H3C WX5540E Access Controller Switching EngineWeb-Based Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.c
v Creating a link aggregation group ··················································································································
90 Figure 83 Configuring an event group Figure 84 Displaying the index of an event entry 4. Configure an alarm group to sample received bytes on
91 Figure 85 Configuring an alarm group Verifying the configuration After the above configuration, when the alarm event is triggered, you can view
92 Configuring energy saving Energy saving enables a port to work at the lowest transmission speed, disable PoE, or go down during a specific time ra
93 Item Description Shutdown Shut down the port. An energy saving policy can have all the three energy saving schemes configured, of which the shutdo
94 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proce
95 • Set—The NMS modifies the value of an object node in an agent MIB. • Notifications—Includes traps and informs. SNMP agent sends traps or inform
96 Table 33 SNMPv3 configuration task list Step Remarks 1. Enabling SNMP agent Required. The SNMP agent function is disabled by default. IMPORTANT:
97 Figure 90 Setup tab 2. Configure SNMP settings on the upper part of the page, as described in Table 34. 3. Click Apply. Table 34 Configuration
98 Configuring an SNMP view Creating an SNMP view 1. From the navigation tree, select Device > SNMP. 2. Click the View tab. The View tab appears
99 Figure 93 Creating an SNMP view (2) 6. Configure the parameters, as described in Table 35. 7. Click Add to add the rule into the list box at t
1 Configuration wizard The configuration wizard guides you through configuring the basic service parameters, including the system name, system locatio
100 Figure 94 Adding rules to an SNMP view 4. Configure the parameters, as described in Table 35. 5. Click Apply. NOTE: You can modify the rul
101 Figure 96 Creating an SNMP Community 4. Configure the SNMP community, as described in Table 36. 5. Click Apply. Table 36 Configuration items
102 3. Click Add. The Add SNMP Group page appears. Figure 98 Creating an SNMP group 4. Configure SNMP group, as described in Table 37. 5. Click
103 2. Click the User tab. The User tab appears. Figure 99 SNMP user 3. Click Add. The Add SNMP User page appears. Figure 100 Creating an SNMP us
104 Item Description Security Level Select the security level for the SNMP group. The available security levels are: • NoAuth/NoPriv—No authenticati
105 Figure 101 Traps configuration 3. Select Enable SNMP Trap. 4. Click Apply to enable the SNMP trap function. 5. Click Add. The page for addin
106 Table 39 Configuration items Item Description Destination IP Address Set the destination IP address. Select the IP address type: IPv4/domain name
107 Figure 103 SNMP packet statistics SNMPv1/v2c configuration example Network requirements As shown in Figure 104, the NMS at 1.1.1.2/24 uses SNMPv
108 Figure 105 Configuring the SNMP agent b. Select the Enable option, and select the v1 and v2 options. c. Click Apply. 2. Configure a read-onl
109 Figure 107 Configuring an SNMP read and write community b. In the Community Name field, enter private. c. From the Access Right list, select
2 Figure 2 System parameter configuration page 2. Configure the parameters as described in Table 1. Table 1 Configuration items Item Description Sy
110 Figure 109 Adding a trap target host b. Select the IPv4/Domain option, enter 1.1.1.2 in the following field, type public in the Security Name
111 Figure 110 Network diagram Configuring the agent 1. Enable SNMP agent: a. From the navigation tree, select Device > SNMP. The SNMP configu
112 f. Click Apply. A configuration progress dialog box appears. g. Click Close after the configuration process is complete. Figure 113 Creating an
113 The page in Figure 115 appears. c. Enter user1 in the User Name field, select Auth/Priv from the Security Level list, select group1 from the Gr
114 b. Select the box of Enable SNMP Trap. c. Click Apply. 6. Configure a target host SNMP traps: a. On the Trap tab page, click Add. The page fo
115 Displaying interface statistics Overview The interface statistics module displays statistics about the packets received and sent through interfac
116 Field Description OutErrors Number of invalid packets sent through the interface.
117 OAP management Overview In OAA, an Open Application Platform (OAP) module and the device work as one device. For an SNMP UDP domain-based NMS, th
118 Configuring VLANs Overview Ethernet is a network technology based on the CSMA/CD mechanism. As the medium is shared, collisions and excessive bro
119 Figure 121 Traditional Ethernet frame format IEEE 802.1Q inserts a four-byte VLAN tag after the DA&SA field, as shown in Figure 122. Figur
3 Figure 3 Management IP address configuration page 2. Configure the parameters as described in Table 2. Table 2 Configuration items Item Descripti
120 Port-based VLAN Port-based VLANs group VLAN members by port. A port forwards traffic for a VLAN only after it is assigned to the VLAN. Port link
121 PVID By default, VLAN 1 is the PVID for all ports. You can change the PVID for a port, as required. Use the following guidelines when you configu
122 Recommended VLAN configuration procedures Recommended configuration procedure for assigning an access port to a VLAN Step Remarks 1. Creating VL
123 Step Remarks 3. Setting the PVID for a port. Configure the PVID of the trunk port. Required. A trunk port has only one untagged VLAN and the unt
124 Step Remarks 3. Setting the PVID for a port. Optional. Configure the PVID of the hybrid port. By default, the PVID of a hybrid port is VLAN 1.
125 Figure 124 Creating VLANs Table 41 Configuration items Item Description VLAN IDs IDs of the VLANs to be created. Modify the description of the
126 7. Click Close on the progress dialog box when the dialog box prompts that the configuration succeeds. Figure 125 Modifying ports Setting the
127 Figure 126 Modifying the PVID for a port Selecting a VLAN 1. Select Network > VLAN from the navigation tree. The Select VLAN tab is displa
128 2. Select the Display all VLANs option to display all VLANs, or select the Display a subnet of all configured VLANs option to enter the VLAN IDs
129 Item Description Select membership type Set the member type of the port to be modified in the VLAN: • Untagged—Configures the port to send the t
4 Item Description Configure IPv4 address DHCP Configure how the VLAN interface obtains an IPv4 address: • DHCP—Obtain an IP address through DHCP. Th
130 Table 43 Configuration items Item Description Select Ports Select the ports to be modified. Select membership type Set the member types of the s
131 Figure 131 Configuring GigabitEthernet 1/0/1 as a trunk port and its PVID as 100 2. Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100: a.
132 Figure 132 Creating VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 3. Assign GigabitEthernet 1/0/1 to VLAN 100 as an untagged member: a. Click
133 f. Click Apply. A configuration progress dialog box appears. g. After the configuration process is complete, click Close. Figure 134 Assignin
134 Figure 135 Assigning GigabitEthernet 1/0/1 to VLAN 2 and to VLANs 6 through 50 as a tagged member Configuring Switch B Configure Switch B as yo
135 Configuring VLAN interfaces Before creating a VLAN interface, you must create the corresponding VLAN in Network > VLAN. For more information,
136 3. Configure the VLAN interface as described in Table 44. 4. Click Apply. Table 44 Configuration items Item Description Input a VLAN ID: Ent
137 Figure 137 Modifying a VLAN interface 3. Modify a VLAN interface as described in Table 45. 4. Click Apply. Table 45 Configuration items Ite
138 Item Description Admin Status Select Up or Down from the Admin Status list to bring up or shut down the selected VLAN interface. When the VLAN
139 Item Description EUI-64 Select the box to generate IPv6 site-local addresses or global unicast addresses in the 64-bit Extended Unique Identifie
5 Figure 4 Configuration complete
140 Configuring a voice VLAN Overview A voice VLAN is dedicated to voice traffic. After the ports connecting to voice devices are assigned to a voice
141 You can configure an aging timer for the voice VLAN. The system will remove the port from the voice VLAN when the aging timer expires if no voice
142 Table 47 Required configurations on ports of different link types for them to support tagged voice traffic Port link type Voice VLAN assignment m
143 Table 49 How a voice VLAN-enable port processes packets in security/normal mode Voice VLAN operating mode Packet type Packet processing mode Sec
144 Recommended configuration procedure for a port in automatic voice VLAN assignment mode Step Remarks 1. Configuring voice VLAN globally. Optional
145 2. Click the Setup tab. Figure 140 Configuring voice VLAN 3. Configure the global voice VLAN settings as described in Table 50. 4. Click Ap
146 3. Configure the voice VLAN function for ports as described in Table 51. 4. Click Apply. Table 51 Configuration items Item Description Voice
147 Table 52 Configuration items Item Description OUI Address Set the source MAC address of voice traffic. Mask Set the mask length of the source MAC
148 Figure 144 Creating VLAN 2 2. Configure GigabitEthernet 1/0/1 as a hybrid port: a. Select Device > Port Management from the navigation tr
149 Figure 145 Configuring GigabitEthernet 1/0/1 as a hybrid port 3. Configure the voice VLAN function globally: a. Select Network > Voice VL
6 Accessing the controller engine from the switching engine The controller engine and the switching engine of the WX5540E use independent operating s
150 d. Enter voice VLAN ID 2. e. Select GigabitEthernet 1/0/1 from the chassis front panel. f. Click Apply. Figure 147 Configuring voice VLAN on
151 Figure 148 Adding OUI addresses to the OUI list Verifying the configuration 1. When you complete the preceding configurations, the OUI Summary
152 Figure 150 Displaying voice VLAN information Configuring a voice VLAN on a port in manual voice VLAN assignment mode Network requirements As sh
153 Configuring Switch A 1. Create VLAN 2: a. Select Network > VLAN from the navigation tree. b. Click the Create tab. c. Enter VLAN ID 2. d.
154 Figure 153 Configuring GigabitEthernet 1/0/1 as a hybrid port 3. Assign GigabitEthernet 1/0/1 to VLAN 2 as an untagged member: a. Select Netw
155 Figure 154 Assigning GigabitEthernet 1/0/1 to VLAN 2 as an untagged member 4. Configure voice VLAN on GigabitEthernet 1/0/1: a. Select Network
156 Figure 155 Configuring voice VLAN on GigabitEthernet 1/0/1 5. Add OUI addresses to the OUI list: a. Click the OUI Add tab. b. Enter OUI addr
157 Verifying the configuration 1. When you complete the preceding configurations, the OUI Summary tab is displayed by default, as shown in Figure 1
158 Configuring the MAC address table MAC address configurations related to interfaces apply to Layer 2 Ethernet interfaces and Layer 2 aggregate int
159 To improve port security, you can bind specific user devices to the port by manually adding MAC address entries to the MAC address table of the d
7 Accessing the controller engine from the switching engine's Web interface IMPORTANT: Toggle between the Web interfaces of the switching engin
160 Figure 159 MAC tab 2. Click Add in the bottom to enter the page for creating MAC address entries. Figure 160 Creating a MAC address entry 3
161 Item Description Type Set the type of the MAC address entry: • Static—Static MAC address entries that never age out. • Dynamic—Dynamic MAC addr
162 MAC address table configuration example Network requirements Use the Web-based NMS to configure the MAC address table of the device. Add a static
163 Configuring MSTP Overview As a Layer 2 management protocol, the Spanning Tree Protocol (STP) eliminates Layer 2 loops by selectively blocking red
164 Root port On a non-root bridge, the port nearest to the root bridge is the root port. The root port is responsible for communication with the roo
165 How STP works The devices on a network exchange BPDUs to identify the network topology. Configuration BPDUs contain sufficient information for th
166 { The configuration BPDU that has the lowest root bridge ID has the highest priority. { If all the configuration BPDUs have the same root brid
167 Figure 164 STP network 1. Initialize the state of each device. Table 58 Initial state of each device Device Port name BPDU of port Device
168 Device Comparison process BPDU of port after comparison Device B • Port BP1 receives the configuration BPDU of Device A {0, 0, 0, AP1}. Device
169 Device Comparison process BPDU of port after comparison After comparison: • Because the root path cost of CP2 (9) (root path cost of the BPDU
8 Web overview This chapter describes the Web interface, functions available on the Web interface, Web user levels you must have to perform a functio
170 However, the newly calculated configuration BPDU will not be propagated throughout the network immediately, so the old root ports and designated
171 MSTP features Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP and RSTP. In addition to the support for rapid network conver
172 MST region A multiple spanning tree region (MST region) consists of multiple devices in a switched network and the network segments among them. T
173 Regional root bridge The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the MSTI. Based on the
174 Figure 167 Port roles In Figure 167, devices A, B, C, and D constitute an MST region. Port 1 and port 2 of device A are connected to the common
175 How MSTP works MSTP divides an entire Layer 2 network into multiple MST regions, which are interconnected by a calculated CST. Inside an MST regi
176 Configuration guidelines When you configure MSTP, follow these guidelines: • Two devices belong to the same MST region only if they are intercon
177 Figure 168 MST region 2. Click Modify to enter the page for configuring MST regions. Figure 169 Configuring an MST region 3. Configure the
178 Configuring MSTP globally 1. Select Network > MSTP from the navigation tree. 2. Click the Global tab to enter the page for configuring MSTP
179 Item Description BPDU Guard Select whether to enable BPDU guard. BPDU guard can protect the device from malicious BPDU attacks, making the netwo
9 • Visitor—Users can use the network diagnostic tools ping and Trace Route, but they can neither access the device data nor configure the device. •
180 Item Description tc-protection Select whether to enable TC-BPDU guard. When receiving topology change (TC) BPDUs, the device flushes its forwar
181 Item Description Protection Set the type of protection to be enabled on the port: • Not Set—No protection is enabled on the port. • Edged Por
182 Table 64 Protection types Protection type Description Edged Port Set the port as an edge port. Some ports of access layer devices are directly
183 Figure 172 The port summary tab Table 65 Field description Field Description [FORWARDING] The port is in forwarding state, so the port learns
184 Field Description Point-to-point Indicates whether the port is connected to a point-to-point link: • Config—Indicates the configured value. •
185 • Packets of VLAN 10, VLAN 20, VLAN 30, and VLAN 40 are forwarded along MSTI 1, MSTI 2, MSTI 3, and MSTI 0, respectively. • Switch A and Switc
186 i. Repeat the preceding three steps to map VLAN 20 to MSTI 2 and VLAN 30 to MSTI 3 and add the VLAN-to-MSTI mapping entries to the VLAN-to-MSTI
187 Figure 176 Configuring MSTP globally (on Switch A) Configuring Switch B 1. Configure an MST region. (The procedure here is the same as that of
188 Configuring Switch C 1. Configure an MST region. (The procedure here is the same as that of configuring an MST region on Switch A.) 2. Configur
189 Figure 177 Configuring MSTP globally (on Switch D)
Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted
10 Function menu Description User level Log Setup Display and configure the buffer capacity, and interval for refreshes system logs. Configure Confi
190 Configuring link aggregation and LACP Overview Link aggregation aggregates multiple physical Ethernet ports into one logical link, also called an
191 can operate as Selected interfaces. This allows the two systems to reach an agreement on which link aggregation member ports should be placed in
192 • The system considers the ports in up state with the same port attributes and class-two configurations as the reference port as candidate selec
193 • Changing a port attribute or class-two configuration setting of a port might cause the select state of the port and other member ports to chan
194 • When a load-sharing aggregation group becomes a non-load-sharing aggregation group because of insufficient load sharing resources, one of the
195 Creating a link aggregation group 1. Select Network > Link Aggregation from the navigation tree. 2. Click Create. Figure 178 Creating a li
196 Displaying information of an aggregate interface 1. Select Network > Link Aggregation from the navigation tree. The Summary tab is displayed
197 Field Description State Select state of a member port: Selected or Unselected. Reason for being Unselected Reason why the state of a member port
198 Displaying information of LACP-enabled ports 1. Select Network > LACP from the navigation tree. The Summary tab is displayed by default. The
199 Field Description Port Port where LACP is enabled. LACP State State of LACP on the port. Port Priority LACP priority of the port. State Active
11 Function menu Description User level Interval Configuration Set an interval for collecting traffic statistics on interfaces. Configure Storm Cons
200 Figure 182 Network diagram You can create a static or dynamic link aggregation group to achieve load balancing. Method 1: Create static link ag
201 Figure 183 Creating static link aggregation group 1 Method 2: Create dynamic link aggregation group 1 1. Select Network > Link Aggregation
202 Figure 184 Creating dynamic link aggregation group 1
203 Configuring LLDP Overview In a heterogeneous network, a standard configuration exchange platform makes sure different types of network devices fr
204 Field Description FCS Frame check sequence, a 32-bit CRC value used to determine the validity of the received Ethernet frame. • LLDPDUs encaps
205 • Basic management TLVs. • Organizationally (IEEE 802.1 and IEEE 802.3) specific TLVs. • LLDP-MED (media endpoint discovery) TLVs. Basic man
206 Type Description Protocol Identity Indicates protocols supported on the port. An LLDPDU can carry multiple different TLVs of this type. DCBX Dat
207 Type Description Software Revision Allows a terminal device to advertise its software version. Serial Number Allows a terminal device to advert
208 This is the fast sending mechanism of LLDP. With this mechanism, a specific number of LLDPDUs are sent successively at the 1-second interval to h
209 Recommended LLDP configuration procedure Step Remarks 1. Enabling LLDP on ports. Optional. By default, LLDP is enabled on ports. Make sure LLDP
12 Function menu Description User level Detail Display the member port information of a VLAN. Monitor Modify VLAN Modify the description and member
210 Figure 188 The port setup tab Configuring LLDP settings on ports The Web interface allows you to set LLDP parameters for a single port, and set
211 Setting LLDP parameters for a single port 1. Select Network > LLDP from the navigation tree. By default, the Port Setup tab is displayed. 2.
212 Item Description Basic Settings LLDP Operating Mode Set the LLDP operating mode on the port or ports you are configuring: • TxRx—Sends and rece
213 Item Description DOT1 TLV Setting Port VLAN ID Select the box to include the PVID TLV in transmitted LLDPDUs. Protocol VLAN ID Select the box t
214 2. Select one or multiple ports on the port list. 3. Click Modify Selected to enter the page for modifying these ports in batch. Figure 190 M
215 Figure 191 The global setup tab 3. Set the global LLDP setup as described in Table 79. 4. Click Apply. A progress dialog box appears. 5. C
216 Item Description TTL Multiplier Set the TTL multiplier. The TTL TLV carried in an LLDPDU determines how long the device information carried in t
217 Figure 192 The local information tab Table 80 Field description Field Description Port ID subtype Port ID type: • Interface alias. • Port com
218 Field Description Port PSE priority PSE priority of the port: • Unknown—Unknown PSE priority. • Critical—Priority level 1. • High—Priority l
219 Field Description Port ID Port ID value. System capabilities supported Primary network function of the system: • Repeater. • Bridge. • Route
13 Function menu Description User level Setup Set LACP priorities. Configure LLDP Port Setup Display the LLDP configuration information, local inf
220 Field Description Media policy L2 priority Layer 2 priority. Media policy Dscp DSCP precedence. HardwareRev Hardware version of the neighbor. F
221 Figure 195 The status information tab Displaying global LLDP information 1. Select Network > LLDP from the navigation tree. 2. Click the
222 Figure 196 The global summary tab Table 82 Field description Field Description Chassis ID Local chassis ID depending on the chassis type defin
223 Field Description Device class Device class advertised by the local device: • Connectivity device—An intermediate device that provide network co
224 Figure 198 Network diagram Configuring Switch A 1. (Optional.) Enable LLDP on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. (By default, LL
225 Figure 199 The port setup tab d. Select Rx from the LLDP Operating Mode list. 3. Click Apply. A progress dialog box appears. 4. Click Clos
226 Figure 200 Setting LLDP on multiple ports 5. Enable global LLDP: a. Click the Global Setup tab, as shown in Figure 201. b. Select Enable fr
227 Configuring Switch B 1. (Optional.) Enable LLDP on port GigabitEthernet 1/0/1. (By default, LLDP is enabled on Ethernet ports.) 2. Set the LLD
228 b. Click the GigabitEthernet1/0/1 port name in the port list. c. Click the Status Information tab at the lower half of the page. The output s
229 Figure 205 The status information tab displaying the updated port status information CDP-compatible LLDP configuration example Network requirem
14 Button and icon Description Buffers settings you made and proceeds to the next step without applying the settings. This button is typically pres
230 Figure 207 Creating VLANs 2. Configure GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as trunk ports: a. Select Device > Port Management
231 Figure 208 Configuring ports 3. Configure the voice VLAN function on the two ports: a. Select Network > Voice VLAN from the navigation tre
232 Figure 209 Configuring the voice VLAN function on ports 4. Enable LLDP on ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. Skip this ste
233 Figure 210 The port setup tab b. Select port GigabitEthernet1/0/1 and GigabitEthernet1/0/2. c. Click Modify Selected. The page shown in Fig
234 A progress dialog box appears. f. Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds. F
235 Figure 212 The global setup tab Verifying the configuration Display information about LLDP neighbors on Switch A after completing the configura
236 Managing services Overview Service management allows you to manage the following types of services: FTP, Telnet, SSH, SFTP, HTTP and HTTPS. You
237 Managing services 1. Select Network > Service from the navigation tree to enter the service management configuration page, as shown in Figure
238 Item Description Port Number. Set the port number for HTTP service. You can view this configuration item by clicking the expanding button in fron
239 Using diagnostic tools This chapter describes how to use the ping and traceroute facilities. Ping You can ping the IP address or the host name o
15 Figure 8 Content display by pages Search function The Web interface provides you with the basic and advanced search functions to display only th
240 The ping configuration page appears. Figure 214 Ping configuration page 2. Enter the IP address or the host name of the destination device in
241 1. Select Network > Diagnostic Tools from the navigation tree. 2. Click the Trace Route tab. The traceroute configuration page appears. Figu
242 Index A B C D E G I L M O P R S T U V W A Accessing the controller engine from the switching engine's Web interface,7 Adding a local user,6
243 Link aggregation and LACP configuration example,199 LLDP configuration examples,223 LLDP configuration guidelines,208 Local port mirroring config
16 Figure 10 Advanced search Take the ARP table shown in Figure 8 as an example. If you want to search for the ARP entries with interface being Gig
17 Figure 12 Advanced search function example (2) Figure 13 Advanced search function example (3) Sort function The Web interface provides you wit
18 Figure 14 Basic sorting function example (based on IP address in the descending order)
19 Logging in to the Web interface You can log in to the Web interface of the switching engine through HTTP or from the access controller engine. Fig
Preface The H3C WX5540E Access Controller Switching Engine Web-Based Configuration Guide describes the web functions of the WX5540E Access Controller
20 • If you are using a Mozilla Firefox browser, you must enable JavaScript (see "Enabling JavaScript in a Firefox browser"). Enabling sec
21 Figure 17 Internet Explorer settings (2) 5. Click OK to save your settings. Enabling JavaScript in a Firefox browser 1. Launch the Firefox br
22 Figure 18 Firefox browser settings 3. Click OK to save your settings. Others • Make sure the management PC and the device can reach each oth
23 Table 5 Login settings Item Access controller engine Switching engine Username admin admin Password admin admin Default IP address 192.168.0.1
24 Figure 20 Access controller engine Web interface The login page of the access controller engine Web interface (see Figure 19) appears. 7. Enter
25 Displaying system and device information Displaying system information Select Summary from the navigation tree to enter the System Information ta
26 Item Description Hardware Version Hardware version of the device. Bootrom Version Boot ROM version of the device. Running Time System up time.
27 Figure 22 Device information Select from the Refresh Period list: • If you select a certain period, the system refreshes the information at the
28 Configuring basic device settings The device basic information feature allows you to perform the following operations: • Set the system name of t
29 Set the idle timeout period for logged-in users. Click Apply.
Symbols Convention Description WARNING An alert that calls attention to important information that if not understood or followed can result in person
30 Maintaining devices Upgrading software IMPORTANT: Software upgrade takes some time. Avoid performing any operation on the Web interface during th
31 Item Description File Type Type of the boot file for the next boot: • Main—Boots the device. • Backup—Boots the device when the main boot file i
32 { If you do not select the box, the system reboots the device directly. 6. Log in to the Web interface again after the device reboots. Generatin
33 Configuring system time System time overview You must configure a correct system time so that the device can work properly with other devices. Sys
34 Figure 30 Calendar page 3. Either enter the system date and time in the field, or select the date and time in the calendar, where you can do on
35 Table 9 Configuration items Item Description Clock status Display the synchronization status of the system clock. Source Interface Set the sourc
36 3. Configure the time zone and daylight saving time. 4. Click Apply. Table 10 Configuration items Item Description Time Zone Set the time zone
37 a. Select Device > System Time from the navigation tree. b. Click the Network Time Protocol tab. c. Enter 24 in the ID field, enter aNiceKey
38 Managing logs System logs record network and device information, including running status and configuration changes. With system logs, administrat
39 2. View system logs. Table 11 Field description Field Description Time/Date Displays the time/date when the system log was generated. Source Disp
Category Documents Purposes Operations and maintenance Release notes Provide information about the product release, including the version history, har
40 Figure 37 Setting the log host 3. Configure the log host, as described in Table 12. 4. Click Apply. Table 12 Configuration items Item Descript
41 Figure 38 Syslog configuration page 3. Configure buffer capacity and refresh interval, as described in Table 13. 4. Click Apply. Table 13 Conf
42 Managing the configuration Administrators can back up, restore, save, or reset the device configuration. Backing up the configuration Configuratio
43 The restored configuration takes effect at the next boot of the device. To restore the configuration: 1. From the navigation tree, select Device
44 Figure 41 Saving the configuration To save the configuration in common mode: 1. From the navigation tree, select Device > Configuration. 2.
45 Managing files The file management function allows you to manage the files on the storage media. Displaying files 1. From the navigation tree, se
46 Uploading a file IMPORTANT: Uploading a file takes some time. H3C recommends that you not perform any operation on the Web interface during the u
47 Managing ports You can use the port management feature to set and view the operation parameters of a Layer 2 Ethernet port and an aggregate interf
48 3. Set the operation parameters for the port, as described in Table 14. 4. Click Apply. Table 14 Configuration items Item Description Port State
49 Item Description MDI Set the MDI mode of the port. You can use two types of Ethernet cables to connect Ethernet devices: crossover cable and stra
i Contents Configuration wizard ······················································································································
50 Item Description Broadcast Suppression Set broadcast suppression on the port. You can suppress broadcast traffic by percentage or by PPS, as follo
51 Displaying port operation parameters Displaying a specified operation parameter for all ports 1. From the navigation tree, select Device > Por
52 Figure 46 The Detail tab Port management configuration example Network requirements As shown in Figure 47: • Server A, Server B, and Server C a
53 Figure 47 Network diagram Configuring the switch 1. Set the rate of GigabitEthernet 1/0/4 to 1000 Mbps: a. From the navigation tree, select De
54 Figure 48 Configuring the rate of GigabitEthernet 1/0/4 2. Batch configure the rate of GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and Gigabi
55 Figure 49 Batch configuring port rate 3. Display the rate settings of ports: a. Click the Summary tab. b. Click the Speed button to display t
56 Figure 50 Displaying the rate settings of ports
57 Configuring port mirroring Overview Port mirroring refers to the process of copying the packets passing through a port/VLAN/CPU to the monitor por
58 Local port mirroring In local port mirroring, the mirroring source and the mirroring destination are on the same device. A mirroring group that co
59 Step Remarks 2. Configure mirroring ports for the mirroring group. Required. For more information, see "Configuring ports for a mirroring gr
ii Configuring the log host ··························································································································
60 Configuring ports for a mirroring group 1. From the navigation tree, select Device > Port Mirroring. 2. Click the Modify Port tab. The page f
61 Item Description Port Type Set the type of the port to be configured. Configure ports for a local mirroring group: • Monitor Port—Configures the
62 Figure 55 Adding a local mirroring group 2. Configure the mirroring ports as GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2: a. Click the Mod
63 Figure 56 Configuring the mirroring ports 3. Configure the monitor port as GigabitEthernet 1/0/3: a. Click the Modify Port tab to enter the pa
64 Figure 57 Configuring the monitor port
65 Managing users In the user management part, you can perform the following operations: • Add a local user, and specify the password, access level,
66 Item Description Access Level Select an access level for the user. Users of different levels can perform different operations. User levels, in or
67 Table 18 Configuration items Item Description Create/Remove Select the operation type: • Create—Configure or change the super password. • Remove
68 Configuring a loopback test You can check whether an Ethernet port works normally by performing the Ethernet port loopback test, during which the
69 Figure 61 Loopback test page 2. Select an External or Internal option for loopback test type. 3. On the chassis front panel, select an Etherne
iii RMON groups ······································································································································
70 Configuring VCT Overview You can use the Virtual Cable Test (VCT) function to check the status of the cable connected to an Ethernet port on the d
71 Configuring the flow interval With the flow interval module, you can view the number of packets and bytes sent and received by a port, and the ban
72 Figure 65 Port traffic statistics When the bandwidth utilization is lower than 1%, 1% is displayed.
73 Configuring storm constrain The storm constrain function limits traffic of a port within a predefined upper threshold to suppress packet storms in
74 Figure 66 The storm constrain tab Configuring storm constrain 1. From the navigation tree, select Device > Storm Constrain. 2. In the Port
75 3. Set the storm constraint function, as described in Table 20. 4. Click Apply. Table 20 Configuration items Item Remarks Control Mode Specify
76 Configuring RMON Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device management and traffic monitoring. An RMON monitor,
77 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the his
78 Recommended configuration procedure Configuring the RMON statistics function The RMON statistics function can be implemented by either the Etherne
79 Table 23 RMON alarm configuration task list Task Remarks Configuring a statistics entry Required. You can create up to 100 statistics entries in a
iv Configuring VLAN interfaces ·······················································································································
80 Task Remarks Displaying RMON event logs If you configure the system to log an event after the event is triggered when you configure the event grou
81 Configuring a history entry 1. From the navigation tree, select Device > RMON. 2. Click the History tab. The History tab page appears. Figure
82 Item Description Interval Set the sampling period. Owner Set the owner of the entry. Configuring an event entry 1. From the navigation tree, s
83 Item Description Event Type Set the actions that the system takes when the event is triggered: • Log—The system logs the event. • Trap—The syste
84 4. Configure an alarm entry, as described in Table 28. 5. Click Apply. Table 28 Configuration items Item Description Alarm variable: Static Item
85 Figure 77 RMON statistics 3. View statistics items on the current interface. Table 29 Field description Field Description Number of Received By
86 Field Description Number of Network Conflicts Total number of collisions received on the interface, corresponding to the MIB node etherStatsCollis
87 Table 30 Field description Field Description NO Number of the entry in the system buffer. Statistics are numbered chronologically when they are sa
88 Figure 79 Log 3. View log information for all event entries. In this example, event 1 has generated one log, which is triggered because the ala
89 Figure 81 Adding a statistics entry 2. Display RMON statistics for GigabitEthernet 1/0/1: a. Click the icon corresponding to GigabitEthernet
Commentaires sur ces manuels