Sysname]

Pagina 603

66-5 z For details about PKI configuration commands, refer to PKI in H3C WX6103 Access Controller Switch Interface Board Command Reference. z For

Pagina 604

66-6 Displaying and Maintaining SSL To do... Use the command... Remarks Display SSL server policy information display ssl server-policy { policy-n

Pagina 605

67-1 67 HTTPS Configuration When configuring HTTPS, go to these sections for information you are interested in: z HTTPS Overview z HTTPS Configura

Pagina 606 - 64 SSH Configuration

67-2 Follow these steps to associate the HTTPS service with an SSL server policy: To do… Use the command… Remarks Enter system view system-view —

Pagina 607 - SSH Operating Process

67-3 Associating the HTTPS Service with a Certificate Attribute Access Control Policy Associating the HTTPS service with a configured certificate acc

Pagina 608 - Authentication

67-4 Displaying and Maintaining HTTPS To do… Use the command… Remarks Display information about HTTPS display ip https Available in any view HTTPS

Pagina 609 - Interactive session

67-5 [AC-pki-domain-1] certificate request entity en [AC-pki-domain-1] quit # Generate a key pair locally by using the RSA algorithm. [AC] public-key

Pagina 610 - Enabling SSH Server

68-1 68 PKI Configuration When configuring PKI, go to these sections for information you are interested in: z Introduction to PKI z PKI Configura

Pagina 611 - Configuring RSA and DSA Keys

68-2 the name of the CA and the sequence number of the certificate. A digital certificate must comply with the international standard of ITUTX.5.9. T

Pagina 612

7-10 The ways to create MAC address-based VLANs A MAC address-based VLAN can be created in one of the following two ways. z Static configuration (th

Pagina 613 - Configuring an SSH User

68-3 CA A CA is a trusted entity responsible for issuing and managing digital certificates. A CA issues certificates, specifies the validity period o

Pagina 614

68-4 4) The RA receives the certificate from the CA, sends it to the LDAP server to provide directory navigation service, and notifies the entity th

Pagina 615

68-5 The configuration of an entity DN must comply with the CA certificate issue policy. You need to determine, for example, which entity DN paramet

Pagina 616

68-6 A PKI domain is defined by these parameters: z Trusted CA An entity requests a certificate from a trusted CA. z Entity A certificate applican

Pagina 617

68-7 To do… Use the command… Remarks Configure the polling interval and maximum number of attempts for querying the certificate request status cert

Pagina 618

68-8 Generating an RSA key pair is an important step in certificate request. The key pair includes a public key and a private key. The private key is

Pagina 619

68-9 Retrieving a Certificate Manually You can download an existing CA certificate or local certificate from the CA server and save it locally. To do

Pagina 620

68-10 To do… Use the command… Remarks Set the CRL update period crl update-period hours Optional By default, the CRL update period depends on the n

Pagina 621

68-11 To do… Use the command… Remarks Enter system view system-view — Destroy a local RSA key pair public-key local destroy rsa Required For deta

Pagina 622

68-12 A certificate attribute group must exist to be associated with a rule. Displaying and Maintaining PKI To do… Use the command… Remarks Displ

Pagina 623

7-11 Displaying and Maintaining VLAN To do... Use the command… Remarks Display the information about specific VLANs display vlan [ vlan-id1 [ to vl

Pagina 624

68-13 Network diagram Figure 68-2 Diagram for configuring a PKI entity to request a certificate from a CA Configuration procedure On the CA server,

Pagina 625

68-14 [AC-pki-domain-torsa] certificate request from ca # Specify the entity for certificate request as aaa. [AC-pki-domain-torsa] certificate reques

Pagina 626

68-15 Signature Algorithm: sha1WithRSAEncryption Issuer: C=cn O=org OU=test CN=myca

Pagina 627

68-16 Networking diagram Figure 68-3 Diagram for configuring a certificate attribute-based access control policy Configuration procedure z For d

Pagina 628

68-17 3) Configure the certificate attribute-based access control policy # Create the certificate attribute-based access control policy of myacp and

Pagina 629 - 65 SFTP Service

68-18 z The current key pair has been bound to a certificate. z No trusted CA is specified. z The URL of the enrollment server for certificate req

Pagina 630 - Configuring an SFTP Client

69-1 69 Track Configuration The term switch in this document refers to a switch in a generic sense or an access controller configured with the swi

Pagina 631

69-2 The Track module works between the application modules and the detection modules and is mainly used to obscure the difference of various detecti

Pagina 632 - Displaying Help Information

69-3 To do… Use the command… Remarks Enter system view system-view — Create a Track object and associate it with the specified Reaction entry of th

Pagina 633 - SFTP Configuration Example

69-4 z For the configuration of Track-Static Routing collaboration, the specified static route can be an existent or nonexistent one. For an existe

Pagina 634

7-12 # Configure packets from VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 to pass through GigabitEthernet 0/0/1. [AC-GigabitEthernet0/0/1] port trun

Pagina 635

69-5 Configuration procedure 1) Configure the IP address of each interface as shown in Figure 69-2. 2) Configure a static route on AC A and associa

Pagina 636

69-6 The output information above indicates the NQA test result, that is, the next hop 10.2.1.1 is reachable (the status of the Track object is Posit

Pagina 637 - 66 SSL Configuration

70-1 70 Index A Aggregation Port Group 16-5 Applying a QoS Policy to VLANs 48-1 Approaches to Link Aggregation 16-2 ARP Overview 33-1 Associating t

Pagina 638 - SSL Configuration Task List

70-2 Configuring DHCP Snooping Basic Functions 38-4 Configuring DHCP Snooping to Support Option 82 38-4 Configuring Digest Snooping 20-33 Configuring

Pagina 639

70-3 Controlling Telnet Users 6-1 Copying an IPv4 ACL 41-7 Copying an IPv6 ACL 42-4 Creating a Time Range 42-1 Creating a Time Range 41-1 Creating

Pagina 640

70-4 Displaying and Maintaining Static Routes 23-4 Displaying and Maintaining the DHCP Client 37-2 Displaying and Maintaining the TFTP Client 58-3 Di

Pagina 641

70-5 Introduction to QinQ 12-1 Introduction to UDP Helper 51-1 Introduction to VLAN 7-1 Introduction to Voice VLAN 8-1 Introduction 2-1 Introduction

Pagina 642 - Troubleshooting SSL

70-6 Port Security Configuration Examples 19-10 Port Security Configuration Task List 19-3 Port-Based VLAN Configuration 7-5 Priority Mapping Overvie

Pagina 643 - 67 HTTPS Configuration

70-7 Troubleshooting 26-6 Troubleshooting 27-14 U UDP Helper Configuration Example 51-2 V VLAN Configuration Example 7-11 Voice VLAN Configuration Ex

Pagina 644 - Enabling the HTTPS Service

7-13 z The port permits packets of VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 (VLAN permitted: 2, 6-50, 100). So the configuration is successful.

Pagina 645 - Control Policy

8-1 8 Voice VLAN Configuration When configuring Voice VLAN, go to these sections for information you are interested in: z Introduction to Voice VLA

Pagina 646 - HTTPS Configuration Example

ii Prerequisites····································································································································6

Pagina 647

8-2 Voice VLAN Modes on a Port There are two voice VLAN modes on a port: automatic and manual (the mode here refers to the way of adding a port to a

Pagina 648 - 68 PKI Configuration

8-3 If the voice traffic sent by an IP phone is tagged and that the access port has 802.1x authentication and Guest VLAN enabled, assign different V

Pagina 649 - Architecture of PKI

8-4 Configuring Voice VLAN Mode on a Port to Automatic Mode Follow these steps to set the port voice VLAN mode to automatic: To do... Use the comman

Pagina 650 - Operation of PKI

8-5 To do... Use the command... Remarks Enable the voice VLAN feature globally voice vlan vlan-id enable Required Enter Ethernet port view interfa

Pagina 651 - Configuring an Entity DN

8-6 z The voice traffic sent by the IP phones is tagged. Configure GigabitEthernet 0/0/1 as a Hybrid port and as the access port, with VLAN 6 as the

Pagina 652 - Configuring a PKI Domain

8-7 Verification # Display information about the OUI addresses, OUI address masks, and descriptive strings. <AC> display voice vlan oui Oui Add

Pagina 653

8-8 Network diagram Figure 8-2 Network diagram for manual voice VLAN mode configuration Configuration procedure # Configure the voice VLAN to work

Pagina 654

8-9 00e0-7500-0000 ffff-ff00-0000 Polycom phone 00e0-bb00-0000 ffff-ff00-0000 3com phone # Display the current voice VLAN state. <AC> displ

Pagina 655

9-1 9 GVRP Configuration GARP VLAN Registration Protocol (GVRP) is a GARP application. It functions based on the operating mechanism of GARP to main

Pagina 656

9-2 2) GARP timers The interval of sending of GARP messages is controlled by the following four timers: z Hold timer –– A GARP participant usually

Pagina 657

iii GVRP Configuration Example III·····································································································9-9 10 IP Addr

Pagina 658 - Deleting a Certificate

9-3 Figure 9-1 GARP message format Table 9-1 describes the GARP message fields. Table 9-1 Description on the GARP message fields Field Descriptio

Pagina 659 - PKI Configuration Examples

9-4 GVRP GVRP enables a device to propagate local VLAN registration information to other participant devices and dynamically update the VLAN registr

Pagina 660

9-5 Configuring GVRP Enabling GVRP Follow these steps to enable GVRP on a trunk port: To do… Use the command… Remarks Enter system view system-vie

Pagina 661

9-6 z The setting of each timer must be a multiple of five (in centiseconds). z The settings of the timers are correlated. If you fail to set a ti

Pagina 662

9-7 Configuration procedure 1) Configure AC # Enable GVRP globally. <AC> system-view [AC] gvrp # Configure port GigabitEthernet 0/0/1 as a Tru

Pagina 663 - Networking diagram

9-8 GVRP Configuration Example II Network requirements Configure GVRP for dynamic VLAN information registration and update among devices. Specify fix

Pagina 664 - Troubleshooting PKI

9-9 [Device] display vlan dynamic Now, the following dynamic VLAN exist(s): 2 Device in this configuration example refers to a device that suppo

Pagina 665 - Failed to Retrieve CRLs

9-10 # Enable GVRP on GigabitEthernet 0/0/1. [Device-GigabitEthernet0/0/1] gvrp [Device-GigabitEthernet0/0/1] quit # Create VLAN 3 (a static VLAN).

Pagina 666 - 69 Track Configuration

10-1 10 IP Addressing Configuration When assigning IP addresses to interfaces on your device, go to these sections for information you are intereste

Pagina 667 - Detection Modules

10-2 Figure 10-1 IP address classes Table 10-1 describes the address ranges of these five classes. Currently, the first three classes of IP address

Pagina 668 - Application Modules

iv Configuring the Broadcast/Multicast/Unknown Unicast Storm Suppression Ratio for an Ethernet Port··················································

Pagina 669 - Track Configuration Example

10-3 combination of net-id and subnet-id, masking is used. (When subnetting is not adopted, a mask identifies the boundary between the host-id and th

Pagina 670

10-4 z Assigning an IP Address to an Interface z IP Addressing Configuration Example Assigning an IP Address to an Interface You may assign an inte

Pagina 671

10-5 Network diagram Figure 10-3 Network diagram for IP addressing configuration GE0/0/1172.16.1.1/24172.16.2.1/24 sub172.16.1.0/24172.16.1.2/24172.

Pagina 672 - 70 Index

10-6 Reply from 172.16.2.2: bytes=56 Sequence=1 ttl=255 time=25 ms Reply from 172.16.2.2: bytes=56 Sequence=2 ttl=255 time=26 ms Reply fr

Pagina 673

11-1 11 IP Performance Configuration When configuring IP performance, go to these sections for information you are interested in: z IP Performance

Pagina 674

11-2 Follow these steps to enable the device to receive directed broadcasts: To do… Use the command… Remarks Enter system view system-view — Enable

Pagina 675

11-3 # Enable AC to receive directed broadcasts. <AC> system-view [AC] ip forward-broadcast # Configure IP addresses for VLAN-interface 3 and V

Pagina 676

11-4 To do… Use the command… Remarks Configure TCP finwait timer’s timeout value tcp timer fin-timeout time-value Optional By default, the timeout

Pagina 677

11-5 If the device receives an IP packet with the destination unreachable, it will drop the packet and send an ICMP destination unreachable error pac

Pagina 678

11-6 z The device stops sending “network unreachable” and “source route failure” ICMP error packets after sending ICMP destination unreachable pack

Comentarios a estos manuales

Sin comentarios