Qtech QSW-3400-10T-AC [353/465] Tacacs troubleshooting
![Qtech QSW-3400-28T-AC [353/465] Tacacs troubleshooting](/views2/1596547/page353/bg161.png)
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
352
Switch(config)#authentication line vty login tacacs
44.4 TACACS+ Troubleshooting
In configuring and using TACACS+, the TACACS+ may fail to authentication due to reasons
such as physical connection failure or wrong configurations. The user should ensure the
following:
First good condition of the TACACS+ server physical connection.
Second all interface and link protocols are in the UP state (use “show interface”
command).
Then ensure the TACACS+ key configured on the switch is in accordance with the one
configured on TACACS+ server.
Finally ensure to connect to the correct TACACS+ server.
Содержание
- Configuration manual 1
- Configuration manual for qsw 3400 1
- Qsw 3400 series 1
- Chapter 1 switch management 16 2
- Chapter 2 basic switch configuration 33 2
- Chapter 3 file system operations 60 2
- Content 2
- Content 1 2
- Chapter 4 cluster configuration 63 3
- Chapter 5 port configuration 68 3
- Chapter 6 port isolation function configuration 73 3
- Chapter 7 port loopback detection function configuration 75 3
- Chapter 8 uldp function configuration 79 3
- Chapter 9 lldp function operation configuration 86 3
- Chapter 10 port channel configuration 92 4
- Chapter 11 mtu configuration 100 4
- Chapter 12 efm oam configuration 101 4
- Chapter 13 port security 108 4
- Chapter 14 ddm configuration 111 4
- Chapter 15 lldp med 120 4
- Chapter 16 bpdu tunnel configuration 126 4
- Chapter 17 eee energy saving configuration 130 5
- Chapter 18 vlan configuration 131 5
- Chapter 19 mac table configuration 161 6
- Chapter 20 mstp configuration 171 6
- Chapter 21 qos configuration 183 7
- Chapter 22 flow based redirection 196 7
- Chapter 23 flexible qinq configuration 198 7
- Chapter 24 layer 3 management configuration 203 7
- Chapter 25 arp scanning prevention function configuration 211 8
- Chapter 26 prevent arp spoofing configuration 215 8
- Chapter 27 arp guard configuration 219 8
- Chapter 28 gratuitous arp configuration 221 8
- Chapter 29 dhcp configuration 224 8
- Chapter 30 dhcpv6 configuration 234 8
- Chapter 31 dhcp option 82 configuration 243 9
- Chapter 32 dhcp option 60 and option 43 251 9
- Chapter 33 dhcpv6 option37 38 253 9
- Chapter 34 dhcp snooping configuration 263 9
- Chapter 35 dhcp snooping option 82 configuration 271 9
- Chapter 36 ipv4 multicast protocol 276 10
- Chapter 37 ipv6 multicast protocol 289 10
- Chapter 38 multicast vlan 295 10
- Chapter 39 acl configuration 299 10
- Chapter 40 802 x configuration 319 10
- Chapter 41 the number limitation function of mac and ip in port vlan configuration 340 11
- Chapter 42 operational configuration of am function 345 11
- Chapter 43 security feature configuration 348 11
- Chapter 44 tacacs configuration 350 11
- Chapter 45 radius configuration 353 12
- Chapter 46 ssl configuration 360 12
- Chapter 47 ipv6 security ra configuration 365 12
- Chapter 48 mab configuration 368 12
- Chapter 49 pppoe intermediate agent configuration 373 12
- Chapter 50 web portal configuration 381 13
- Chapter 51 vlan acl configuration 385 13
- Chapter 52 savi configuration 389 13
- Chapter 53 mrpp configuration 396 13
- Chapter 54 ulpp configuration 404 13
- Chapter 55 ulsm configuration 413 13
- Chapter 56 mirror configuration 417 14
- Chapter 57 sflow configuration 420 14
- Chapter 58 rspan configuration 424 14
- Chapter 59 erspan 431 14
- Chapter 60 sntp configuration 435 14
- Chapter 61 ntp function configuration 437 14
- Chapter 62 summer time configuration 442 14
- Chapter 63 dnsv4 v6 configuration 444 15
- Chapter 64 monitor and debug 450 15
- Chapter 65 reload switch after specified time 457 15
- Chapter 66 debugging and diagnosis for packets received and sent by cpu 458 15
- Chapter 67 dying gasp configuration 459 15
- Chapter 68 poe configuration 460 15
- Chapter 1 switch management 17
- Management options 17
- Out of band management 17
- Click start menu all programs accessories communication hyperterminal 18
- Open the hyperterminal included in windows after the connection established the example below is based on the hyperterminal included in windows xp 18
- In the connecting using drop list select the rs 232 serial port used by the pc e g com1 and click ok 19
- Type a name for opening hyperterminal such as switch 19
- Com1 property appears select 9600 for baud rate 8 for data bits none for parity checksum 1 for stop bit and none for traffic control or you can also click restore default and click ok 20
- Opening hyperterminal 20
- In band management 21
- Management via telnet 22
- Management via http 24
- Cli interface 27
- Manage the switch via snmp network management software 27
- Configuration modes 28
- User mode 28
- Admin mode 29
- Global mode 29
- Interface mode 29
- Acl mode 30
- Configuration syntax 30
- Dhcp address pool mode 30
- Vlan mode 30
- Help function 31
- Shortcut key support 31
- Fuzzy match support 32
- Input verification 32
- Returned information success 32
- Basic configuration 34
- Chapter 2 basic switch configuration 34
- Introduction to telnet 35
- Telnet 35
- Telnet configuration task list 35
- Telnet management 35
- Introduction to ssh 37
- Ssh server configuration task list 37
- Configure switch ip addresses 38
- Example of ssh server configuration 38
- Switch ip addresses configuration task list 39
- Introduction to snmp 40
- Snmp configuration 40
- Introduction to mib 41
- Introduction to rmon 42
- Snmp configuration 43
- Snmp configuration task list 43
- Typical snmp configuration examples 46
- Snmp troubleshooting 47
- Switch system files 48
- Switch upgrade 48
- Bootrom upgrade 49
- Ftp tftp upgrade 51
- Introduction to ftp tftp 51
- Ftp tftp configuration 53
- Ftp tftp configuration task list 53
- Ftp tftp configuration examples 55
- Ftp tftp troubleshooting 58
- Ftp troubleshooting 58
- Through tftp fails please try upgrade again or use the bootrom mode to upgrade 60
- Chapter 3 file system operations 61
- File system operation configuration task list 61
- Introduction to file storage devices 61
- Troubleshooting 63
- Typical applications 63
- Chapter 4 cluster configuration 64
- Cluster network management configuration sequence 64
- Introduction to cluster network management 64
- Examples of cluster administration 67
- Cluster administration troubleshooting 68
- Chapter 5 port configuration 69
- Introduction to port 69
- Network port configuration task list 69
- Port configuration example 72
- Port troubleshooting 73
- Chapter 6 port isolation function configuration 74
- Introduction to port isolation function 74
- Task sequence of port isolation 74
- Port isolation function typical examples 75
- Chapter 7 port loopback detection function 76
- Configuration 76
- Introduction to port loopback detection function 76
- Port loopback detection function configuration task list 76
- Port loopback detection function example 78
- Port loopback detection troubleshooting 79
- Chapter 8 uldp function configuration 80
- Introduction to uldp function 80
- Uldp configuration task sequence 81
- Uldp function typical examples 84
- Uldp troubleshooting 85
- Chapter 9 lldp function operation 87
- Configuration 87
- Introduction to lldp function 87
- Lldp function configuration task sequence 88
- Lldp function typical example 91
- Lldp function troubleshooting 92
- Chapter 10 port channel configuration 93
- Introduction to port channel 93
- Brief introduction to lacp 94
- Dynamic lacp aggregation 95
- Port channel configuration task list 95
- Static lacp aggregation 95
- Port channel examples 97
- Port channel troubleshooting 99
- Chapter 11 mtu configuration 101
- Introduction to mtu 101
- Mtu configuration task sequence 101
- Chapter 12 efm oam configuration 102
- Introduction to efm oam 102
- Efm oam configuration 105
- Efm oam example 107
- Efm oam troubleshooting 108
- Chapter 13 port security 109
- Introduction to port security 109
- Port security configuration task list 109
- Example of port security 110
- Port security troubleshooting 111
- Brief introduction to ddm 112
- Chapter 14 ddm configuration 112
- Introduction to ddm 112
- Ddm function 113
- Ddm configuration task list 114
- Examples of ddm 115
- Ddm troubleshooting 120
- Chapter 15 lldp med 121
- Introduction to lldp med 121
- Lldp med configuration task sequence 121
- Lldp med example 123
- Lldp med troubleshooting 126
- Background of bpdu tunnel 127
- Bpdu tunnel function 127
- Chapter 16 bpdu tunnel configuration 127
- Introduction to bpdu tunnel 127
- Bpdu tunnel configuration task list 128
- Examples of bpdu tunnel 128
- After port disables stp gvrp uldp lacp and dot1x functions it is able to configure bpdu tunnel function 130
- Bpdu tunnel troubleshooting 130
- Chapter 17 eee energy saving configuration 131
- Eee energy saving configuration list 131
- Eee energy saving typical examples 131
- Introduction to eee energy saving 131
- Chapter 18 vlan configuration 132
- Introduction to vlan 132
- Vlan configuration 132
- Vlan configuration task list 133
- Typical vlan application 136
- Typical application of hybrid port 137
- Dot1q tunnel configuration 139
- Introduction to dot1q tunnel 139
- Dot1q tunnel configuration 141
- Typical applications of the dot1q tunnel 141
- Dot1q tunnel troubleshooting 142
- Introduction to selective qinq 142
- Selective qinq configuration 142
- Selective qinq configuration 143
- Typical applications of selective qinq 143
- Introduction to vlan translation 145
- Selective qinq troubleshooting 145
- Vlan translation configuration 145
- Vlan translation configuration 146
- Configuration item configuration explanation 147
- Configuration procedure is as follows pe1 pe2 switch config interface ethernet 1 1 switch config ethernet1 1 switchport mode trunk switch config ethernet1 1 vlan translation enable switch config ethernet1 1 vlan translation 20 to 3 in switch config ethernet1 1 vlan translation 3 to 20 out switch config ethernet1 1 exit switch config interface ethernet 1 10 147
- Scenario edge switch pe1 and pe2 of the isp internet support the vlan20 data task between ce1 and ce2 of the client network with vlan3 the port1 1 of pe1 is connected to ce1 port1 10 is connected to public network port1 1 of pe2 is connected to ce2 port1 10 is connected to public network 147
- Switch config ethernet1 10 switchport mode trunk switch config ethernet1 10 exit 147
- Translation 147
- Trunk port port1 1 and port1 10 of pe1 and pe2 147
- Typical application of vlan translation 147
- Vlan translation port1 1 of pe1 and pe2 147
- Vlan translation topology mode 147
- Introduction to multi to one vlan translation 148
- Multi to one vlan translation configuration 148
- Vlan translation troubleshooting 148
- Typical application of multi to one vlan translation 149
- Dynamic vlan configuration 150
- Introduction to dynamic vlan 150
- Multi to one vlan translation troubleshooting 150
- Dynamic vlan configuration 151
- Typical application of the dynamic vlan 153
- Dynamic vlan troubleshooting 154
- Gvrp configuration 154
- Introduction to gvrp 154
- Gvrp configuration task list 155
- Example of gvrp 156
- Gvrp troubleshooting 158
- Introduction to voice vlan 158
- Voice vlan configuration 158
- Typical applications of the voice vlan 159
- Voice vlan configuration 159
- Voice vlan troubleshooting 161
- Chapter 19 mac table configuration 162
- Introduction to mac table 162
- Obtaining mac table 162
- Forward or filter 163
- Mac address table configuration task list 164
- Mac table troubleshooting 166
- Typical configuration examples 166
- Introduction to mac address binding 167
- Mac address binding 167
- Mac address binding configuration task list 167
- Mac address function extension 167
- Binding mac address binding troubleshooting 169
- Introduction to mac notification 169
- Mac notification configuration 169
- Mac notification example 171
- Mac notification troubleshooting 171
- Chapter 20 mstp configuration 172
- Introduction to mstp 172
- Mstp region 172
- Operations between mst regions 173
- Operations within an mstp region 173
- Mstp configuration task list 174
- Mstp load balance 174
- Port roles 174
- Mstp example 178
- Mstp troubleshooting 183
- Chapter 21 qos configuration 184
- Introduction to qos 184
- Qos terms 184
- Qos implementation 185
- Basic qos model 186
- Qos configuration task list 189
- Qos example 194
- Qos troubleshooting 196
- Chapter 22 flow based redirection 197
- Flow based redirection configuration task sequence 197
- Introduction to flow based redirection 197
- Flow based redirection examples 198
- Flow based redirection troubleshooting help 198
- Basic qinq 199
- Chapter 23 flexible qinq configuration 199
- Flexible qinq 199
- Flexible qinq configuration task list 199
- Introduction to flexible qinq 199
- Qinq technique 199
- 7 495 797 3311 www qtech ru москва новозаводская ул 18 стр 1 201
- Admin mode 201
- As shown in the figure the first user is assigned three dscps that the values are 10 20 30 respectively in dslam1 dscp10 corresponds to broad band network dscp20 corresponds 201
- Command explanation 201
- Flexible qinq application topology 201
- Flexible qinq example 201
- Show flexible qinq configuration on the port 201
- Show flexible qinq policy map bound to port 201
- The configuration in the following 201
- To voip dscp30 corresponds to vod after the downlink port enables flexible qinq function the packets will be packed with different external tags according to dscp of users dscp10 will be packed an external tag 1001 this tag is unique in public network enter broad band network dscp10 and classfied to bras device dscp20 or dscp30 will be packed an external vlan tag 2001 or 3001 and classfied to sr device according to the flow rules the second user can be assigned different dscps in dslam2 notice the assigned dscp of the second user may be same with the first user and the dscp value will be also packed an external tag in the above figure the external tag of the second user is different to the first user for distinguishing dslam location and locating the user finally 201
- Flexible qinq troubleshooting 203
- Chapter 24 layer 3 management configuration 204
- Introduction to layer 3 management interface 204
- Layer 3 interface configuration task list 204
- Layer 3 management interface 204
- Introduction to ipv4 ipv6 205
- Ip configuration 205
- Ip configuration 207
- Ipv4 address configuration 207
- Ipv6 address configuration 207
- Introduction to default route 209
- Introduction to static route 209
- Ipv6 troubleshooting 209
- Static route 209
- Static route configuration examples 210
- Static route configuration task list 210
- Arp configuration task list 211
- Arp troubleshooting 211
- Introduction to arp 211
- Arp scanning prevention configuration task sequence 212
- Chapter 25 arp scanning prevention function 212
- Configuration 212
- Introduction to arp scanning prevention function 212
- Arp scanning prevention typical examples 214
- Arp scanning prevention troubleshooting help 215
- Arp address resolution protocol 216
- Arp spoofing 216
- Chapter 26 prevent arp spoofing 216
- Configuration 216
- How to prevent void arp spoofing 216
- Overview 216
- Prevent arp spoofing configuration 217
- Prevent arp spoofing example 218
- Chapter 27 arp guard configuration 220
- Introduction to arp guard 220
- Arp guard configuration task list 221
- Chapter 28 gratuitous arp configuration 222
- Gratuitous arp configuration task list 222
- Introduction to gratuitous arp 222
- Gratuitous arp configuration example 223
- Gratuitous arp troubleshooting 223
- Configuration can only be disabled in interface configuration mode if gratuitous arp is enabled in both global and interface configuration mode and the sending interval of gratuitous arp is configured in both configuration modes the switch takes the value which is configured in interface configuration mode 224
- Chapter 29 dhcp configuration 225
- Introduction to dhcp 225
- Dhcp server configuration 226
- Dhcp relay configuration 228
- Dhcp configuration examples 230
- Dhcp troubleshooting 233
- Chapter 30 dhcpv6 configuration 235
- Introduction to dhcpv6 235
- Dhcpv6 server configuration 236
- Dhcpv6 prefix delegation server configuration 238
- Dhcpv6 relay delegation configuration 238
- Dhcpv6 prefix delegation client configuration 240
- Dhcpv6 configuration examples 241
- Dhcpv6 troubleshooting 243
- Chapter 31 dhcp option 82 configuration 244
- Dhcp option 82 message structure 244
- Introduction to dhcp option 82 244
- Option 82 working mechanism 245
- Dhcp option 82 configuration task list 246
- Dhcp option 82 application examples 249
- Dhcp option 82 troubleshooting 251
- Chapter 32 dhcp option 60 and option 43 252
- Dhcp option 60 and option 43 troubleshooting 253
- Dhcpv6 option 60 and option 43 example 253
- Chapter 33 dhcpv6 option37 38 254
- Dhcpv6 option37 38 configuration task list 254
- Introduction to dhcpv6 option37 38 254
- Dhcpv6 option37 38 examples 260
- Dhcpv6 snooping option37 38 example 260
- Dhcpv6 relay option37 38 example 262
- Dhcpv6 option37 38 troubleshooting 263
- Chapter 34 dhcp snooping configuration 264
- Introduction to dhcp snooping 264
- Dhcp snooping configuration task sequence 265
- Dhcp snooping troubleshooting help 270
- Monitor and debug information 270
- Dhcp snooping troubleshooting help 271
- Chapter 35 dhcp snooping option 82 272
- Configuration 272
- Introduction to dhcp snooping option 82 272
- Dhcp snooping option 82 working mechanism 273
- Dhcp snooping option 82 configuration task list 274
- Dhcp snooping option 82 application examples 275
- Dhcp snooping option 82 troubleshooting 276
- Chapter 36 ipv4 multicast protocol 277
- Introduction to multicast 277
- Ipv4 multicast protocol overview 277
- Multicast address 277
- Ip multicast application 279
- Ip multicast packet transmission 279
- Dcscm configuration task list 280
- Introduction to dcscm 280
- Dcscm configuration examples 283
- Dcscm troubleshooting 284
- Igmp snooping 284
- Introduction to igmp snooping 284
- Igmp snooping configuration task list 285
- Igmp snooping examples 287
- Igmp snooping troubleshooting 289
- Chapter 37 ipv6 multicast protocol 290
- Introduction to mld snooping 290
- Mld snooping 290
- Mld snooping configuration task 290
- Mld snooping examples 292
- Mld snooping troubleshooting 295
- Chapter 38 multicast vlan 296
- Introductions to multicast vlan 296
- Multicast vlan configuration task list 296
- Multicast vlan examples 297
- Is using with mld snooping so does not give an example 299
- Access group 300
- Access list 300
- Access list action and global default action 300
- Chapter 39 acl configuration 300
- Introduction to acl 300
- Acl configuration task list 301
- Acl example 314
- Acl troubleshooting 318
- Chapter 40 802 x configuration 320
- Introduction to 802 x 320
- The authentication structure of 802 x 320
- The work mechanism of 802 x 322
- The encapsulation of eapol messages 323
- The authentication methods of 802 x 325
- The encapsulation of eap attributes 325
- Eap relay mode 326
- Eap termination mode 329
- The extension and optimization of 802 x 330
- The features of vlan allocation 331
- 802 x configuration task list 332
- 802 x application example 335
- Examples of guest vlan applications 335
- Examples of ipv4 radius applications 338
- Examples of ipv6 radius application 339
- 802 x troubleshooting 340
- Chapter 41 the number limitation function of 341
- Introduction to the number limitation function of mac and ip in port vlan 341
- Mac and ip in port vlan configuration 341
- The number limitation function of mac and ip in port vlan configuration task sequence 342
- The number limitation function of mac and ip in port vlan typical examples 344
- The number limitation function of mac and ip in port vlan troubleshooting help 345
- Am function configuration task list 346
- Chapter 42 operational configuration of am 346
- Function 346
- Introduction to am function 346
- Am function example 348
- Am function troubleshooting 348
- Chapter 43 security feature configuration 349
- Introduction to security feature 349
- Prevent icmp fragment attack function configuration task sequence 349
- Prevent ip spoofing function configuration task sequence 349
- Security feature configuration 349
- Chapter 44 tacacs configuration 351
- Introduction to tacacs 351
- Tacacs configuration task list 351
- Tacacs scenarios typical examples 352
- Tacacs troubleshooting 353
- Aaa and radius introduction 354
- Chapter 45 radius configuration 354
- Introduction to radius 354
- Message structure for radius 354
- Radius configuration task list 356
- Ipv4 radius example 358
- Radius typical examples 358
- Ipv6 radiusexample 359
- Radius troubleshooting 359
- Basic element of ssl 361
- Chapter 46 ssl configuration 361
- Introduction to ssl 361
- Ssl configuration task list 362
- Ssl typical example 363
- Ssl troubleshooting 364
- Debugging command and copy the debug message within 3 minutes send the recorded message to technical server center of our company 365
- If the ssl problems remain unsolved after above try please use debug ssl and other 365
- Chapter 47 ipv6 security ra configuration 366
- Introduction to ipv6 security ra 366
- Ipv6 security ra configuration task sequence 366
- Ipv6 security ra troubleshooting help 367
- Ipv6 security ra typical examples 367
- Check if there are rules conflicting with security ra function configured on the switch 368
- This kind of rules will cause ra messages to be forwarded 368
- Chapter 48 mab configuration 369
- Introduction to mab 369
- Mab configuration task list 369
- Mab example 371
- Switch1 371
- Switch2 371
- Mab troubleshooting 373
- Brief introduction to pppoe 374
- Chapter 49 pppoe intermediate agent 374
- Configuration 374
- Introduction to pppoe ia 374
- Introduction to pppoe intermediate agent 374
- Pppoe intermediate agent exchange process 375
- Pppoe packet format 376
- Pppoe intermediate agent vendor tag frame 377
- Pppoe intermediate agent configuration task list 378
- Trust port of pppoe intermediate agent 378
- Pppoe intermediate agent typical application 379
- Pppoe intermediate agent troubleshooting 381
- Chapter 50 web portal configuration 382
- Introduction to web portal authentication 382
- Web portal authentication configuration task list 382
- Admin mode 384
- Command explanation 384
- Delete the binding information of web portal authentication 384
- In the above figure pc1 is end user there is http browser in it but no 802 x authentication client pc1 wants to access the network through web portal authentication switch1 is the accessing device it configures accounting server s address and port as 384
- Radius server s ip and port and enable the accounting function ethernet 1 2 connects to pc1 the port enables web portal authentication and configure the redirection address and port 384
- Web portal authentication typical example 384
- Web portal typical application scene 384
- Web portal authentication troubleshooting 385
- Chapter 51 vlan acl configuration 386
- Introduction to vlan acl 386
- Vlan acl configuration task list 386
- Vlan acl configuration example 387
- Vlan acl troubleshooting 389
- Chapter 52 savi configuration 390
- Introduction to savi 390
- Savi configuration 390
- Savi typical application 394
- Savi troubleshooting 395
- Chapter 53 mrpp configuration 397
- Conception introduction 397
- Introduction to mrpp 397
- Mrpp protocol packet types 398
- Mrpp protocol operation system 399
- Mrpp configuration task list 400
- Mrpp typical scenario 402
- Mrpp troubleshooting 404
- Chapter 54 ulpp configuration 405
- Introduction to ulpp 405
- Ulpp configuration task list 407
- Ulpp typical example1 409
- Ulpp typical examples 409
- Ulpp typical example2 411
- Ulpp troubleshooting 412
- Of 3 minutes and the configuration information send them to our technical service center 413
- Chapter 55 ulsm configuration 414
- Introduction to ulsm 414
- Ulsm configuration task list 415
- Ulsm typical example 416
- Ulsm troubleshooting 417
- Chapter 56 mirror configuration 418
- Introduction to mirror 418
- Mirror configuration task list 418
- Mirror examples 419
- Device mirror troubleshooting 420
- Chapter 57 sflow configuration 421
- Introduction to sflow 421
- Sflow configuration task list 421
- Sflow examples 423
- Sflow troubleshooting 424
- Chapter 58 rspan configuration 425
- Introduction to rspan 425
- Rspan configuration task list 427
- Typical examples of rspan 428
- Rspan troubleshooting 431
- Chapter 59 erspan 432
- Erspan configuration task list 432
- Introduction to erspan 432
- Typical examples of erspan 433
- Erspan troubleshooting 435
- Chapter 60 sntp configuration 436
- Introduction to sntp 436
- Typical examples of sntp configuration 437
- Chapter 61 ntp function configuration 438
- Introduction to ntp function 438
- Ntp function configuration task list 438
- Ntp function troubleshooting 441
- Typical examples of ntp function 441
- Send the recorded message to the technical service center 442
- Chapter 62 summer time configuration 443
- Examples of summer time 443
- Introduction to summer time 443
- Summer time configuration task sequence 443
- Summer time troubleshooting 444
- Chapter 63 dnsv4 v6 configuration 445
- Introduction to dns 445
- Dnsv4 v6 configuration task list 446
- Typical examples of dns 448
- Dns troubleshooting 449
- Chapter 64 monitor and debug 451
- Traceroute 451
- Traceroute6 452
- System log 453
- System log introduction 453
- Format and severity of the log information 454
- Log output channel 454
- System log configuration 456
- System log configuration example 457
- Chapter 65 reload switch after specified time 458
- Introduce to reload switch after specifid time 458
- Reload switch after specifid time task list 458
- Chapter 66 debugging and diagnosis for 459
- Debugging and diagnosis for packets received and sent by cpu task list 459
- Introduction to debugging and diagnosis for packets received and sent by cpu 459
- Packets received and sent by cpu 459
- Chapter 67 dying gasp configuration 460
- Dying gasp troubleshooting 460
- Dying gasp typical examples 460
- Introduction to dying gasp 460
- Chapter 68 poe configuration 461
- Introduction to poe 461
- Poe configuration 461
- Typical application of poe 463
- Poe troubleshooting help 464
Похожие устройства
- Qtech QSW-3400-10T-AC Руководство пользователя
- Qtech QSW-3400-28T-AC Инструкция по настройке
- Qtech QSW-3400-28T-AC Руководство пользователя
- Qtech QSW-3400-52T-AC Инструкция по настройке
- Qtech QSW-3400-52T-AC Руководство пользователя
- Qtech QSW-3400-28T-POE-AC Инструкция по настройке
- Qtech QSW-3400-28T-POE-AC Руководство пользователя
- Qtech QSW-3450-28TX-AC Руководство пользователя
- Qtech QSW-3450-28T-AC Руководство пользователя
- Qtech QSW-3450-52TX-AC Руководство пользователя
- Qtech QSW-3450-52T-POE-AC Руководство пользователя
- Qtech QSW-3450-28T-POE-AC Руководство пользователя
- Qtech QSW-8250-28F-AC-DC Руководство пользователя
- Qtech QSW-2910-09T-AC/DC Инструкция по установке
- Qtech QSW-2910-09T-AC/DC Руководство пользователя
- Qtech QSW-2910-09T-POE-AC/DC Инструкция по установке
- Qtech QSW-2910-09T-POE-AC/DC Руководство пользователя
- Qtech QSW-2910-10T-AC/DC Инструкция по установке
- Qtech QSW-2910-10T-AC/DC Руководство пользователя
- Qtech QSW-2910-10T-POE-AC/DC Инструкция по установке
Скачать
Случайные обсуждения