3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time
without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or
expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality,
and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license agreement
included with the product as a separate document, in the hard copy documentation, or on the removable media in a
directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will
be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are provided to
you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense. Software is
delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item”
as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial
license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or
FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided
on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered
in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
Cisco is a registered trademark of Cisco Systems, Inc.
Funk RADIUS is a registered trademark of Funk Software, Inc.
Aegis is a registered trademark of Aegis Group PLC.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are
registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a
registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed
to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards.
Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully
biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are
vegetable-based with a low heavy-metal content.
CONTENTS
CONTENTS
ABOUT THIS GUIDE
Organization of the Manual21
Intended Readership22
Conventions 22
Related Manuals23
1GETTING STARTED
Product Overview25
XRN Overview26
Major Technologies26
Typical Networking Topology26
Product Features27
Logging in to the Switch29
Setting up Configuration Environment through the Console Port29
Setting up Configuration Environment through Telnet31
Setting up Configuration Environment through a Dial-up Modem33
Command Line Interface37
Command Line View37
Features and Functions of Command Line40
User Interface Configuration42
User Interface Configuration43
Displaying and Debugging User Interface49
3
2ADDRESS MANAGEMENT CONFIGURATION
Introduction to Address Management51
Configuring Address Management51
Configuring a Port-Based Address Management IP Address Pool51
Binding the MAC Address and IP Address of a Legal User to the Specified Port51
Address Management Configuration Example52
Port-Based Address Management IP Address Pool Configuration Example52
Configuration Example of Binding the MAC Address and IP Address of a Legal
User53
3PORT OPERATION
Ethernet Port Configuration Introduction55
Ethernet Port Configuration55
EthernetPort Security Features62
Displaying and Debugging Ethernet Port66
4 CHAPTER : CONTENTS
Displaying Port Configuration Information in Brief67
Ethernet Port Configuration Example67
Ethernet Port Troubleshooting68
Link Aggregation Configuration68
Link Aggregation Configuration71
Displaying and Debugging Link Aggregation74
Link Aggregation Configuration Example75
Global Broadcast Suppression Feature76
Configuring Global Broadcast Suppression76
Global Broadcast Suppression Configuration Example76
Configuration procedure76
Displaying Information About a Specified Optical Port77
4XRN CONFIGURATION
Introduction to XRN79
Configuring an XRN Fabric79
Specifying the Stacking VLAN of the Switch80
Setting Unit IDs for Switches80
Saving the Unit ID of Each Unit in the Fabric81
Specifying the Fabric Port of the Switch81
Setting Unit Names for Switches81
Setting a Fabric Name for Switches81
Setting an XRN Authentication Mode for Switches82
Displaying and Debugging a Fabric82
Fabric Configuration Example82
RMON on XRN83
Configuration Commands for RMON on XRN84
Clustering on XRN84
Peer Fabric Port Detection84
Work Flow of the Peer Fabric Port Detection Function84
Prompt Information and Solution85
Multiple Fabric Port Candidates86
5DLDP CONFIGURATION
DLDP Overview89
DLDP Fundamentals90
Precautions During DLDP Configuration93
DLDP Configuration93
14CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION
Introduction to Centralized MAC Address Authentication195
Centralized MAC Address Authentication Configuration196
Enabling Global/Port-based Centralized MAC Address Authentication196
Configuring an ISP Domain for MAC Address Authentication Users196
Setting Centralized MAC Address Authentication Timers196
Displaying and Debugging Centralized MAC Address Authentication197
Centralized MAC Address Authentication Configuration Example197
15SSH TERMINAL SERVICES
SSH Terminal Services199
Introduction to SSH199
SSH Server Configuration201
SSH Client Configuration205
Displaying SSH Configuration205
SSH Server Configuration Example206
SSH Client Configuration Example207
SSH Keygen Program209
SFTP Service210
SFTP Overview210
SFTP Server Configuration210
SFTP Client Configuration211
SFTP Configuration Example213
16IP ROUTING PROTOCOL OPERATION
IP Routing Protocol Overview217
Selecting Routes Through the Routing Table218
Routing Management Policy219
Static Routes220
Configuring Static Routes221
Example: Typical Static Route Configuration223
Troubleshooting Static Routes224
RIP224
Configuring RIP225
Traffic Sharing Across RIP Interfaces233
Displaying and Debugging RIP233
Example: Typical RIP Configuration233
Troubleshooting RIP234
OSPF Configuration235
Calculating OSPF Routes235
Basic Concepts Related to OSPF236
Configuring OSPF237
Displaying and Debugging OSPF253
254
Example: Configuring DR Election Based on OSPF Priority254
Example: Configuring OSPF Virtual Link256
Troubleshooting OSPF257
IP Routing Policy258
Configuring an IP Routing Policy259
Forwarding Layer 3 Broadcast Packets263
Displaying and Debugging the Routing Policy264
Typical IP Routing Policy Configuration Example264
Troubleshooting Routing Protocols265
IP Address Overview269
Configuring IP Address 271
Displaying and Debugging IP Address272
IP Address Configuration Example273
Troubleshooting IP Address Configuration273
Option 82 Supporting Configuration288
Prerequisites288
Enabling Option 82 Supporting on a DHCP Relay288
Option 82 Supporting Configuration Example289
Introduction to DHCP Snooping290
DHCP Snooping Configuration291
Configuration Example292
Introduction to DHCP Accounting292
Structure of the DHCP Accounting Packets292
DHCP Accounting Fundamentals294
DHCP Accounting Configuration294
Displaying and Debugging DHCP Configuration296
DHCP Relay Configuration Example One297
DHCP Relay Configuration Example Two298
Troubleshooting DHCP Relay Configuration299
Access Management Configuration299
Access Management Overview299
Configuring Access Management299
Displaying and Debugging Access Management 301
Access Management Configuration Example302
Access Management using the Web302
UDP Helper Configuration303
Overview of UDP Helper303
UDP Helper Configuration303
Displaying and Debugging UDP Helper Configuration305
UDP Helper Configuration Example305
IP Performance Configuration305
Displaying and debugging IP Performance306
Troubleshooting IP Performance307
18MULTICAST PROTOCOL
IP Multicast Overview309
Multicast Addresses310
IP Multicast Protocols312
Forwarding IP Multicast Packets313
Applying Multicast314
IGMP Snooping314
Configuring IGMP Snooping317
Enabling IGMP Fast Leave Processing318
Configuring IGMP Snooping Filter ACL319
Configuring the Maximum Number of Multicast Groups on a Port319
Configuring Multicast VLAN320
Displaying and Debugging IGMP Snooping321
Configuration Example—Enable IGMP Snooping322
IGMP Snooping Fault Diagnosis and Troubleshooting322
Common Multicast Configuration323
Enabling Multicast323
Configuring the Number Limit of Multicast Routing Entries323
Multicast MAC Address Entry Configuration324
Displaying Multicast MAC Address Configuration324
Multicast Source Deny Configuration325
Clearing MFC Forwarding Entries or Statistics Information325
Clearing Route Entries From The Core Multicast Routing Table325
Displaying and Debugging Common Multicast Configuration326
Internet Group Management Protocol (IGMP)326
Configuring IGMP328
Displaying and debugging IGMP333
PIM-DM Overview333
Configuring PIM-DM335
Displaying and Debugging PIM-DM338
PIM-DM Configuration Example338
PIM-SM Overview339
PIM-SM Operating Principle340
Preparations before Configuring PIM-SM341
Configuring PIM-SM341
Displaying and Debugging PIM-SM346
PIM-SM Configuration Example346
349
11
19ACL CONFIGURATION
Brief Introduction to ACL351
ACL Supported by the Switch352
Configuring ACL352
Defining ACL353
Activating ACL355
Displaying and Debugging ACL356
Advanced ACL Configuration Example356
Basic ACL Configuration Example357
Link ACL Configuration Example358
QoS Configuration359
QoS Configuration361
Setting Port Priority361
Configuring the Priority for Protocol Packets361
Setting Port Mirroring362
Configuring Traffic Mirroring362
Setting Traffic Limit364
Setting Line Limit365
Relabeling Priority Level365
Configuring Traffic Statistics365
Configuring WRED Operation366
Configuring Control Over Telnet366
Displaying and Debugging QoS Configuration369
QoS Configuration Example369
Port Mirroring Configuration Example370
Priority Relabeling Configuration Example371
Applying QoS Profile to the Port374
QoS Profile Configuration Example374
ACL Control Configuration376
Configuring ACL for Telnet Users376
Defining ACL376
Importing ACL377
Configuration Example377
Configuring ACL for SNMP Users377
Configuration Example379
Configuring ACL Control over the HTTP Users379
Defining ACL379
Calling ACL to Control HTTP Users379
Configuration Example380
20CONFIGURATIONFOR QOS FEATURES
RSPAN Features381
Configuration Prerequisite382
Configuration Procedures in the Source Switch383
Configuration Procedures in the Intermediate Switch383
Configuration Procedures in the Source Switch384
Configuration Example384
Features of Traffic Statistics386
Improving the Depth First Order of ACL Matching386
Displaying Information of the display acl command387
Subdividing DSCP while Defining ACL Rules387
The Synchronization Feature of Queue Scheduling for Aggregation Ports388
Configuring Control Over Telnet388
Configuration Preparation388
Controlling Telnet using Source IP389
Controlling Telnet using Source IP and Destination IP389
Controlling Telnet using Source MAC390
Configuration Example390
21802.1X CONFIGURATION
IEEE 802.1x Overview391
802.1x System Architecture391
802.1x Authentication Process392
Implementing 802.1x on the Switch393
Configuring 802.1x393
Enabling/Disabling 802.1x393
Setting the Port Access Control Mode394
Setting the Port Access Control Method394
Checking the Users that Log on the Switch using Proxy394
Setting the User Number on a Port395
Setting the Authentication in DHCP Environment395
Configuring the Authentication Method for 802.1x User395
802.1x PEAP Configuration395
Setting the Maximum Times of Authentication Request Message
Retransmission397
Configuring Timers398
Enabling/Disabling a Quiet-Period Timer399
802.1x Client Version Checking Configuration399
Enabling the 802.1x Client Version Checking Function399
Configuring the Maximum Number of Retires to Send Version Checking Request
Packets399
Configuring the Version Checking Timer400
802.1x Client Version Checking Configuration Example400
Guest VLAN Configuration400
Guest VLAN Configuration401
Configure Guest VLAN in Ethernet port view401
Guest VLAN Configuration Example401
The 802.1x Trusted MAC Address Synchronization Function402
802.1x Supplicant System Checking402
Displaying and Debugging 802.1x403
Auto QoS403
802.1x Configuration Example403
Centralized MAC Address Authentication405
Centralized MAC Address Authentication Configuration406
Enabling MAC Address Authentication Both Globally and On the Port406
Configuring Centralized MAC Address Authentication Mode406
Configuring the User Name and Password for Fixed Mode407
Configuring Domain Name Used by the MAC Address Authentication User407
Configuring Centralized MAC Address Authentication Timers407
Displaying and Debugging Centralized MAC Address Authentication408
Auto VLAN408
Configuration Example of Centralized MAC Address Authentication408
AAA and RADIUS Protocol Configuration409
RADIUS Protocol Overview409
Implementing AAA/RADIUS on the Ethernet Switch410
Configuring AAA410
Creating/Deleting an ISP Domain411
Configuring Relevant Attributes of the ISP Domain411
AAA Separation413
Configuring Separate AAA Schemes414
Configuration Example for Separate AAA Schemes414
Enabling/Disabling the Messenger Alert415
Configuring Self-Service Server URL416
Dynamic VLAN Assignment417
Configuring Dynamic VLAN Assignment417
Configuration Example for Dynamic VLAN Assignment417
Creating a Local User418
Setting Attributes of the Local User419
Disconnecting a User by Force420
Configuring the RADIUS Protocol420
Creating/Deleting a RADIUS Scheme421
Configuring RADIUS Authentication/
Authorization Servers421
Configuring RADIUS Accounting Servers and the Related Attributes422
User Re-authentication at Reboot424
13
14 CHAPTER : CONTENTS
Configuring User Re-authentication at Reboot425
Configuration Example for User Re-authentication at Reboot425
Setting the RADIUS Packet Encryption Key425
Tag VLAN Assignment on Trunk/Hybrid Port Supported by 802.1x
Authentication426
Identifier Authentication Method Attribute in RADIUS426
Setting Retransmission Times of RADIUS Request Packet426
Setting the Supported Type of the RADIUS Server426
Setting the RADIUS Server State427
Setting the Username Format Transmitted to the RADIUS Server427
Setting the Unit of Data Flow that Transmitted to the RADIUS Server428
Configuring the Local RADIUS Authentication Server428
Configuring Source Address for RADIUS Packets Sent by NAS428
Setting the Timers of the RADIUS Server429
Displaying and Debugging AAA and RADIUS Protocol430
AAA and RADIUS Protocol Configuration Example431
Configuring the Switch 5500433
AAA and RADIUS Protocol Fault Diagnosis and Troubleshooting435
Problem Diagnosis436
3Com-User-Access-Level436
22FILE SYSTEM MANAGEMENT
File System Overview437
Directory Operation438
File Attribute Configuration438
File Attribute Configuration439
File Operation440
Storage Device Operation440
Setting the Prompt Mode of the File System441
Configuring File Management441
Displaying the Current-configuration and Saved-configuration of the Switch441
Saving the Current-configuration442
Erasing Configuration Files from Flash Memory442
Configuring the Name of the Configuration File used for the Next Startup.442
Configuration File Backup and Restoration443
Configuration Preparation443
FTP Overview443
Enabling/Disabling FTP Server444
Configuring Source IP Address for FTP Serve and Client444
Configuring the FTP Server Authentication and Authorization445
Configuring the Running Parameters of FTP Server445
Displaying and Debugging FTP Server446
Displaying the Source IP Address Configuration446
Introduction to FTP Client446
FTP Server Configuration Example448
TFTP Overview449
Downloading Files by means of TFTP450
Uploading Files by means of TFTP450
TFTP Client Configuration Example450
MAC Address Table Management451
MAC Address Table Configuration 452
Displaying MAC Address Table 454
MAC Address Table Management Display Example454
MAC Address Table Management Configuration Example455
Telneting with Specified Source IP Address/Source Interface IP Address459
460
Basic System Configuration460
Terminating the FTP Connection of a Specified User461
Restarting the Switch461
Displaying the State and Information of the System461
System Debugging462
Testing Tools for Network Connection464
ping464
tracert464
Introduction to Remote-ping465
Remote-ping Configuration466
Introduction to Remote-ping Configuration466
Configuring Remote-ping466
Configuration Example467
Logging Function468
Introduction to Info-center468
Info-Center Configuration471
Sending the Information to Loghost474
Sending the Information to Control Terminal476
Sending the Information to Telnet Terminal or Dumb Terminal478
Sending the Information to the Log Buffer480
Sending the Information to the Trap Buffer481
Sending the Information to SNMP Network Management 482
Configuring Synchronous Information Output Function485
Configuration Examples of Sending Log to Unix Loghost485
Configuration Examples for Sending Log to Linux Loghost486
Configuration Examples of Sending Log to Control Terminal488
RMON Configuration489
Configuring RMON489
Displaying and Debugging RMON491
RMON Configuration Example492
NTP Overview492
NTP Configuration494
Configuring NTP Operating Mode494
Displaying and Debugging NTP499
Introduction to File System516
File System Configuration517
FTP Lighting Configuration518
Introduction to FTP518
FTP Lighting Procedure518
TFTP Lighting Configuration520
TFTP Lighting Procedure521
23PORT TRACKING CONFIGURATION
Introduction to the Port Tracking Function523
Port Tracking Configuration523
Configuring the Port Tracking Function523
Port Tracking Configuration Example523
24DYNAMICALLY APPLY ACL BY RADIUS SERVER CONFIGURATION
Introduction to Dynamically Apply ACL by RADIUS Server525
Introduction to Dynamically Apply ACL by RADIUS Server Configurations525
Configuration Example526
Network requirements526
Network diagram526
Configuration procedure527
Configuration on the switch529
25AUTO DETECT CONFIGURATION
Introduction to the Auto Detect Function531
Configuring the auto detect function531
Auto Detect Configuration Example531
Auto Detect Implementation532
Auto Detect Implementation in Static Routing533
Configuring the Auto Detect Function for a Static Route533
Configuration Example533
Auto Detect Implementation in VRRP534
Configuring the Auto Detect Function for VRRP534
Configuration Example534
Auto Detect Implementation in VLAN Interface Backup536
Configuring the Auto Detect Function for VLAN Interface Backup536
Configuration Example536
26RSTP CONFIGURATION
STP Overview539
Implement STP539
Configuration BPDU Forwarding Mechanism in STP 543
Implement RSTP on the Switch543
RSTP Configuration544
Enable/Disable RSTP on a Switch547
Enable/Disable RSTP on a Port547
Configure RSTP Operating Mode548
Configure the STP-Ignore attribute of VLANs on a Switch548
Set Priority of a Specified Bridge549
Specify the Switch as Primary or Secondary Root Bridge549
Set Forward Delay of a Specified Bridge550
Set Hello Time of the Specified Bridge550
Set Max Age of the Specified Bridge550
Set Timeout Factor of the Bridge 551
Specifying the Maximum Transmission Rate of STP Packets on a Port551
Set Specified Port to be an EdgePort552
Specifying the Path Cost on a Port552
Set the Priority of a Specified Port553
Configure a Specified Port to be Connected to Point-to-Point Link553
Set mCheck of the Specified Port554
Configure the Switch Security Function554
Display and Debug RSTP 556
RSTP Configuration Example556
17
27POE PROFILE CONFIGURATION
Introduction to PoE Profile559
PoE Profile Configuration559
SNMP Versions and Supported MIB563
Configure SNMP565
Enabling/Disabling SNMP Agent to Send Trap566
Setting the Destination Address of Trap 566
Setting Lifetime of Trap Message567
Setting SNMP System Information567
Setting the Engine ID of a Local or Remote Device567
Setting/Deleting an SNMP Group567
Setting the Source Address of Trap568
Adding/Deleting a User to/from an SNMP Group568
Creating/Updating View Information or Deleting a View568
Setting the Size of SNMP Packet Sent/Received by an Agent568
Enabling/Disabling a Port Transmitting Trap Information SNMP Agent569
Disabling SNMP Agent569
Configuring Source IP Address for Service Packets573
Displaying the Source IP Address Configuration574
30PASSWORD CONTROL CONFIGURATION OPERATIONS
Introduction to Password Control Configuration575
Password Control Configuration576
Configuration Prerequisites576
Configuration Tasks576
Configuring Password Aging577
Configuring the Limitation of Minimum Password Length578
Configuring History Password Recording579
Configuring a User Login Password in Encryption Mode580
Configuring Login Attempts Limitation and Failure Processing Mode580
Configuring the Timeout Time for Users to be authenticated581
Displaying Password Control581
Password Control Configuration Example582
Configuration Prerequisites591
Configuring Description Information for MSDP Peers592
Configuring Anycast RP Application592
Configuring an MSDP Mesh Group592
Configuring MSDP Peer Connection Control593
Configuring SA Message Transmission593
Configuration Prerequisites593
Configuring the Transmission and Filtering of SA Request Messages594
Configuring a Rule for Filtering the Multicast Sources of SA Messages594
Configuring a Rule for Filtering Received and Forwarded SA Messages595
Configuring SA Message Cache595
Displaying and Debugging MSDP Configuration596
MSDP Configuration Example596
Configuration Example of Anycast RP Application596
Troubleshooting MSDP Configuration599
MSDP Peer Always in the Down State599
No SA Entry in the SA Cache of the Router599
32CLUSTERING
Clustering Overview601
Switch Roles602
Introduction to NDP603
Introduction to NTDP603
Introduction to Cluster Roles604
Management Device Configuration605
Enabling System and Port NDP605
Configuring NDP Parameters605
Enabling System and Port NTDP605
Configuring NTDP Parameters605
Configuring Cluster Parameters606
Configuring Internal-External Interaction607
NM Interface for Cluster Management Configuration607
Member Device Configuration608
Enabling System and Port NDP608
Enabling System and Port NTDP608
Specifying the cluster FTP/TFTP server608
NM Interface for Cluster Management Configuration Example612
19
33HWTACACS CONFIGURATION
Configuring HWTACACS615
HWTACACS configuration tasks615
Creating a HWTACAS Scheme616
Configuring HWTACACS Authentication Servers617
Configuring HWTACACS Accounting Servers and the Related Attributes617
Configuring Source Address for HWTACACS Packets Sent by NAS618
Setting a Key for Securing the Communication with TACACS Server618
Setting the Username Format Acceptable to the TACACS Server618
Setting the Unit of Data Flows Destined for the TACACS Server619
Setting Timers Regarding TACACS Server619
Displaying and Debugging HWTACACS Protocol620
HWTACACS Protocol Configuration Example621
Configuring the FTP/Telnet User Authentication at a Remote TACACS Server621
■ Source IP Address—Details Source IP Address Configuration for the FTP client
and server .
■ Password Control—Details Password Control Configuration.
■ MSDP—Details MSDP Configuration.
■ Clustering—Details Clustering Configuration.
■ HWTACACS—Details HWTACACS Configuration.
Intended ReadershipThe manual is intended for the following readers:
■ Network administrators
■ Network engineers
■ Users who are familiar with the basics of networking
Conventions This manual uses the following conventions:
Tab le 1 Icons
IconNotice TypeDescription
Information noteInformation that describes important features or instructions.
CautionInformation that alerts you to potential loss of data or potential
WarningInformation that alerts you to potential personal injury.
Tab le 2 Text conventions
ConventionDescription
Screen displays This typeface represents text as it appears on the screen.
Keyboard key names If you must press two or more keys simultaneously, the key names are
linked with a plus sign (+), for example:
Press Ctrl+Alt+Del
The words “enter”
and type”
When you see the word “enter” in this guide, you must type something,
and then press Return or Enter. Do not press Return or Enter when an
instruction simply says “type.”
Fixed command
text
This typeface indicates the fixed part of a command text. You must type
the command, or this part of the command, exactly as shown, and press
Return or Enter when you are ready to enter the command.
Example: The command display history-command must be entered
exactly as shown.
damage to an application, system, or device.
Related Manuals23
Tab l e 2 Text conventions (continued)
ConventionDescription
Variable
command text
{ x | y | ... }Alternative items, one of which must be entered, are grouped in braces
[ ]
This typeface indicates the variable part of a command text. You must type
a value here, and press Return or Enter when you are ready to enter the
command.
Example: in the command super level, a value in the range 0 to 3 must
be entered in the position indicated by level
and separated by vertical bars. You must select and enter one of the items.
Example: in the command flow-control {hardware | none |
software}, the braces and the vertical bars combined indicate that you
must enter one of the parameters. Enter either hardware, or none, or
software.
Items shown in square brackets [ ] are optional.
Example 1: in the command
indicate that the parameter
with or without this parameter.
Example 2: in the command user-interface [type] first-number
[last-number] the square brackets indicate that the parameters [type]
and [last-number] are both optional. You can enter a value in place of
one, both or neither of these parameters.
Alternative items, one of which can optionally be entered, are grouped in
square brackets and separated by vertical bars.
display users [all], the square brackets
all is optional. You can enter the command
Example 3: in the command header
text, the square brackets indicate that the parameters shell,
incoming and login
one of the parameters is allowed.
are all optional. The vertical bars indicate that only
[shell | incoming | login]
Related ManualsThe 3Com Switch 5500 Family Getting Started Guide provides information about
installation.
The 3Com Switch 5500 Family Command Reference Guide provides all the
information you need to use the configuration commands.
24ABOUT THIS GUIDE
GETTING STARTED
1
This chapter covers the following topics:
■ Product Overview
■ XRN Overview
■ Product Features
■ Logging in to the Switch
■ Command Line Interface
■ User Interface Configuration
Product OverviewThe Switch 5500 Family are Layer 3 switching products supporting expandable resilient
networking (XRN). The Switch 5500 can be one of two series: Switch 5500-SI or the
Switch 5500-EI. The Switch 5500 family supports simple routing, basic service features,
and basic XRN; the Switch 5500 family supports rather complex routing protocols,
abundant service features and enhanced XRN. Besides saving user cost otherwise invested
on module rack-type switches, the Switch 5500 family with XRN also offer excellent
network availability, upgrade ability, performance, and power network control capacity.
Table 3 lists the models in the Switch 5500 family:
Tab le 3 Models in the Switch 5500 family
Model
5500-SI
28-Port
5500-SI
52-Port
5500-EI
28-Port
5500-EI
52-Port
5500-EI PWR
28-Port
5500-EI PWR
52-Port
5500-EI
28-Port FX
5500G-EI
24-Port
5500G-EI
48-Port
5500G-EI
PWR 24-Port
Power
supply unit
(PSU)
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
Number of
service
ports
Number of 100
Mbps ports
2824 10/100 Mbps 4 SFP1
5248 10/100 Mbps 4 SFP1
2824 10/100 Mbps 4 SFP1
5248 10/100 Mbps 4 SFP1
28
52
28
24—20 10/100/1000
48—44 10/100/1000
24—20 10/100/1000
24 10/100 Mbps
48 10/100 Mbps
24 100 Mbps
Number of 1000
Mbps uplink
ports
4 SFP1
4 SFP1
2 10/100/1000
plus2 SFP
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Console
port
1
1
1
1
26 CHAPTER 1: GETTING STARTED
Tab le 3 Models in the Switch 5500 family (continued)
Model
5500G-EI
PWR 48-Port
5500G-EI
24-Port SFP
Power
supply unit
(PSU)
AC-input,
DC-input
AC-input,
DC-input
Number of
service
ports
48—44 10/100/1000
24—20 10/100/1000
Number of 100
Mbps ports
Number of 1000
Mbps uplink
ports
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Console
port
1
1
The Switch 5500 family supports the following services:
■ Internet broadband access
■ MAN (metropolitan area network), enterprise/campus networking
■ Multicast service, multicast routing, and audio and video multicast service.
XRN OverviewWith the XRN (eXpandable Resilient Networking) feature, you can connect several
devices into a combined device and manage them as a single unit. The combined
device is called the Fabric, while the member devices are units. With XRN you can:
■ Manage multiple devices in centralized manner, with low management cost.
■ Extend the number of ports and switching capacity just by adding devices. You can
decide which equipment to purchase as needed, and better protect your existing
investment while upgrading the network.
■ Provide backup between multiple devices to improve reliability and to eliminate
single points of failure.
Major TechnologiesXRN includes three technologies: distributed device management (DDM), distributed
link aggregation (DLA), and distributed resilient route (DRR).
■ DDM: Users can treat the Fabric as a single device. They can manage the Fabric
through any port or IP address connected into the Fabric, and from any unit in the
fabric.
■ DRR: The multiple units of a Fabric route and forward packets as a single unit, and
provide uniform VLAN interfaces, routing table and L3 forwarding table, so the
Fabric is regarded as a single Layer 3 switch. Failure of one of the units will not
affect routing protocol and data forwarding.
■ DLA: Users can aggregate multiple ports of several different units in a Fabric into a
group, for centralized management within the Fabric. Trans-unit link aggregation
can bring convenient aggregation setting and effectively reduce single points of
failure.
The Switch 5500-SI supports basic XRN, that is DDM and DLA; the Switch 5500-EI
supports enhanced XRN, including DDM, DRR, and DLA.
Typical Networking
Topology
Typical XRN networking topology is as shown in Figure 1. Switches of the same type
(that is, units) form a Fabric. As a core switch, the Fabric can be downlinked to
workgroup switches through several aggregation links, and uplinked to the server
group also through several aggregation links.
Figure 1 Networking Topology with XRN
Unit 2
Unit 1
Unit3
Unit 4
Fabric
Server
Core
switches
Workgroup
switches
Desktop
PCs
Product Features27
Product FeaturesTable 4 describes the features:
Tab le 4 Function Features
FeaturesDescription
Port802.1D Learning
Static MAC (unicast/multicast)
Jumbo Frame (9k) (EI models only)
Unidirectional Link Detection (UDLD)
VLANVLAN compliant with IEEE 802.1Q Standard
Port-based VLAN
Protocol Based VLAN, compliant with IEEE 802.1v Standard (EI
models only)
Voice VLAN
8021.Q in Q Double Tagged VLAN Support (EI models only)
STP protocolSpanning Tree Protocol (STP) / Rapid Spanning Tree Protocol
Link Aggregation Control Protocol (LACP), compliant with IEEE
802.3ad Standard
MirrorMirror based on the traffic classification
Port-based mirror
VLAN-based mirror
Remote mirroring
Security featuresMulti-level user management and password protect
802.1X Network Login
MAC Based Network Login
Mixed 802.1X and MAC Based Network Login
RADIUS and TACACS+ Authentication, Authorization and
Accounting
PAP, CHAP, EAP-MD5,TLS,TTLS and PEAP Authenticating
Packet filtering
Quality of Service (QoS)Traffic classification
Bandwidth control
Priority
Queues of different priority on the port
Queue scheduling: supports Strict Priority Queuing (SP),
Weighted Round Robin (WRR), WFQ, SP+WFQ, and SP+WRR
QoS profile management manner
modelsonly)
Logging in to the Switch29
Console port
Console cable
Tab le 4 Function Features (continued)
FeaturesDescription
Management and
Maintenance
Loading and updatesLoading and upgrading of software through the XModem
Command line interface configuration
Configuration through console port
Remote configuration through Telnet or SSH
Configuration through dialing the Modem
SNMP v1/2c/3
System log
Level alarms
Output of debugging information
Ping and Tracert
Remote maintenance with Telnet, Modem and SSHv2
protocol
Loading and upgrading of software through File Transfer
Protocol (FTP) , Trivial File Transfer Protocol (TFTP) and Secure File
Transfer Protocol (SFTP)
Logging in to the
Switch
Setting up
Configuration
Environment through
the Console Port
This section describes how to log in to the switch.
Perform the following procedure to set up the configuration environment through
the console port.
1 To set up the local configuration environment, connect the serial port of a PC (or a
terminal) to the console port of the Switch with the console cable (see Figure 2).
Figure 2 Setting up the Local Configuration Environment through the Console Port
2 Run terminal emulator (such as Terminal on Windows 3X or the Hyper Terminal on
Windows 9X) on the PC. Set the terminal communication parameters as follows:
■ Baud rate = 19200
■ Databit = 8
■ Parity check = none
■ Stopbit = 1
■ Flow control = none
■ Terminal type = VT100
30 CHAPTER 1: GETTING STARTED
Figure 3 Setting up a New Connection
Figure 4 Configuring the Port for Connection
Loading...
+ 656 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.