Manual Do Utilizadoríndice analítico3Com® Switch 5500 Family Configuration Guide1Contents3About This Guide21Organization of the Manual21Intended Readership22Conventions22Related Manuals23Getting Started25Product Overview25XRN Overview26Major Technologies26Typical Networking Topology26Product Features27Logging in to the Switch29Setting up Configuration Environment through the Console Port29Setting up Configuration Environment through Telnet31Setting up Configuration Environment through a Dial-up Modem33Command Line Interface37Command Line View37Features and Functions of Command Line40User Interface Configuration42User Interface Configuration43Displaying and Debugging User Interface49Address Management Configuration51Introduction to Address Management51Configuring Address Management51Configuring a Port-Based Address Management IP Address Pool51Binding the MAC Address and IP Address of a Legal User to the Specified Port51Address Management Configuration Example52Port-Based Address Management IP Address Pool Configuration Example52Configuration Example of Binding the MAC Address and IP Address of a Legal User53Port Operation55Ethernet Port Configuration Introduction55Ethernet Port Configuration55EthernetPort Security Features62Displaying and Debugging Ethernet Port66Displaying Port Configuration Information in Brief67Ethernet Port Configuration Example67Ethernet Port Troubleshooting68Link Aggregation Configuration68Link Aggregation Configuration71Displaying and Debugging Link Aggregation74Link Aggregation Configuration Example75Global Broadcast Suppression Feature76Configuring Global Broadcast Suppression76Global Broadcast Suppression Configuration Example76Configuration procedure76Displaying Information About a Specified Optical Port77XRN Configuration79Introduction to XRN79Configuring an XRN Fabric79Specifying the Stacking VLAN of the Switch80Setting Unit IDs for Switches80Saving the Unit ID of Each Unit in the Fabric81Specifying the Fabric Port of the Switch81Setting Unit Names for Switches81Setting a Fabric Name for Switches81Setting an XRN Authentication Mode for Switches82Displaying and Debugging a Fabric82Fabric Configuration Example82RMON on XRN83Configuration Commands for RMON on XRN84Clustering on XRN84Peer Fabric Port Detection84Work Flow of the Peer Fabric Port Detection Function84Prompt Information and Solution85Multiple Fabric Port Candidates86DLDP Configuration89DLDP Overview89DLDP Fundamentals90Precautions During DLDP Configuration93DLDP Configuration93Resetting DLDP Status94DLDP Configuration Example94VLAN Operation97VLAN Configuration97VLAN Overview97Configuring a VLAN97Displaying and Debugging VLAN99VLAN Configuration Example One99VLAN Configuration Example Two100Protocol-Based VLAN Configuration100Configuring Protocol-Based VLANs100Displaying the Information about Protocol-Based VLANs101Voice VLAN Configuration102Voice VLAN Configuration102Displaying and Debugging of Voice VLAN106Voice VLAN Configuration Example106Creating VLANs in Batches107Voice VLAN Configuration107Configuring the Voice VLAN Function108Voice VLAN Displaying and Debugging109Voice VLAN Configuration Example109GVRP Configuration111Introduction to GVRP111GVRP Working Scheme111GVRP Packet Format113Protocol Specifications113GVRP Configuration114Configuration Prerequisite114Configuration Procedure114Configuration Example115Displaying GVRP116VLAN-VPN Configuration117VLAN-VPN Overview117Implementation of VLAN-VPN117Adjusting the TPID Values of VLAN-VPN Packet118VLAN-VPN Configuration118Configuration Prerequisites118Configuration procedure118Inner VLAN Tag Priority Replication Configuration119Configuration Prerequisites119Configuration procedure119TPID Adjusting Configuration119Configuration Prerequisites119Configuration Procedure119VLAN-VPN Configuration Example120Network requirements120Network diagram120Configuration Procedure121DHCP Overview123Introduction to DHCP123DHCP IP Address Assignment124IP Address Assignment Policy124DHCP IP Address Preferences124Sending Device Information through DHCP Option60124DHCP Server Configuration125Introduction to DHCP Server125Usage of DHCP Server125DHCP Fundamentals125DHCP Packet Processing Modes127DHCP Address Pool127Global Address Pool-Based DHCP Server Configuration128Configuration Overview128Enabling DHCP128Configuring Global Address Pool Mode on Interface(s)129Configuring How to Assign IP Addresses in a Global Address Pool129Configuring DNS Services for DHCP Clients130Configuring NetBIOS Services for DHCP Clients131Customizing DHCP Service132Configuring Gateway Addresses for DHCP Clients132Interface Address Pool-based DHCP Server Configuration132Configuration Overview132Enabling DHCP133Configuring to Assign the IP addresses of Local Interface-based address pools to DHCP Clients133Configuring to Assign IP Addresses of Interface-based Address Pools to DHCP Clients133Configuring DNS Services for DHCP Clients135Configuring NetBIOS Services for DHCP Clients136Customizing DHCP Service137DHCP Security Configuration137Prerequisites137Configuring Private DHCP Server Detecting137Configuring IP Address Detecting137Option 184 Supporting Configuration138Prerequisites139Configuring the Option 184 Supporting Function139Configuration Example142DHCP Server Displaying and Debugging144DHCP Server Configuration Example144Troubleshooting DHCP Server146DHCP Relay Configuration147Introduction to DHCP Relay147Usage of DHCP Relay147DHCP Relay Fundamentals147DHCP Relay Configuration148DHCP Relay Configuration Tasks148Enabling DHCP148Configuring an Interface to Operate in DHCP Relay Mode148DHCP Relay Displaying149DHCP Relay Configuration Example149Troubleshooting DHCP Relay150VRRP Configuration151VRRP Overview151Virtual Router Overview152Introduction to Backup Group153VRRP Configuration155Configuring a Virtual Router IP address155Configuring Backup Group-Related Parameters156Displaying and Clearing VRRP Information157VRRP Configuration Example157Single-VRRP Backup Group Configuration Example157VRRP Tracking Interface Example158Multiple-VRRP Backup Group Configuration Example160Troubleshooting VRRP162MSTP Configuration163MSTP Overview163MSTP Protocol Data Unit163Basic MSTP Terminologies164Fundamentals of MSTP166MSTP Implementation on Switches168Root Bridge Configuration168Configuring an MST Region169Setting the Switch as the Root/Secondary Root Bridge170Setting the Bridge Priority of a Switch171Configuring MSTP Operation Mode172Configuring the Maximum Hop Count of an MST Region172Configuring the Diameter of a Switched Network173Configuring MSTP Time Parameters173Configuring the Timeout Time Factor175Configuring the Maximum Transmission Speed of a Port175Setting a Port as an Edge Port176Specifying whether a Port Connect to Point-to-Point Link177Enabling MSTP179Leaf Node Configuration180Prerequisites180Configuring an MST Region180Configuring MSTP Operation Mode181Configuring the Timeout Time Factor181Configuring the Maximum Transmission Speed of a Port181Setting a Port as an Edge Port181Configuring the Path Cost of a Port181Configuring the Priority of a Port183Configuring a Port to Connect to Point-to-Point Link184Enabling MSTP184mCheck Configuration184Prerequisites184Configuration Procedure185Configuration Example185Protection Functions Configuration185Introduction to the Protection Functions185Prerequisites186Configuring BPDU Protection187Configuring Root Protection187Configuring Loop Prevention188Configuring TC-BPDU Attack Prevention188BPDU Tunnel Configuration188Introduction to BPDU Tunnel188Configuring BPDU Tunnel189Displaying and Debugging MSTP190MSTP Configuration Example190BPDU Tunnel Configuration Example192Centralized MAC Address Authentication Configuration195Introduction to Centralized MAC Address Authentication195Centralized MAC Address Authentication Configuration196Enabling Global/Port-based Centralized MAC Address Authentication196Configuring an ISP Domain for MAC Address Authentication Users196Setting Centralized MAC Address Authentication Timers196Displaying and Debugging Centralized MAC Address Authentication197Centralized MAC Address Authentication Configuration Example197SSH Terminal Services199SSH Terminal Services199Introduction to SSH199SSH Server Configuration201SSH Client Configuration205Displaying SSH Configuration205SSH Server Configuration Example206SSH Client Configuration Example207SSH Keygen Program209SFTP Service210SFTP Overview210SFTP Server Configuration210SFTP Client Configuration211SFTP Configuration Example213IP Routing Protocol Operation217IP Routing Protocol Overview217Selecting Routes Through the Routing Table218Routing Management Policy219Static Routes220Configuring Static Routes221Example: Typical Static Route Configuration223Troubleshooting Static Routes224RIP224Configuring RIP225Traffic Sharing Across RIP Interfaces233Displaying and Debugging RIP233Example: Typical RIP Configuration233Troubleshooting RIP234OSPF Configuration235Calculating OSPF Routes235Basic Concepts Related to OSPF236Configuring OSPF237Displaying and Debugging OSPF253Example: Configuring DR Election Based on OSPF Priority254Example: Configuring OSPF Virtual Link256Troubleshooting OSPF257IP Routing Policy258Configuring an IP Routing Policy259Forwarding Layer 3 Broadcast Packets263Displaying and Debugging the Routing Policy264Typical IP Routing Policy Configuration Example264Troubleshooting Routing Protocols265Route Capacity Configuration265Limiting Route Capacity266Route Capacity Configuration266Displaying and Debugging Route Capacity267Network Protocol Operation269IP Address Configuration269IP Address Overview269Configuring IP Address271Displaying and Debugging IP Address272IP Address Configuration Example273Troubleshooting IP Address Configuration273ARP Configuration273Configuring ARP274Introduction to Gratuitous ARP275Gratuitous ARP Packet Learning Configuration276Resilient ARP Configuration277Displaying and Debugging Resilient ARP Configuration278Resilient ARP Configuration Example278BOOTP Client Configuration279Overview of BOOTP Client279BOOTP Client Configuration280Debugging BOOTP Client280DHCP Configuration280Overview of DHCP280Option 82 supporting283DHCP Client Configuration285DHCP Relay Configuration286Enabling DHCP286Configuring DHCP Relay Security287Option 82 Supporting Configuration288Prerequisites288Enabling Option 82 Supporting on a DHCP Relay288Option 82 Supporting Configuration Example289Introduction to DHCP Snooping290DHCP Snooping Configuration291Configuration Example292Introduction to DHCP Accounting292Structure of the DHCP Accounting Packets292DHCP Accounting Fundamentals294DHCP Accounting Configuration294Displaying and Debugging DHCP Configuration296DHCP Relay Configuration Example One297DHCP Relay Configuration Example Two298Troubleshooting DHCP Relay Configuration299Access Management Configuration299Access Management Overview299Configuring Access Management299Displaying and Debugging Access Management301Access Management Configuration Example302Access Management using the Web302UDP Helper Configuration303Overview of UDP Helper303UDP Helper Configuration303Displaying and Debugging UDP Helper Configuration305UDP Helper Configuration Example305IP Performance Configuration305Displaying and debugging IP Performance306Troubleshooting IP Performance307Multicast Protocol309IP Multicast Overview309Multicast Addresses310IP Multicast Protocols312Forwarding IP Multicast Packets313Applying Multicast314IGMP Snooping314Configuring IGMP Snooping317Enabling IGMP Fast Leave Processing318Configuring IGMP Snooping Filter ACL319Configuring the Maximum Number of Multicast Groups on a Port319Configuring Multicast VLAN320Displaying and Debugging IGMP Snooping321Configuration Example-Enable IGMP Snooping322IGMP Snooping Fault Diagnosis and Troubleshooting322Common Multicast Configuration323Enabling Multicast323Configuring the Number Limit of Multicast Routing Entries323Multicast MAC Address Entry Configuration324Displaying Multicast MAC Address Configuration324Multicast Source Deny Configuration325Clearing MFC Forwarding Entries or Statistics Information325Clearing Route Entries From The Core Multicast Routing Table325Displaying and Debugging Common Multicast Configuration326Internet Group Management Protocol (IGMP)326Configuring IGMP328Displaying and debugging IGMP333PIM-DM Overview333Configuring PIM-DM335Displaying and Debugging PIM-DM338PIM-DM Configuration Example338PIM-SM Overview339PIM-SM Operating Principle340Preparations before Configuring PIM-SM341Configuring PIM-SM341Displaying and Debugging PIM-SM346PIM-SM Configuration Example346ACL Configuration351Brief Introduction to ACL351ACL Supported by the Switch352Configuring ACL352Defining ACL353Activating ACL355Displaying and Debugging ACL356Advanced ACL Configuration Example356Basic ACL Configuration Example357Link ACL Configuration Example358QoS Configuration359QoS Configuration361Setting Port Priority361Configuring the Priority for Protocol Packets361Setting Port Mirroring362Configuring Traffic Mirroring362Setting Traffic Limit364Setting Line Limit365Relabeling Priority Level365Configuring Traffic Statistics365Configuring WRED Operation366Configuring Control Over Telnet366Displaying and Debugging QoS Configuration369QoS Configuration Example369Port Mirroring Configuration Example370Priority Relabeling Configuration Example371QoS Profile Configuration372Configuring QoS Profile372Configuring Profile Application Mode373Applying QoS Profile to the Port374QoS Profile Configuration Example374ACL Control Configuration376Configuring ACL for Telnet Users376Defining ACL376Importing ACL377Configuration Example377Configuring ACL for SNMP Users377Configuration Example379Configuring ACL Control over the HTTP Users379Defining ACL379Calling ACL to Control HTTP Users379Configuration Example380Configuration for QoS Features381RSPAN Features381Configuration Prerequisite382Configuration Procedures in the Source Switch383Configuration Procedures in the Intermediate Switch383Configuration Procedures in the Source Switch384Configuration Example384Features of Traffic Statistics386Improving the Depth First Order of ACL Matching386Displaying Information of the display acl command387Subdividing DSCP while Defining ACL Rules387The Synchronization Feature of Queue Scheduling for Aggregation Ports388Configuring Control Over Telnet388Configuration Preparation388Controlling Telnet using Source IP389Controlling Telnet using Source IP and Destination IP389Controlling Telnet using Source MAC390Configuration Example390802.1x Configuration391IEEE 802.1x Overview391802.1x System Architecture391802.1x Authentication Process392Implementing 802.1x on the Switch393Configuring 802.1x393Enabling/Disabling 802.1x393Setting the Port Access Control Mode394Setting the Port Access Control Method394Checking the Users that Log on the Switch using Proxy394Setting the User Number on a Port395Setting the Authentication in DHCP Environment395Configuring the Authentication Method for 802.1x User395802.1x PEAP Configuration395Setting the Maximum Times of Authentication Request Message Retransmission397Configuring Timers398Enabling/Disabling a Quiet-Period Timer399802.1x Client Version Checking Configuration399Enabling the 802.1x Client Version Checking Function399Configuring the Maximum Number of Retires to Send Version Checking Request Packets399Configuring the Version Checking Timer400802.1x Client Version Checking Configuration Example400Guest VLAN Configuration400Guest VLAN Configuration401Configure Guest VLAN in Ethernet port view401Guest VLAN Configuration Example401The 802.1x Trusted MAC Address Synchronization Function402802.1x Supplicant System Checking402Displaying and Debugging 802.1x403Auto QoS403802.1x Configuration Example403Centralized MAC Address Authentication405Centralized MAC Address Authentication Configuration406Enabling MAC Address Authentication Both Globally and On the Port406Configuring Centralized MAC Address Authentication Mode406Configuring the User Name and Password for Fixed Mode407Configuring Domain Name Used by the MAC Address Authentication User407Configuring Centralized MAC Address Authentication Timers407Displaying and Debugging Centralized MAC Address Authentication408Auto VLAN408Configuration Example of Centralized MAC Address Authentication408AAA and RADIUS Protocol Configuration409RADIUS Protocol Overview409Implementing AAA/RADIUS on the Ethernet Switch410Configuring AAA410Creating/Deleting an ISP Domain411Configuring Relevant Attributes of the ISP Domain411AAA Separation413Configuring Separate AAA Schemes414Configuration Example for Separate AAA Schemes414Enabling/Disabling the Messenger Alert415Configuring Self-Service Server URL416Dynamic VLAN Assignment417Configuring Dynamic VLAN Assignment417Configuration Example for Dynamic VLAN Assignment417Creating a Local User418Setting Attributes of the Local User419Disconnecting a User by Force420Configuring the RADIUS Protocol420Creating/Deleting a RADIUS Scheme421Configuring RADIUS Authentication/ Authorization Servers421Configuring RADIUS Accounting Servers and the Related Attributes422User Re-authentication at Reboot424Configuring User Re-authentication at Reboot425Configuration Example for User Re-authentication at Reboot425Setting the RADIUS Packet Encryption Key425Tag VLAN Assignment on Trunk/Hybrid Port Supported by 802.1x Authentication426Identifier Authentication Method Attribute in RADIUS426Setting Retransmission Times of RADIUS Request Packet426Setting the Supported Type of the RADIUS Server426Setting the RADIUS Server State427Setting the Username Format Transmitted to the RADIUS Server427Setting the Unit of Data Flow that Transmitted to the RADIUS Server428Configuring the Local RADIUS Authentication Server428Configuring Source Address for RADIUS Packets Sent by NAS428Setting the Timers of the RADIUS Server429Displaying and Debugging AAA and RADIUS Protocol430AAA and RADIUS Protocol Configuration Example431Configuring the Switch 5500433AAA and RADIUS Protocol Fault Diagnosis and Troubleshooting435Problem Diagnosis4363Com-User-Access-Level436File System Management437File System Overview437Directory Operation438File Attribute Configuration438File Attribute Configuration439File Operation440Storage Device Operation440Setting the Prompt Mode of the File System441Configuring File Management441Displaying the Current-configuration and Saved-configuration of the Switch441Saving the Current-configuration442Erasing Configuration Files from Flash Memory442Configuring the Name of the Configuration File used for the Next Startup.442Configuration File Backup and Restoration443Configuration Preparation443FTP Overview443Enabling/Disabling FTP Server444Configuring Source IP Address for FTP Serve and Client444Configuring the FTP Server Authentication and Authorization445Configuring the Running Parameters of FTP Server445Displaying and Debugging FTP Server446Displaying the Source IP Address Configuration446Introduction to FTP Client446FTP Server Configuration Example448TFTP Overview449Downloading Files by means of TFTP450Uploading Files by means of TFTP450TFTP Client Configuration Example450MAC Address Table Management451MAC Address Table Configuration452Displaying MAC Address Table454MAC Address Table Management Display Example454MAC Address Table Management Configuration Example455Device Management456Device Management Configuration456Device Management Configuration Example457System Maintenance and Debugging459Setting the Daylight Saving Time459Telneting with Specified Source IP Address/Source Interface IP Address459Basic System Configuration460Terminating the FTP Connection of a Specified User461Restarting the Switch461Displaying the State and Information of the System461System Debugging462Testing Tools for Network Connection464ping464tracert464Introduction to Remote-ping465Remote-ping Configuration466Introduction to Remote-ping Configuration466Configuring Remote-ping466Configuration Example467Logging Function468Introduction to Info-center468Info-Center Configuration471Sending the Information to Loghost474Sending the Information to Control Terminal476Sending the Information to Telnet Terminal or Dumb Terminal478Sending the Information to the Log Buffer480Sending the Information to the Trap Buffer481Sending the Information to SNMP Network Management482Configuring Synchronous Information Output Function485Configuration Examples of Sending Log to Unix Loghost485Configuration Examples for Sending Log to Linux Loghost486Configuration Examples of Sending Log to Control Terminal488RMON Configuration489Configuring RMON489Displaying and Debugging RMON491RMON Configuration Example492NTP Overview492NTP Configuration494Configuring NTP Operating Mode494Displaying and Debugging NTP499Typical NTP Configuration Examples499Configure NTP Server499NTP peer Configuration501Configure NTP Broadcast Mode502Configure NTP Multicast Mode504Configure Authentication-enabled NTP Server Mode505SSH Terminal Services506Configuring SSH Server507Setting System Protocol507Configuring SSH Client510SSH Configuration Example515File System Configuration516Introduction to File System516File System Configuration517FTP Lighting Configuration518Introduction to FTP518FTP Lighting Procedure518TFTP Lighting Configuration520TFTP Lighting Procedure521Port Tracking Configuration523Introduction to the Port Tracking Function523Port Tracking Configuration523Configuring the Port Tracking Function523Port Tracking Configuration Example523Dynamically Apply ACL by RADIUS Server Configuration525Introduction to Dynamically Apply ACL by RADIUS Server525Introduction to Dynamically Apply ACL by RADIUS Server Configurations525Configuration Example526Network requirements526Network diagram526Configuration procedure527Configuration on the switch529Auto Detect Configuration531Introduction to the Auto Detect Function531Configuring the auto detect function531Auto Detect Configuration Example531Auto Detect Implementation532Auto Detect Implementation in Static Routing533Configuring the Auto Detect Function for a Static Route533Configuration Example533Auto Detect Implementation in VRRP534Configuring the Auto Detect Function for VRRP534Configuration Example534Auto Detect Implementation in VLAN Interface Backup536Configuring the Auto Detect Function for VLAN Interface Backup536Configuration Example536RSTP Configuration539STP Overview539Implement STP539Configuration BPDU Forwarding Mechanism in STP543Implement RSTP on the Switch543RSTP Configuration544Enable/Disable RSTP on a Switch547Enable/Disable RSTP on a Port547Configure RSTP Operating Mode548Configure the STP-Ignore attribute of VLANs on a Switch548Set Priority of a Specified Bridge549Specify the Switch as Primary or Secondary Root Bridge549Set Forward Delay of a Specified Bridge550Set Hello Time of the Specified Bridge550Set Max Age of the Specified Bridge550Set Timeout Factor of the Bridge551Specifying the Maximum Transmission Rate of STP Packets on a Port551Set Specified Port to be an EdgePort552Specifying the Path Cost on a Port552Set the Priority of a Specified Port553Configure a Specified Port to be Connected to Point-to-Point Link553Set mCheck of the Specified Port554Configure the Switch Security Function554Display and Debug RSTP556RSTP Configuration Example556PoE Profile Configuration559Introduction to PoE Profile559PoE Profile Configuration559PoE Profile Configuration Tasks559PoE Profile Configuration Example560SNMP Configuration563SNMP Configuration Introduction563SNMP Versions and Supported MIB563Configure SNMP565Enabling/Disabling SNMP Agent to Send Trap566Setting the Destination Address of Trap566Setting Lifetime of Trap Message567Setting SNMP System Information567Setting the Engine ID of a Local or Remote Device567Setting/Deleting an SNMP Group567Setting the Source Address of Trap568Adding/Deleting a User to/from an SNMP Group568Creating/Updating View Information or Deleting a View568Setting the Size of SNMP Packet Sent/Received by an Agent568Enabling/Disabling a Port Transmitting Trap Information SNMP Agent569Disabling SNMP Agent569Network Management Operation Logging Configuration569Displaying and Debugging SNMP570SNMP Configuration Example570Reading Usmusr Table Configuration Example571Source IP Address Configuration573Configuring Source IP Address for Service Packets573Displaying the Source IP Address Configuration574Password Control Configuration Operations575Introduction to Password Control Configuration575Password Control Configuration576Configuration Prerequisites576Configuration Tasks576Configuring Password Aging577Configuring the Limitation of Minimum Password Length578Configuring History Password Recording579Configuring a User Login Password in Encryption Mode580Configuring Login Attempts Limitation and Failure Processing Mode580Configuring the Timeout Time for Users to be authenticated581Displaying Password Control581Password Control Configuration Example582MSDP Configuration585Introduction to MSDP585MSDP Working Mechanism587Configuring MSDP Basic Functions590Configuration Prerequisites590Configuring MSDP Basic Functions591Configuring Connection Between MSDP Peers591Configuration Prerequisites591Configuring Description Information for MSDP Peers592Configuring Anycast RP Application592Configuring an MSDP Mesh Group592Configuring MSDP Peer Connection Control593Configuring SA Message Transmission593Configuration Prerequisites593Configuring the Transmission and Filtering of SA Request Messages594Configuring a Rule for Filtering the Multicast Sources of SA Messages594Configuring a Rule for Filtering Received and Forwarded SA Messages595Configuring SA Message Cache595Displaying and Debugging MSDP Configuration596MSDP Configuration Example596Configuration Example of Anycast RP Application596Troubleshooting MSDP Configuration599MSDP Peer Always in the Down State599No SA Entry in the SA Cache of the Router599Clustering601Clustering Overview601Switch Roles602Introduction to NDP603Introduction to NTDP603Introduction to Cluster Roles604Management Device Configuration605Enabling System and Port NDP605Configuring NDP Parameters605Enabling System and Port NTDP605Configuring NTDP Parameters605Configuring Cluster Parameters606Configuring Internal-External Interaction607NM Interface for Cluster Management Configuration607Member Device Configuration608Enabling System and Port NDP608Enabling System and Port NTDP608Specifying the cluster FTP/TFTP server608Configuring Cluster Parameters609Displaying and Maintaining Cluster Configurations609Clustering Configuration Example610NM Interface for Cluster Management Configuration Example612HWTACACS Configuration615Configuring HWTACACS615HWTACACS configuration tasks615Creating a HWTACAS Scheme616Configuring HWTACACS Authentication Servers617Configuring HWTACACS Accounting Servers and the Related Attributes617Configuring Source Address for HWTACACS Packets Sent by NAS618Setting a Key for Securing the Communication with TACACS Server618Setting the Username Format Acceptable to the TACACS Server618Setting the Unit of Data Flows Destined for the TACACS Server619Setting Timers Regarding TACACS Server619Displaying and Debugging HWTACACS Protocol620HWTACACS Protocol Configuration Example621Configuring the FTP/Telnet User Authentication at a Remote TACACS Server621Password Recovery Process623Introduction623CLI Commands Controlling Bootrom Access623Bootrom Interface624Displaying all Files in Flash624Skipping the Current Configuration File625Bootrom Passwords625Bootrom Password Recovery626RADIUS Server and RADIUS Client Setup627Setting Up A RADIUS Server627Configuring Microsoft IAS RADIUS627Configuring Funk RADIUS652Configuring FreeRADIUS656Setting Up the RADIUS Client658Windows 2000 built-in client658Windows XP built-in client658Aegis Client Installation659Authenticating the Switch 5500 with Cisco Secure ACS661Cisco Secure ACS (TACACS+) and the 3Com Switch 5500661Setting Up the Cisco Secure ACS (TACACS+) server661Adding a 3Com Switch 5500 as a RADIUS client662Adding a User for Network Login664Adding a User for Switch Login6653Com XRN671What is XRN?672Supported Switches672XRN Terminology672Benefits of XRN673XRN Features673Distributed Device Management (DDM)673Distributed Resilient Routing (DRR)673Distributed Link Aggregation (DLA)674How to Implement XRN-Overview676Important Considerations and Recommendations676Recommendations for Achieving Maximum Resilience677Unit ID Numbering Mechanism678Network Example using XRN678XRN Distributed Fabric Network678Recovering your XRN Network680Unit Failure680Interconnect Failure680How XRN Interacts with other 3Com Switches680How XRN Interacts with other Features681VLANs681Legacy Aggregated Links682STP/RSTP683Resilient Links683How a Failure affects the Distributed Fabric684Loss of a Switch within the XRN Distributed Fabric684Loss of the Fabric Interconnect685Tamanho: 9 MBPáginas: 686Language: EnglishAbrir o manual