H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Web-based configuration guide
Advertising
Table of contents
Document Outline
- Title Page
- Preface
- Contents
- Configuration wizard
- Access controller engine
- Web overview
- Summary
- Device basic information configuration
- Device maintenance
- System time configuration
- Log management
- Configuration management
- File management
- Port management configuration
- Port mirroring configuration
- User management
- Loopback test configuration
- VCT
- Flow interval configuration
- Storm constrain configuration
- RMON
- RMON overview
- Configuring RMON
- Configuring the RMON statistics function
- Configuring the RMON alarm function
- Displaying RMON running status
- Configuring a statistics entry
- Configuring a history entry
- Configuring an event entry
- Configuring an alarm entry
- Displaying RMON statistics information
- Displaying RMON history sampling information
- Displaying RMON event logs
- RMON configuration example
- Energy saving configuration
- SNMP configuration
- Interface statistics
- OAP management
- VLAN configuration
- VLAN interface configuration
- Voice VLAN configuration
- Overview
- Recommended voice VLAN configuration procedures
- Configuring voice VLAN globally
- Configuring voice VLAN on a port
- Adding OUI addresses to the OUI list
- Example for configuring voice VLAN on a port in automatic voice VLAN assignment mode
- Example for configuring a voice VLAN on a port in manual voice VLAN assignment mode
- Configuration guidelines
- MAC address configuration
- MSTP configuration
- Link aggregation and LACP configuration
- LLDP configuration
- Overview
- Recommended configuration procedure
- Enabling LLDP on ports
- Configuring LLDP settings on ports
- Configuring global LLDP setup
- Displaying LLDP information for a port
- Displaying global LLDP information
- Displaying LLDP information received from LLDP neighbors
- LLDP basic settings configuration example
- CDP-compatible LLDP configuration example
- Configuration guidelines
- ARP configuration
- ARP attack defense configuration
- IGMP snooping configuration
- IPv4 and IPv6 routing configuration
- DHCP
- Service management
- Diagnostic tools
- MAC authentication configuration
- MAC authentication overview
- Configuring MAC authentication
- Configuring MAC authentication globally
- Configuring MAC authentication on a port
- Local MAC authentication configuration example
- ACL assignment configuration example
- Network requirements
- Configuring RADIUS scheme system
- Creating an ISP domain
- Configuring the authentication method for the ISP domain
- Configuring the authorization method for the ISP domain
- Configuring the accounting method for the ISP domain
- Configuring an ACL
- Configuring MAC authentication
- Verifying the configuration
- 802.1X configuration
- 802.1X overview
- Configuring 802.1X
- Configuring 802.1X globally
- Configuring 802.1X on a port
- 802.1X configuration example
- Network requirements
- Configuring the IP addresses of the interfaces
- Configuring 802.1X
- Configuring the RADIUS scheme system
- Creating an ISP domain
- Configuring the AAA authentication method for the ISP domain
- Configuring the AAA authorization method for the ISP domain
- Configuring the AAA accounting method for the ISP domain
- ACL assignment configuration example
- Network requirements
- Configuring the IP addresses of the interfaces
- Configuring the RADIUS scheme system
- Creating an ISP domain
- Configuring the AAA authentication method for the ISP domain
- Configuring the AAA authorization method for the ISP domain
- Configuring the AAA accounting method for the ISP domain
- Configuring an ACL
- Configuring the 802.1X feature
- Verifying the configuration
- Configuration guidelines
- Port security
- Port security overview
- Configuring port security
- Configuring global settings for port security
- Configuring basic port security control
- Configuring secure MAC addresses
- Configuring advanced port security control
- Configuring permitted OUI
- Basic port security mode configuration example
- Advanced port security mode configuration example
- AAA configuration
- RADIUS configuration
- User configuration
- PKI configuration
- Port isolation group configuration
- Authorized IP configuration
- ACL and QoS
- Overview
- Configuring an ACL
- Recommended ACL configuration procedures
- Configuring a time range
- Creating an IPv4 ACL
- Configuring a rule for a basic IPv4 ACL
- Configuring a rule for an advanced IPv4 ACL
- Configuring a rule for an Ethernet frame header ACL
- Creating an IPv6 ACL
- Configuring a rule for a basic IPv6 ACL
- Configuring a rule for an advanced IPv6 ACL
- QoS configuration
- Recommended QoS configuration procedures
- Creating a class
- Configuring classification rules
- Creating a traffic behavior
- Configuring traffic mirroring and traffic redirecting for a traffic behavior
- Configuring other actions for a traffic behavior
- Creating a policy
- Configuring classifier-behavior associations for the policy
- Applying a policy to a port
- Configuring queue scheduling on a port
- Configuring line rate on a port
- Configuring priority mapping tables
- Configuring priority trust mode on a port
- Configuration guidelines
- ACL and QoS configuration example
- PoE configuration
- Index