EasyManua.ls Logo

3Com Switch 4500 26-Port User Manual

3Com Switch 4500 26-Port
396 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #140 background imageLoading...
Page #140 background image
138 CHAPTER 7: ACL CONFIGURATION
QoS Configuration The process of traffic based QoS:
1 Identify the traffic by ACL
2 Perform the QoS operation to the traffic.
The configuration steps of traffic based QoS:
1 Define the ACL
2 Configure the QoS operation
If QoS is not based on traffic, you need not define ACL first.
See Configuring ACL for information on how to define ACL. This section mainly
describes how to configure QoS operation.
Setting Port Priority You can use the following command to set the port priority. The Switch will
replace the 802.1p priority carried by a packet with the port priority by default.
Perform the following configuration in Ethernet Port View.
Table 134 Setting Port Priority
The Switch port supports 8 priority levels. You can configure the port priority to
your requirements.
priority-level ranges from 0 to 7.
By default, the Switch replaces the priority carried by a packet with the port
priority.
Configuring Trust Packet
Priority
The system replaces the 802.1p priority carried by a packet with the port priority
by default. The user can configure system trusting the packet 802.1p priority and
not replacing the 802.1p priorities carried by the packets with the port priority.
Perform the following configuration in Ethernet Port View.
Table 135 Configuring Port Priority Replacement
Before configuring trust packet 802.1p priority, the Switch puts the packets into
different queues according to the priorities of the received port. After configuring
trust packet 802.1p priority, the Switch will trust the packet 802.1p priority and
put the packet into different queues accordingly, when forwarding the packets.
By default, the system replaces the 802.1p priority carried by a packet with the
port priority.
Operation Command
Set the port priority priority priority_level
Restore the default port priority undo priority
Operation Command
Configure trust packet 802.1p priority priority trust
Configure not trust packet 802.1p priority undo priority

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the 3Com Switch 4500 26-Port and is the answer not in the manual?

3Com Switch 4500 26-Port Specifications

General IconGeneral
Total Ports26
ManageableYes
Jumbo Frame SupportYes
ModelSwitch 4500 26-Port
FeaturesVLAN support, QoS
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3z
Status IndicatorsPort status
Authentication MethodRADIUS
Power SupplyInternal
Dimensions (W x D x H)440 x 260 x 44 mm
Storage Humidity10 - 95% (non-condensing)

Summary

GETTING STARTED

Product Overview

Provides an overview of the Switch 4500 family models and supported services.

Stacking Overview

Introduces the concept of stacking multiple switches into a single logical unit.

Logging In to the Switch

Explains how to establish a connection and log in to the switch for configuration.

Command Line Interface

Details the characteristics and capabilities of the switch's command-line interface.

User Interface Configuration

Describes how to configure user interfaces for managing the switch and its data.

PORT OPERATION

Ethernet Port Configuration

Details the configuration of Ethernet ports, including speed, duplex, and link types.

Link Aggregation Configuration

Explains how to configure link aggregation for increased bandwidth and reliability.

VLAN OPERATION

VLAN Overview

Explains Virtual Local Area Networks (VLANs) and their role in network segmentation.

Configuring a VLAN

Outlines the steps for creating and deleting VLANs.

Voice VLAN Configuration

Details the configuration of Voice VLANs for prioritizing voice traffic.

POWER OVER ETHERNET CONFIGURATION

PoE Overview

Introduces Power over Ethernet (PoE) capabilities of the PWR switches.

PoE Configuration

Covers tasks like enabling/disabling PoE, setting power output, and managing overload.

NETWORK PROTOCOL OPERATION

IP Address Configuration

Explains IP address classification, indications, and configuration methods.

ARP Configuration

Details Address Resolution Protocol (ARP) and its configuration.

DHCP Configuration

Covers Dynamic Host Configuration Protocol (DHCP) for IP address assignment.

Access Management Configuration

Explains how to control user access to network resources.

IP ROUTING PROTOCOL OPERATION

IP Routing Protocol Overview

Introduces IP routing protocols and their function.

Static Routes

Details how to configure static routes for network connectivity.

IP Routing Policy

Explains how to implement policies for filtering routing information.

ACL CONFIGURATION

Brief Introduction to ACL

Introduces Access Control Lists (ACLs) and their role in packet filtering.

QoS Configuration

Details Quality of Service (QoS) features for traffic management.

ACL Control Configuration

Explains how to configure ACLs for controlling user access.

IGMP SNOOPING

IGMP Snooping Overview

Explains IGMP Snooping for multicast group management.

Configuring IGMP Snooping

Covers the configuration steps for enabling IGMP Snooping.

IGMP Snooping Fault Diagnosis and Troubleshooting

Provides troubleshooting steps for IGMP Snooping issues.

STACKING

Introduction to Stacking

Introduces the concept of stacking multiple switches for increased capacity and reliability.

Configuring a Stack

Details configuring VLAN unit IDs, stack name, and authentication.

Stack Configuration Example

Provides a practical example of configuring a switch stack.

RSTP CONFIGURATION

STP Overview

Introduces Spanning Tree Protocol (STP) for loop prevention.

Implement RSTP on the Switch

Explains how to implement Rapid Spanning Tree Protocol (RSTP).

RSTP Configuration

Details RSTP configuration changes based on switch position in the network.

802.1X CONFIGURATION

IEEE 802.1X Overview

Provides an overview of IEEE 802.1X for port-based network access control.

Implementing 802.1X on the Switch

Details how to implement 802.1X on the switch, including extensions.

Configuring 802.1X

Lists the main configuration tasks for 802.1X.

Centralized MAC Address Authentication

Explains MAC address authentication for user access control.

AAA and RADIUS Protocol Configuration

Provides an overview of AAA and RADIUS for network security.

FILE SYSTEM MANAGEMENT

File System Overview

Provides an overview of the flash file system for storage management.

Directory Operation

Covers operations for creating, deleting, and displaying directories.

File Operation

Details operations for managing files, including deletion and renaming.

MAC Address Table Management

Overview

Explains how the switch maintains a MAC address table for packet forwarding.

MAC Address Table Configuration

Covers setting MAC address table entries and aging time.

Displaying MAC Address Table

Describes how to display and debug the MAC address table.

DEVICE MANAGEMENT

Overview

Explains the functions of device management for system state and debugging.

Rebooting the Switch

Details the procedure for rebooting the switch when failures occur.

Upgrading BootROM

Guides on upgrading the BootROM with a remote program.

Displaying and Debugging Device Management

Describes commands to display and debug device management configurations.

SYSTEM MAINTENANCE AND DEBUGGING

Basic System Configuration

Covers basic system settings like hostname, clock, and time zone.

System Debugging

Details enabling and disabling terminal debugging for troubleshooting.

Enable/Disable the Terminal Debugging

Explains how to control terminal debugging output.

SNMP CONFIGURATION

Overview

Introduces Simple Network Management Protocol (SNMP) and its applications.

Configuring SNMP

Covers main SNMP configuration tasks.

Setting Community Name

Details setting SNMP community names and access authorities.

Enabling/Disabling SNMP Agent to Send Trap

Covers enabling/disabling SNMP trap messages.

RMON CONFIGURATION

Overview

Introduces Remote Network Monitoring (RMON) and its standards.

Configuring RMON

Lists RMON configuration tasks like alarm and event table management.

Adding/Deleting an Entry to/from the Alarm Table

Guides on adding/deleting entries in the RMON alarm table.

Adding/Deleting an Entry to/from the Event Table

Covers adding/deleting entries in the RMON event table.

NTP CONFIGURATION

Overview

Introduces Network Time Protocol (NTP) for time synchronization.

NTP Implementation Modes

Explains different NTP modes like client/server, peer, broadcast, and multicast.

Configuring NTP Server Mode

Guides on configuring the switch to operate in NTP server mode.

Configuring NTP Peer Mode

Explains how to configure the switch for NTP peer mode.

Configuring NTP Broadcast Mode

Details configuring the switch for NTP broadcast mode.

Configuring NTP Multicast Mode

Covers configuring the switch for NTP multicast mode.

Configuring NTP Authentication

Explains how to configure NTP authentication on clients and servers.

SSH TERMINAL SERVICES

SSH Terminal Service

Explains the benefits and features of Secure Shell (SSH) for secure remote access.

SSH Server Configuration

Covers tasks related to configuring the SSH server.

SSH Client Configuration

Details the steps to configure an SSH client for establishing connections.

PASSWORD CONTROL CONFIGURATION OPERATIONS

Introduction to Password Control Configuration

Introduces the password control features for managing user passwords.

Configuring Password Aging

Explains how to configure password aging parameters and alerts.

Configuring Login Attempts Limitation and Failure Procession Mode

Covers settings for limiting login attempts and handling failures.

Password Control Configuration Example

Provides an example of password control configuration.

PASSWORD RECOVERY PROCESS

Introduction

Introduces the two password systems and bootrom protection.

Bootrom Passwords

Explains bootrom password configuration and recovery.

Bootrom Password Recovery

Describes the process of recovering lost bootrom passwords.

RADIUS SERVER AND RADIUS CLIENT SETUP

Setting Up a RADIUS Server

Guides on setting up a RADIUS server using third-party applications.

Setting Up the RADIUS Client

Details the setup of RADIUS clients like Windows 2000/XP and Aegis.

AUTHENTICATING THE SWITCH 4500 WITH CISCO SECURE ACS

Cisco Secure ACS (TACACS+) and the 3Com Switch 4500

Explains the integration of Cisco Secure ACS with 3Com Switches.

Setting Up the Cisco Secure ACS (TACACS+) Server

Guides on configuring the Cisco Secure ACS server for authentication.

Related product manuals