H3C WA2610-AGN Fundamentals Configuration Manual

Category
Software
Type
Fundamentals Configuration Manual
H3C WA Series WLAN Access Points
Fundamentals Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W100-20100910
Copyright © 2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C WA documentation set includes 10 configuration guides, which describe the software features
for the H3C WA Series WLAN Access Points and guide you through the software configuration
procedures. These configuration guides also provide configuration examples to help you apply the
software features to different network scenarios.
The Fundamentals Configuration Guide describes CLI, logging in to the AP, login user control, device
management, FTP and TFTP, user interface, file management, basic system configuration, and HTTP
configuration.
This preface includes:
z Audience
z Conventions
z About the H3C WA Documentation Set
z Obtaining Documentation
z Documentation Feedback
Audience
This documentation is intended for:
z Network planners
z Field technical support and servicing engineers
z Network administrators working with the WA series
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold
text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[ ]
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars,
from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you may select multiple choices or none.
Convention Description
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
Window names, button names, field names, and menu items are in Boldface.
For example, the
New User
window appears; click
OK
.
>
Multi-level menus are separated by angle brackets. For example,
File
>
Create
>
Folder
.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage to
equipment.
Means an action or information that needs special attention to ensure
successful configuration or good performance.
Means a complementary description.
Means techniques helpful for you to make configuration with ease.
About the H3C WA Documentation Set
The H3C WA documentation set includes:
Category Documents Purposes
Marketing brochures Describe product specifications and benefits.
Product
description and
specifications
Technology white papers
Provide an in-depth description of software features and
technologies.
Compliance and safety
manual
Provides regulatory information and the safety instructions
that must be followed during installation.
Quick start
Guides you through initial installation and setup procedures to
help you quickly set up and use your AP with the minimum
configuration.
Hardware
specifications
and installation
Installation guide
Guides you through hardware specifications and installation
methods to help you install your AP.
Getting started guide
Guides you through the main functions of your AP, and
describes how to install and log in to your AP, perform basic
configurations, maintain software, and troubleshoot your AP.
Configuration guides Describe software features and configuration procedures.
Software
configuration
Command references Provide a quick reference to all available commands.
Category Documents Purposes
User FAQ
Provides answers to some of the most frequently asked
questions on how to troubleshoot your AP.
Operations and
maintenance
Release notes
Provide information about the product release, including the
version history, hardware and software compatibility matrix,
version upgrade information, technical support information,
and software upgrading.
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, getting started, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with
the software version.
Documentation Feedback
You can e-mail your comments about product documentation to inf[email protected].
We appreciate your comments.
i
Table of Contents
1 Applicable Models and Software Versions.............................................................................................1-1
2 Feature Matrix............................................................................................................................................2-1
3 Command/Parameter Matrix.....................................................................................................................3-1
4 CLI Configuration ......................................................................................................................................4-1
What Is CLI? ...........................................................................................................................................4-1
Entering the CLI......................................................................................................................................4-2
Entering CLI Through the Console Port..........................................................................................4-2
Entering the CLI Through Telnet.....................................................................................................4-6
CLI Description........................................................................................................................................4-7
Command Conventions...................................................................................................................4-7
CLI View Description.......................................................................................................................4-8
Using the CLI ..........................................................................................................................................4-9
Using the CLI Online Help...............................................................................................................4-9
Command Line Error Information..................................................................................................4-10
Typing and Editing Commands.....................................................................................................4-11
Displaying and Executing History Commands ..............................................................................4-11
Undo Form of a Command............................................................................................................4-12
Controlling CLI Display..................................................................................................................4-12
Configuring the CLI...............................................................................................................................4-15
Configuring CLI Hotkeys................................................................................................................4-15
Configuring Command Aliases......................................................................................................4-16
Synchronous Information Output...................................................................................................4-17
Configuring Command Levels.......................................................................................................4-18
Saving Configurations ...................................................................................................................4-19
5 Controlling Login Users............................................................................................................................5-1
Introduction .............................................................................................................................................5-1
Controlling Telnet Users .........................................................................................................................5-1
Prerequisites....................................................................................................................................5-1
Controlling Telnet Users by SSIDs..................................................................................................5-2
Controlling Telnet Users by Source IP Addresses..........................................................................5-2
Controlling Telnet Users by Source and Destination IP Addresses................................................5-3
Controlling Telnet Users by Source MAC Addresses .....................................................................5-3
Configuration Example....................................................................................................................5-4
Controlling Network Management Users by Source IP Addresses........................................................5-4
Prerequisites....................................................................................................................................5-5
Controlling Network Management Users by Source IP Addresses.................................................5-5
Configuration Example....................................................................................................................5-5
Controlling Web Users by Source IP Addresses....................................................................................5-6
Prerequisites....................................................................................................................................5-6
Controlling Web Users by Source IP Addresses.............................................................................5-6
ii
Logging off Online Web Users ........................................................................................................5-7
Configuration Example....................................................................................................................5-7
6 File Management Configuration...............................................................................................................6-1
Managing Files........................................................................................................................................6-1
Filename Formats............................................................................................................................6-1
Directory Operations........................................................................................................................6-2
File Operations................................................................................................................................6-3
Renaming a file................................................................................................................................6-3
Batch Operations.............................................................................................................................6-4
Memory Space Management..........................................................................................................6-5
Setting File System Prompt Modes.................................................................................................6-5
Example for File Operations............................................................................................................6-6
7 Configuration File Management...............................................................................................................7-1
Configuration File Overview....................................................................................................................7-1
Types of Configuration ....................................................................................................................7-1
Format and Content of a Configuration File....................................................................................7-1
Coexistences of Multiple Configuration Files ..................................................................................7-1
Startup with the Configuration File..................................................................................................7-2
Saving the Current Configuration............................................................................................................7-2
Setting Configuration Rollback................................................................................................................7-3
Configuration Rollback ....................................................................................................................7-3
Specifying a Configuration File to Be Used at the Next Startup......................................................7-6
Backing Up the Startup Configuration File......................................................................................7-7
Deleting the Startup Configuration File to Be Used at the Next Startup.........................................7-7
Restoring the Startup Configuration File.........................................................................................7-8
Displaying and Maintaining Device Configuration...........................................................................7-8
8 FTP Configuration .....................................................................................................................................8-1
FTP Overview .........................................................................................................................................8-1
Introduction to FTP..........................................................................................................................8-1
Operation of FTP.............................................................................................................................8-1
Configuring the FTP Client......................................................................................................................8-2
Establishing an FTP Connection.....................................................................................................8-2
Configuring the FTP Client..............................................................................................................8-4
FTP Client Configuration Example..................................................................................................8-5
Displaying and Maintaining FTP.............................................................................................................8-7
9 TFTP Configuration...................................................................................................................................9-1
TFTP Overview.......................................................................................................................................9-1
Introduction to TFTP........................................................................................................................9-1
Operation of TFTP...........................................................................................................................9-1
Configuring the TFTP Client ...................................................................................................................9-2
Displaying and Maintaining the TFTP Client...........................................................................................9-3
TFTP Client Configuration Example .......................................................................................................9-3
10 Device Management..............................................................................................................................10-1
Device Management Overview.............................................................................................................10-1
iii
Device Management Configuration Task List.......................................................................................10-1
Configuring the Exception Handling Method ........................................................................................10-2
Rebooting a Device...............................................................................................................................10-2
Configuring the Scheduled Automatic Execution Function...................................................................10-3
Upgrading Device Software ..................................................................................................................10-4
Device Software Overview ............................................................................................................10-4
Upgrading the Boot ROM Program Through Command Lines.....................................................10-5
Upgrading the Boot File Through Command Lines.......................................................................10-6
Clearing the 16-Bit Interface Indexes Not Used in the Current System ...............................................10-6
Displaying and Maintaining Device Management Configuration ..........................................................10-7
Device Management Configuration Example .......................................................................................10-7
Remote Upgrade Configuration Example......................................................................................10-7
11 Basic Configurations ............................................................................................................................11-1
Displaying Configuration.......................................................................................................................11-1
Basic System Configuration..................................................................................................................11-2
Entering System View ...................................................................................................................11-2
Exiting the Current View................................................................................................................11-2
Exiting to User View ......................................................................................................................11-2
Configuring the AP Name..............................................................................................................11-3
Configuring the System Clock.......................................................................................................11-3
Configuring the System Clock.......................................................................................................11-3
Displaying the System Clock.........................................................................................................11-3
Enabling/Disabling the Display of Copyright Information..............................................................11-5
Configuring a Banner.....................................................................................................................11-6
Configuring CLI Hotkeys................................................................................................................11-7
Configuring Command Aliases......................................................................................................11-9
Configuring User Privilege Levels and Command Levels...........................................................11-10
Configuring the Number of Concurrent Users.............................................................................11-15
Displaying and Maintaining Basic Configurations .......................................................................11-15
CLI Features .......................................................................................................................................11-16
Introduction to CLI...............................................................................................................................11-16
Online Help with Command Lines...............................................................................................11-17
Synchronous Information Output.................................................................................................11-18
Undo Form of a Command..........................................................................................................11-18
Editing Features ..........................................................................................................................11-18
CLI Display..................................................................................................................................11-19
Saving Commands in the History Buffer .....................................................................................11-22
Command Line Error Information................................................................................................11-22
12 HTTP Configuration...............................................................................................................................12-1
HTTP Overview.....................................................................................................................................12-1
How HTTP Works..........................................................................................................................12-1
Logging In to the Device Through HTTP.......................................................................................12-1
Protocols and Standards...............................................................................................................12-2
Enabling the HTTP Service...................................................................................................................12-2
Configuring the Port Number of the HTTP Service...............................................................................12-2
iv
Associating the HTTP Service with an ACL..........................................................................................12-2
Displaying and Maintaining HTTP.........................................................................................................12-3
HTTP Configuration Example...............................................................................................................12-3
13 HTTPS Configuration ............................................................................................................................13-1
HTTPS Overview ..................................................................................................................................13-1
HTTPS Configuration Task List ............................................................................................................13-1
Associating the HTTPS Service with an SSL Server Policy.................................................................13-2
Enabling the HTTPS Service................................................................................................................13-2
Associating the HTTPS Service with a Certificate Attribute Access Control Policy..............................13-3
Configuring the Port Number of the HTTPS Service............................................................................13-3
Associating the HTTPS Service with an ACL.......................................................................................13-4
Displaying and Maintaining HTTPS......................................................................................................13-4
HTTPS Configuration Example.............................................................................................................13-5
14 Logging In to an AP...............................................................................................................................14-1
Logging In to an AP...............................................................................................................................14-1
Introduction to User Interface................................................................................................................14-1
Supported User Interfaces ............................................................................................................14-1
Users and User Interfaces.............................................................................................................14-2
User Interface Number..................................................................................................................14-2
Common User Interface Configuration..........................................................................................14-2
Logging In Through the Console Port...................................................................................................14-3
Introduction to Local Console Port Login ......................................................................................14-3
Logging In Through the Console Port ...........................................................................................14-3
Configuring Common Settings for Console Login.........................................................................14-6
Configuring None Authentication for Console Port Login..............................................................14-8
Configuring Password Authentication for Console Port Login......................................................14-9
Configuring Scheme Authentication for Console Port Login.......................................................14-11
Logging In Through Telnet..................................................................................................................14-13
Establishing a Telnet Connection................................................................................................14-13
Configuring Common Settings for Telnet Login..........................................................................14-15
Telnet Login Configuration Task List...........................................................................................14-17
Configuring None Authentication for Telnet Login ......................................................................14-17
Configuring Password Authentication for Telnet Login...............................................................14-18
Configuring Scheme Authentication for Telnet Login..................................................................14-20
Logging In Through SSH ....................................................................................................................14-22
Configuring Command Authorization..................................................................................................14-22
Logging In Through a Web-Based Network Management System ....................................................14-23
Introduction..................................................................................................................................14-23
Web Server Configuration...........................................................................................................14-23
Displaying Web Users.................................................................................................................14-24
Configuration Example................................................................................................................14-24
Logging In Through an NMS...............................................................................................................14-25
Introduction..................................................................................................................................14-25
Connection Establishment Through an NMS..............................................................................14-26
v
15 Index .......................................................................................................................................................15-1
1-1
z The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z Read this chapter before using an H3C WA series WLAN access point.
1 Applicable Models and Software Versions
H3C WA series WLAN access points include the WA2200 series and WA2600 series. Table 1-1 shows
the applicable models and software versions.
Table 1-1 Applicable models and software versions
Series Model Software version
WA2210-AG
WA2200 series access
points (indoors)
WA2220-AG
WA2210X-G
WA2200 series
WA2200 series access
points (outdoors)
WA2220X-AG
R 1115
WA2610-AGN
WA2612-AGN
WA2600 series access
points (indoors)
WA2620-AGN
R 1106
WA2610E-AGN
WA2600 series
WA2600 series access
points (enhanced)
WA2620E-AGN
R 1109
2-1
2 Feature Matrix
z Support of the H3C WA series WLAN access points for features, commands and parameters may
vary by device model. See this document for more information.
z For information about feature support, see Table 2-1. For information about command and
parameter support, see
Table 3-1.
z The term AP in this document refers to common APs, wireless bridges, or mesh APs.
Table 2-1 Feature matrix
Document Feature WA2200 series WA2600 series
Fundamentals
Configuration Guide
HTTPS Not supported Supported
802.11n radio mode Not supported Supported
802.11n bandwidth mode Not supported Supported
WLAN Configuration
Guide
802.11n rate configuration Not supported Supported
Optical Ethernet interface
Supported on
WA2210X-G/WA2220X-
AG only
Not supported
Layer 2 – LAN
Switching
Configuration Guide
GE interface Not supported Supported
DHCP server configuration Not supported Supported
Layer 3 – IP Services
Configuration Guide
DHCPv6 configuration Not supported Supported
IGMP snooping configuration Not supported Supported
IP Multicast
Configuration Guide
MLD snooping configuration Not supported Supported
Security Configuration
Guide
SSH2.0 Not supported Supported
3-1
3 Command/Parameter Matrix
Table 3-1 Command/Parameter matrix
Document Module Command/Parameter WA2200 series WA2600 series
display ip https
Not supported Supported
ip https acl
Not supported Supported
ip https certificate
access-control-policy
Not supported Supported
Fundamentals
Command
Reference
HTTP commands
ip https enable
Not supported Supported
a-mpdu enable
Not supported Supported
a-msdu enable
Not supported Supported
channel band-width
Not supported Supported
client dot11n-only
Not supported Supported
preamble
{
long
|
short
}
Only APs that
support the
802.11b/g radio
mode support this
command.
Only APs that
support the
802.11b/g radio
mode support this
command.
radio-type
Keywords
dot11an
and
dot11gn
not
supported
Supported
WLAN service
commands
short-gi enable
Not supported Supported
dot11a
{
disabled-rate |
mandatory-rate |
supported-rate
} rate-value
Only APs that
support 802.11a
radio mode
support this
command.
Only APs that
support 802.11a
radio mode
support this
command.
dot11n mandatory
maximum-mcs
Not supported Supported
dot11n support
maximum-mcs
Not supported Supported
WLAN
Command
Reference
WLAN RRM
commands
power-constraint
power-constraint
Only APs that
support the
802.11a radio
mode support this
command.
Only APs that
support the
802.11a radio
mode support this
command.
3-2
Document Module Command/Parameter WA2200 series WA2600 series
The maximum
number of
broadcast packets
that can be
forwarded on an
Ethernet interface
per second
broadcast-suppression
{ ratio |
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
The maximum
number of multicast
packets allowed on
an Ethernet
interface per
second
multicast-suppression
{ ratio |
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
Layer 2 – LAN
Switching
Command
Reference
The maximum
number of unknown
unicast packets
allowed on an
Ethernet interface
per second
unicast-suppression
{ ratio
|
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
DHCP commands
DHCP server configuration
commands
Not supported Supported
display ipv6 dhcp client
[
interface
interface-type
interface-number ]
Not supported Supported
display ipv6 dhcp client
statistics
[
interface
interface-type
interface-number
]
Not supported Supported
display ipv6 dhcp duid
Not supported Supported
Layer 3 - IP
Services
Command
Reference
DHCPv6
commands
reset ipv6 dhcp client
statistics
[
interface
interface-type
interface-number
]
Not supported Supported
4-1
z The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For
more information, see Feature Matrix.
z The interface types and the number of interfaces vary by AP model.
z The term AP in this document refers to common APs, wireless bridges, and mesh APs.
4 CLI Configuration
This chapter includes these sections:
z What Is CLI?
z Entering the CLI
z CLI Description
z Using the CLI
z Configuring the CLI
What Is CLI?
The command line interface (CLI) enables you to interact with your access point (AP) by typing text
commands. At the CLI, you can instruct your AP to perform a given task by typing a text command and
then pressing Enter to submit it to your AP. Compared with the graphical user interface (GUI) where you
can use a mouse to perform configurations, the CLI allows you to input more information in one
command line. The CLI of APs is as shown in
Figure 4-1.
4-2
Figure 4-1 CLI
Entering the CLI
The WA series WLAN access points provide multiple methods of entering the CLI, as follows:
z Through the console port. For more information, see Entering CLI Through the Console Port.
z Through Telnet. For more information, see Entering the CLI Through Telnet.
z Through SSH with encryption. For more information, see SSH2.0 in the Security Configuration
Guide.
Entering CLI Through the Console Port
When you use the CLI of an AP for the first time, you can log in to the AP and enter the CLI through the
console port only. Follow these steps to log in to your AP and enter the CLI through the console port:
1) Use a console cable to connect your PC to your AP. Plug the DB-9 (female) connector of the
console cable into the 9-pin serial port of your PC. Then plug the RJ-45 connector of the console
cable into the console port of your AP.
Figure 4-2 Use a console cable to connect your PC to your AP
Identify the interfaces correctly to avoid any connection error.
4-3
Because the serial port of a PC is not hot swappable, do not plug or unplug the console cable when your
AP is powered on. When connecting the PC to your AP, first plug the DB-9 connector of the console
cable into the PC, and then plug the RJ-45 connector of the console cable into your AP. When
disconnecting the PC from the your AP, first unplug the RJ-45 connector and then the DB-9 connector.
2) Launch a terminal emulation utility on your PC. In this chapter, the HyperTerminal in Windows XP
is used as an example. Click Start > All Programs > Accessories > Communications >
HyperTerminal to enter the HyperTerminal window. The Connection Description window as
shown in
Figure 4-3 appears. Type a connection name (test, for example) in the Name input box,
and click OK.
Figure 4-3 Connection description
3) Then, the Connect To window as shown in
Figure 4-4 appears. Select the serial port you want to
use from the Connect using drop-down list, and then click OK.
4-4
Figure 4-4 Specify the serial port used to establish the connection
4) The COM1 Properties window as shown in
Figure 4-5 appears. On the window, set Bits per
second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None. Click
OK.
Figure 4-5 Set the properties of the serial port
5) The HyperTerminal window as shown in
Figure 4-6 appears.
4-5
Figure 4-6 The HyperTerminal window
Select File > Properties on the HyperTerminal window, and the test Properties window appears.
Select the Settings tab as shown in
Figure 4-7, select VT100 from the Emulation drop-down list, and
then click OK.
Figure 4-7 Select the emulation terminal on the test Properties window
4-6
6) Press Enter on the HyperTerminal window. Then the CLI of your access point appears on the
window, as shown in
Figure 4-8, indicating that you have logged in to your access point
successfully.
Figure 4-8 Schematic diagram for successful login through the console port
Entering the CLI Through Telnet
After you log in to your access point through the console port for the first time, it is recommended that
you configure Telnet login as soon as possible, so that you can use a remote terminal to configure and
manage your access point.
Telnet login authentication methods
To restrict the login to your access point, three Telnet login authentication methods are provided. Select
a proper method according to your network conditions.
Table 4-1 Telnet login authentication methods
Authentication
method
Description Application scenarios Configuration
None
z Easy to configure
z Allows any user to telnet to your access
point
z Least secure
Lab environments and
extremely secure
network environments
Password
z Easy to configure
z Allows any user knowing the password
to telnet to your access point
z Secure, but incapable of assigning
different privilege levels to different
users
Environments that do
not need granular
privilege management
For more
information,
see Login in
the
Fundamentals
Configuration
Guide.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137

H3C WA2610-AGN Fundamentals Configuration Manual

Category
Software
Type
Fundamentals Configuration Manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI