Q-Tech QSW-2800 Инструкция по эксплуатации онлайн [189/415] 56889
Содержание
- Chapter 1 switch management 1 1 1
- Chapter 2 basic switch configuration 2 15 1
- Chapter 3 cluster configuration 3 40 1
- Content 1
- Content 1 1
- Chapter 4 port configuration 4 45 2
- Chapter 5 port isolation function configuration 5 49 2
- Chapter 6 port loopback detection function configuration 6 2
- Chapter 7 uldp function configuration 7 55 2
- Chapter 8 lldp function operation configuration 8 62 2
- Chapter 9 port channel configuration 9 67 2
- Chapter 10 jumbo configuration 10 74 3
- Chapter 11 efm oam configuration 11 75 3
- Chapter 12 port security 12 83 3
- Chapter 13 ddm configuration 13 86 3
- Chapter 14 lldp med 14 94 3
- Chapter 15 bpdu tunnel configuration 15 100 3
- Chapter 16 vlan configuration 16 103 4
- Chapter 17 mac table configuration 17 128 5
- Chapter 18 mstp configuration 18 138 5
- Chapter 19 qos configuration 19 150 5
- Chapter 20 flow based redirection 20 162 5
- 23 176 6
- Chapter 21 flexible qinq configuration 21 164 6
- Chapter 22 layer 3 management configuration 22 169 6
- Chapter 23 arp scanning prevention function configuration 6
- Chapter 24 prevent arp spoofing configuration 24 180 6
- Chapter 25 arp guard configuration 25 184 7
- Chapter 26 gratuitous arp configuration 26 186 7
- Chapter 27 dhcp configuration 27 189 7
- Chapter 28 dhcpv6 configuration 28 199 7
- Chapter 29 dhcp option 82 configuration 29 208 7
- Chapter 30 dhcp option 60 and option 43 30 216 8
- Chapter 31 dhcpv6 option37 38 31 218 8
- Chapter 32 dhcp snooping configuration 32 227 8
- Chapter 33 dhcp snooping option 82 configuration 33 234 8
- Chapter 34 ipv4 multicast protocol 34 239 8
- Chapter 35 ipv6 multicast protocol 35 252 9
- Chapter 36 multicast vlan 36 258 9
- Chapter 37 acl configuration 37 262 9
- Chapter 38 802 x configuration 38 281 9
- Chapter 39 the number limitation function of mac in port 10
- Chapter 40 operational configuration of am function 40 305 10
- Chapter 41 security feature configuration 41 308 10
- Chapter 42 tacacs configuration 42 311 10
- Configuration 39 301 10
- Chapter 43 radius configuration 43 314 11
- Chapter 44 ssl configuration 44 321 11
- Chapter 45 ipv6 security ra configuration 45 325 11
- Chapter 46 mab configuration 46 328 11
- Chapter 47 pppoe intermediate agent configuration 47 333 11
- Chapter 48 web portal configuration 48 341 12
- Chapter 49 vlan acl configuration 49 345 12
- Chapter 50 savi configuration 50 349 12
- Chapter 51 mrpp configuration 51 355 12
- Chapter 52 ulpp configuration 52 363 12
- Chapter 53 ulsm configuration 53 371 12
- Chapter 54 mirror configuration 54 375 13
- Chapter 55 sflow configuration 55 378 13
- Chapter 56 sntp configuration 56 382 13
- Chapter 57 ntp function configuration 57 384 13
- Chapter 58 summer time configuration 58 389 13
- Chapter 59 monitor and debug 59 391 13
- And sent by cpu 61 399 14
- Chapter 60 reload switch after specified time 60 398 14
- Chapter 61 debugging and diagnosis for packets received 14
- Chapter 62 commands for basic switch configuration 62 401 14
- Chapter 1 switch management 15
- Management options 15
- Out of band management 15
- In band management 18
- Management via telnet 18
- Management via http 20
- Cli interface 22
- Manage the switch via snmp network management software 22
- Admin mode 23
- Configuration modes 23
- User mode 23
- Global mode 24
- Configuration syntax 25
- Help function 26
- Shortcut key support 26
- Fuzzy match support 27
- Input verification 27
- Returned information success 27
- Command error if only show r is entered as shell is unable to tell whether it is show run or 28
- Show running config therefore shell will only recognize the command if sh ru is entered 28
- Basic configuration 29
- Chapter 2 basic switch configuration 29
- Introduction to telnet 30
- Telnet 30
- Telnet configuration task list 30
- Telnet management 30
- Example of ssh server configuration 32
- Introduction to ssh 32
- Ssh server configuration task list 32
- Configure switch ip addresses 33
- Switch ip addresses configuration task list 33
- Introduction to snmp 35
- Snmp configuration 35
- Introduction to mib 36
- Introduction to rmon 37
- Snmp configuration 37
- Snmp configuration task list 37
- Typical snmp configuration examples 40
- Snmp troubleshooting 41
- Bootrom upgrade 42
- Switch system files 42
- Switch upgrade 42
- Ftp tftp upgrade 45
- Introduction to ftp tftp 45
- Ftp tftp configuration 47
- Ftp tftp configuration task list 47
- Ftp tftp configuration examples 49
- Ftp tftp troubleshooting 51
- Ftp troubleshooting 51
- Tftp troubleshooting 52
- Chapter 3 cluster configuration 54
- Cluster network management 54
- Configuration sequence 54
- Introduction to cluster network 54
- Management 54
- Administration 57
- Examples of cluster 57
- Cluster administration 58
- Troubleshooting 58
- Chapter 4 port configuration 59
- Introduction to port 59
- Network port configuration 59
- Task list 59
- Port configuration example 61
- Port troubleshooting 62
- Chapter 5 port isolation function configuration 63
- Function 63
- Introduction to port isolation 63
- Task sequence of port isolation 63
- Examples 64
- Port isolation function typical 64
- Chapter 6 port loopback detection function 65
- Configuration 65
- Detection function 65
- Introduction to port loopback 65
- Function configuration task list 66
- Port loopback detection 66
- Function example 67
- Port loopback detection 67
- Port loopback detection 68
- Troubleshooting 68
- Chapter 7 uldp function configuration 69
- Introduction to uldp function 69
- Sequence 70
- Uldp configuration task 70
- Examples 73
- Uldp function typical 73
- Uldp troubleshooting 74
- Chapter 8 lldp function operation 76
- Configuration 76
- Introduction to lldp function 76
- Lldp function configuration 77
- Task sequence 77
- Lldp function 80
- Lldp function typical example 80
- Troubleshooting 80
- Chapter 9 port channel configuration 81
- Introduction to port channel 81
- Brief introduction to lacp 82
- Dynamic lacp aggregation 83
- Port channel configuration 83
- Static lacp aggregation 83
- Task list 83
- Port channel examples 85
- Port channel troubleshooting 87
- Chapter 10 jumbo configuration 88
- Introduction to jumbo 88
- Jumbo configuration task 88
- Sequence 88
- Chapter 11 efm oam configuration 89
- Introduction to efm oam 89
- Efm oam configuration 92
- Efm oam example 95
- Efm oam troubleshooting 95
- Chapter 12 port security 97
- Configuration task list 97
- Introduction to port 97
- Port security 97
- Security 97
- Example of port security 98
- Port security 99
- Troubleshooting 99
- Brief introduction to ddm 100
- Chapter 13 ddm configuration 100
- Introduction to ddm 100
- Ddm function 101
- Ddm configuration task list 102
- Examples of ddm 103
- Ddm troubleshooting 107
- Chapter 14 lldp med 108
- Introduction to lldp med 108
- Lldp med configuration task 108
- Sequence 108
- Lldp med example 110
- Lldp med troubleshooting 113
- Background of bpdu tunnel 114
- Bpdu tunnel function 114
- Chapter 15 bpdu tunnel configuration 114
- Introduction to bpdu tunnel 114
- Bpdu tunnel configuration 115
- Examples of bpdu tunnel 115
- Task list 115
- Bpdu tunnel troubleshooting 116
- Chapter 16 vlan configuration 117
- Introduction to vlan 117
- Vlan configuration 117
- Vlan configuration task list 118
- Typical vlan application 121
- Typical application of hybrid port 122
- Dot1q tunnel configuration 124
- Introduction to dot1q tunnel 124
- Dot1q tunnel configuration 126
- Typical applications of the dot1q tunnel 126
- Dot1q tunnel troubleshooting 127
- Introduction to selective qinq 127
- Selective qinq configuration 127
- Sp network 128
- Typical applications of selective qinq 128
- Vlan1000 2000 128
- Configuration 130
- Introduction to vlan translation 130
- Selective qinq troubleshooting 130
- Vlan translation 130
- Vlan translation configuration 130
- Typical application of vlan translation 131
- Vlan translation troubleshooting 132
- Configuration 133
- Introduction to multi to one vlan translation 133
- Multi to one vlan translation 133
- Multi to one vlan translation configuration 133
- Typical application of multi to one vlan translation 133
- Dynamic vlan configuration 135
- Introduction to dynamic vlan 135
- Multi to one vlan translation troubleshooting 135
- Typical application of the dynamic vlan 136
- Dynamic vlan troubleshooting 137
- Gvrp configuration 138
- Introduction to gvrp 138
- Gvrp configuration task list 139
- Example of gvrp 140
- Gvrp troubleshooting 141
- Chapter 17 mac table configuration 142
- Introduction to mac table 142
- Obtaining mac table 142
- Forward or filter 144
- Configuration task list 145
- Mac address table 145
- Examples 146
- Mac table troubleshooting 146
- Typical configuration 146
- Extension 147
- Introduction to mac address binding 147
- Mac address binding 147
- Mac address binding configuration task list 147
- Mac address function 147
- Binding mac address binding troubleshooting 149
- Configuration 149
- Introduction to mac notification 149
- Mac notification 149
- Mac notification configuration 149
- Mac notification example 151
- Mac notification troubleshooting 151
- Chapter 18 mstp configuration 152
- Introduction to mstp 152
- Mstp region 152
- Operations between mst regions 153
- Operations within an mstp region 153
- Mstp configuration task list 154
- Mstp load balance 154
- Port roles 154
- Command explanation 158
- Configure the flush mode once topology changes 158
- Configure the port flush mode the no command restores to use the global configured flush mode 158
- Enable the spanning tree flush once the topology changes disable the spanning tree don t flush 158
- Global mode 158
- Mstp example 158
- Port mode 158
- Spanning tree tcflush enable disable protect no spanning tree tcflush 158
- The following is a typical mstp application example 158
- Typical mstp application scenario 158
- When the topology changes protect the spanning tree flush not more than one time every ten seconds the no command restores to default setting enable flush once the topology changes 158
- Mstp troubleshooting 163
- Chapter 19 qos configuration 164
- Introduction to qos 164
- Qos terms 164
- Qos implementation 165
- Basic qos model 166
- Qos configuration task list 169
- Qos example 173
- Qos troubleshooting 175
- Chapter 20 flow based redirection 176
- Configuration task sequence 176
- Flow based redirection 176
- Introduction to flow based 176
- Redirection 176
- Examples 177
- Flow based redirection 177
- Troubleshooting help 177
- Basic qinq 178
- Chapter 21 flexible qinq configuration 178
- Flexible qinq 178
- Flexible qinq configuration 178
- Introduction to flexible qinq 178
- Qinq technique 178
- Task list 178
- 7 495 797 3311 www qtech ru москва новозаводская ул 18 стр 1 180
- Admin mode 180
- As shown in the figure the first user is assigned three dscps that the values are 10 20 30 180
- Command explanation 180
- Flexible qinq application topology 180
- Flexible qinq example 180
- For distinguishing dslam location and locating the user finally 180
- Respectively in dslam1 dscp10 corresponds to broad band network dscp20 corresponds to voip dscp30 corresponds to vod after the downlink port enables flexible qinq function the packets will be packed with different external tags according to dscp of users dscp10 will be packed an external tag 1001 this tag is unique in public network enter broad band network dscp10 and classfied to bras device dscp20 or dscp30 will be packed an external vlan tag 2001 or 3001 and classfied to sr device according to the flow rules the second user can be assigned different dscps in dslam2 notice the assigned dscp of the second user may be same with the first user and the dscp value will be also packed an external tag in the above figure the external tag of the second user is different to the first user 180
- Show flexible qinq configuration on the port 180
- Show flexible qinq policy map bound to port 4 show flexible qinq policy map bound to port 180
- Flexible qinq troubleshooting 182
- Chapter 22 layer 3 management configuration 183
- Introduction to layer 3 management interface 183
- Layer 3 interface configuration task list 183
- Layer 3 management interface 183
- Introduction to ipv4 ipv6 184
- Ip configuration 184
- Ip configuration 186
- Ipv4 address configuration 186
- Ipv6 address configuration 186
- Arp configuration task list 188
- Arp troubleshooting 188
- Introduction to arp 188
- Ipv6 troubleshooting 188
- Arp scanning prevention 190
- Chapter 23 arp scanning prevention function 190
- Configuration 190
- Configuration task sequence 190
- Introduction to arp scanning 190
- Prevention function 190
- Arp scanning prevention 192
- Typical examples 192
- Arp scanning prevention 193
- Troubleshooting help 193
- Arp address resolution protocol 194
- Arp spoofing 194
- Chapter 24 prevent arp spoofing 194
- Configuration 194
- How to prevent void arp spoofing 194
- Overview 194
- Configuration 195
- Prevent arp spoofing 195
- Example 196
- Prevent arp spoofing 196
- Chapter 25 arp guard configuration 198
- Introduction to arp guard 198
- Arp guard configuration 199
- Task list 199
- Chapter 26 gratuitous arp configuration 200
- Gratuitous arp configuration 200
- Introduction to gratuitous 200
- Task list 200
- Example 201
- Gratuitous arp configuration 201
- Gratuitous arp 202
- Troubleshooting 202
- Chapter 27 dhcp configuration 203
- Introduction to dhcp 203
- Dhcp server configuration 204
- Dhcp relay configuration 206
- Dhcp configuration examples 208
- Dhcp troubleshooting 211
- Chapter 28 dhcpv6 configuration 213
- Introduction to dhcpv6 213
- Dhcpv6 server configuration 214
- Configuration 216
- Dhcpv6 prefix delegation 216
- Dhcpv6 relay delegation 216
- Server configuration 216
- Client configuration 218
- Dhcpv6 prefix delegation 218
- Dhcpv6 configuration 219
- Examples 219
- Dhcpv6 troubleshooting 221
- Chapter 29 dhcp option 82 configuration 222
- Dhcp option 82 message 222
- Introduction to dhcp option 222
- Structure 222
- Option 82 working mechanism 223
- Dhcp option 82 configuration 224
- Task list 224
- Dhcp option 82 application 227
- Examples 227
- Dhcp option 82 229
- Troubleshooting 229
- And option 43 230
- Chapter 30 dhcp option 60 and option 43 230
- Configuration task list 230
- Dhcp option 60 and option 43 230
- Introduction to dhcp option 230
- Dhcp option 60 and option 43 231
- Dhcpv6 option 60 and option 231
- Example 231
- Troubleshooting 231
- Chapter 31 dhcpv6 option37 38 232
- Introduction to dhcpv6 232
- Option37 38 232
- Configuration task list 233
- Dhcpv6 option37 38 233
- Dhcpv6 option37 38 237
- Dhcpv6 snooping option37 38 example 237
- Examples 237
- Dhcpv6 relay option37 38 example 239
- Dhcpv6 option37 38 240
- Troubleshooting 240
- Chapter 32 dhcp snooping configuration 241
- Introduction to dhcp 241
- Snooping 241
- Dhcp snooping configuration 242
- Task sequence 242
- Application 246
- Dhcp snooping typical 246
- Dhcp snooping 247
- Dhcp snooping troubleshooting help 247
- Monitor and debug information 247
- Troubleshooting help 247
- Chapter 33 dhcp snooping option 82 248
- Configuration 248
- Dhcp option 82 message structure 248
- Introduction to dhcp 248
- Snooping option 82 248
- Dhcp snooping option 82 working mechanism 249
- Configuration task list 250
- Dhcp snooping option 82 250
- Application examples 251
- Dhcp snooping option 82 251
- Dhcp snooping option 82 252
- Troubleshooting 252
- Chapter 34 ipv4 multicast protocol 253
- Introduction to multicast 253
- Ipv4 multicast protocol 253
- Overview 253
- Multicast address 254
- Ip multicast application 255
- Ip multicast packet transmission 255
- Dcscm configuration task list 256
- Introduction to dcscm 256
- Dcscm configuration examples 259
- Dcscm troubleshooting 260
- Igmp snooping 260
- Introduction to igmp snooping 260
- Igmp snooping configuration task list 261
- Igmp snooping examples 263
- Igmp snooping troubleshooting 265
- Chapter 35 ipv6 multicast protocol 266
- Introduction to mld snooping 266
- Mld snooping 266
- Mld snooping configuration task 266
- Mld snooping examples 268
- Mld snooping troubleshooting 271
- Chapter 36 multicast vlan 272
- Introductions to multicast 272
- Multicast vlan configuration 272
- Task list 272
- Multicast vlan examples 273
- Access group 276
- Access list 276
- Access list action and global default action 276
- Chapter 37 acl configuration 276
- Introduction to acl 276
- Acl configuration task list 277
- Acl example 289
- Acl troubleshooting 293
- Chapter 38 802 x configuration 295
- Introduction to 802 x 295
- The authentication structure of 802 x 295
- The encapsulation of eapol messages 297
- The work mechanism of 802 x 297
- The encapsulation of eap attributes 299
- Eap termination mode 303
- The extension and optimization of 802 x 304
- The features of vlan allocation 305
- 802 x configuration task list 306
- 802 x application example 309
- Examples of guest vlan applications 309
- Examples of ipv4 radius applications 312
- Examples of ipv6 radius application 313
- 802 x troubleshooting 314
- Chapter 39 the number limitation function of 315
- Introduction to the number 315
- Limitation function of mac in port 315
- Mac in port configuration 315
- Configuration task sequence 316
- Function of mac in port 316
- The number limitation 316
- Examples 317
- Function of mac in port 317
- Function of mac in port typical 317
- The number limitation 317
- Troubleshooting help 317
- Am function configuration 319
- Chapter 40 operational configuration of am 319
- Function 319
- Introduction to am function 319
- Task list 319
- Am function example 321
- Am function troubleshooting 321
- Chapter 41 security feature configuration 322
- Configuration 322
- Configuration task sequence 322
- Feature 322
- Introduction to security 322
- Prevent ip spoofing function configuration task sequence 322
- Prevent tcp unauthorized label attack function 322
- Security feature 322
- Anti port cheat function configuration task sequence 323
- Prevent icmp fragment attack function configuration task 323
- Prevent tcp fragment attack function configuration task 323
- Sequence 323
- Security feature example 324
- Chapter 42 tacacs configuration 325
- Introduction to tacacs 325
- Tacacs configuration task 325
- Examples 326
- Tacacs scenarios typical 326
- Tacacs troubleshooting 327
- Aaa and radius introduction 328
- Chapter 43 radius configuration 328
- Introduction to radius 328
- Message structure for radius 328
- Radius configuration task 330
- Ipv4 radius example 332
- Radius typical examples 332
- Ipv6 radiusexample 333
- Radius troubleshooting 333
- Basic element of ssl 335
- Chapter 44 ssl configuration 335
- Introduction to ssl 335
- Ssl configuration task list 336
- Ssl typical example 337
- Ssl troubleshooting 338
- Chapter 45 ipv6 security ra configuration 339
- Configuration task sequence 339
- Introduction to ipv6 security 339
- Ipv6 security ra 339
- Examples 340
- Ipv6 security ra typical 340
- Ipv6 security ra 341
- Troubleshooting help 341
- Chapter 46 mab configuration 342
- Introduction to mab 342
- Mab configuration task list 342
- Mab example 344
- Mab troubleshooting 346
- Brief introduction to pppoe 347
- Chapter 47 pppoe intermediate agent 347
- Configuration 347
- Intermediate agent 347
- Introduction to pppoe 347
- Introduction to pppoe ia 347
- Pppoe intermediate agent exchange process 348
- Pppoe packet format 349
- Pppoe intermediate agent vendor tag frame 350
- Configuration task list 351
- Pppoe intermediate agent 351
- Trust port of pppoe intermediate agent 351
- Pppoe intermediate agent 353
- Typical application 353
- Pppoe intermediate agent 354
- Troubleshooting 354
- Authentication 355
- Chapter 48 web portal configuration 355
- Configuration task list 355
- Introduction to web portal 355
- Web portal authentication 355
- Typical example 357
- Web portal authentication 357
- Troubleshooting 358
- Web portal authentication 358
- Chapter 49 vlan acl configuration 359
- Introduction to vlan acl 359
- Vlan acl configuration task 359
- Example 361
- Vlan acl configuration 361
- Vlan acl troubleshooting 362
- Chapter 50 savi configuration 363
- Introduction to savi 363
- Savi configuration 363
- Savi typical application 367
- Savi troubleshooting 368
- Chapter 51 mrpp configuration 369
- Conception introduction 369
- Introduction to mrpp 369
- Mrpp protocol operation system 371
- Mrpp protocol packet types 371
- Mrpp configuration task list 372
- Mrpp typical scenario 374
- Mrpp troubleshooting 376
- Chapter 52 ulpp configuration 377
- Introduction to ulpp 377
- Ulpp configuration task list 379
- Ulpp typical example1 381
- Ulpp typical examples 381
- Ulpp typical example2 383
- Ulpp troubleshooting 384
- Chapter 53 ulsm configuration 385
- Introduction to ulsm 385
- Ulsm configuration task list 386
- Ulsm typical example 387
- Ulsm troubleshooting 388
- Chapter 54 mirror configuration 389
- Introduction to mirror 389
- Mirror configuration task list 389
- Mirror examples 390
- Device mirror troubleshooting 391
- Chapter 55 sflow configuration 392
- Introduction to sflow 392
- Sflow configuration task list 392
- Sflow examples 394
- Sflow troubleshooting 395
- Chapter 56 sntp configuration 396
- Introduction to sntp 396
- Configuration 397
- Typical examples of sntp 397
- Chapter 57 ntp function configuration 398
- Introduction to ntp function 398
- Ntp function configuration 398
- Task list 398
- Function 401
- Typical examples of ntp 401
- Ntp function troubleshooting 402
- Chapter 58 summer time configuration 403
- Examples of summer time 403
- Introduction to summer time 403
- Summer time configuration 403
- Task sequence 403
- Summer time 404
- Troubleshooting 404
- Chapter 59 monitor and debug 405
- Traceroute 405
- Traceroute6 406
- System log 407
- System log introduction 407
- Format and severity of the log information 408
- Log output channel 408
- System log configuration 409
- System log configuration example 411
- After specifid time 412
- Chapter 60 reload switch after specified time 412
- Introduce to reload switch 412
- Reload switch after specifid 412
- Time task list 412
- And diagnosis for packets 413
- Chapter 61 debugging and diagnosis for 413
- Debugging and diagnosis for 413
- Introduction to debugging 413
- Packets received and sent by cpu 413
- Received and sent by cpu 413
- Task list 413
- Authentication line 415
- Chapter 62 commands for basic switch 415
- Commands for basic 415
- Configuration 415
Похожие устройства
- Bosch WLO2416SOE Инструкция по эксплуатации
- Kraftway G630/4096/500 Инструкция по эксплуатации
- Q-Tech QSW-2850 Инструкция по эксплуатации
- Bosch WLO24160OE Инструкция по эксплуатации
- Packard Bell IMEDIA A3901 Инструкция по эксплуатации
- Q-Tech QSW-3400 Инструкция по эксплуатации
- Bosch WLO20260OE Инструкция по эксплуатации
- Kraftway i5-2310/4096/500 Инструкция по эксплуатации
- Q-Tech QSW-3450 Инструкция по эксплуатации
- Nokia N95-2 8GB Инструкция по эксплуатации
- Bosch WLO20240OE Инструкция по эксплуатации
- Asus CM1730 4P X4 850 Инструкция по эксплуатации
- Q-Tech QSW-3500 Инструкция по эксплуатации
- Bosch WLO20160OE Инструкция по эксплуатации
- Asus CM6730 4P i5-2310M Инструкция по эксплуатации
- Q-Tech QSW-3900 Инструкция по эксплуатации
- Bosch WLO20140OE Инструкция по эксплуатации
- Asus CG8250 2P i5-2310M Инструкция по эксплуатации
- Q-Tech QSW-8200 Инструкция по эксплуатации
- Bosch WLM2445SOE Инструкция по эксплуатации