HPE Networking Comware 5120v3 Switch Series Layer 2—LAN Switching Configuration Guide

Category
Software
Type
Configuration Guide
HPE Networking Comware
5120v3 Switch
Series
Layer 2—LAN Switching Configuration Guide
Software
version: Release 6352P02 and later
Document version: 6W100-20230715
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Configuring Ethernet interfaces ····································································· 1
About Ethernet interface ···································································································································· 1
Ethernet interface naming conventions ·············································································································· 1
Configuring common Ethernet interface settings ······························································································· 1
Configuring the physical type for a combo interface (single combo interface) ··········································· 1
Configuring basic settings of an Ethernet interface···················································································· 2
Enabling automatic negotiation for speed downgrading ············································································ 3
Configuring jumbo frame support ··············································································································· 3
Configuring physical state change suppression on an Ethernet interface ················································· 4
Configuring dampening on an Ethernet interface······················································································· 4
Enabling link flapping protection on an interface ························································································ 6
Configuring storm suppression ·················································································································· 7
Configuring generic flow control on an Ethernet interface ········································································· 7
Enabling energy saving features on an Ethernet interface ········································································ 8
Setting the statistics polling interval ··········································································································· 9
Enabling loopback testing on an Ethernet interface ················································································· 10
Forcibly bringing up a fiber port ················································································································ 11
Configuring interface alarm functions······································································································· 12
Restoring the default settings for an interface·························································································· 13
Configuring a Layer 2 Ethernet interface ········································································································· 14
Setting speed options for autonegotiation on an Ethernet interface ························································ 14
Setting the MDIX mode of an Ethernet interface······················································································ 15
Configuring storm control on an Ethernet interface·················································································· 16
Testing the cable connection of an Ethernet interface ············································································· 17
Enabling bridging on an Ethernet interface ······························································································ 17
Display and maintenance commands for Ethernet interfaces ·········································································· 18
Configuring loopback, null, and inloopback interfaces ································· 20
About loopback, null, and inloopback interfaces ······························································································ 20
About loopback interfaces ························································································································ 20
About null interfaces ································································································································· 20
About inloopback interfaces ····················································································································· 20
Configuring a loopback interface ····················································································································· 20
Configuring a null interface ······························································································································ 21
Restoring the default settings for an interface ································································································· 21
Display and maintenance commands for loopback, null, and inloopback interfaces ······································· 22
Bulk configuring interfaces ··········································································· 23
About interface bulk configuration ···················································································································· 23
Restrictions and guidelines: Bulk interface configuration ················································································· 23
Procedure························································································································································· 24
Display and maintenance commands for bulk interface configuration ····························································· 24
Configuring the MAC address table ····························································· 25
About the MAC address table ·························································································································· 25
How a MAC address entry is created ······································································································· 25
Types of MAC address entries ················································································································· 25
MAC address table tasks at a glance··············································································································· 26
Configuring MAC address entries ···················································································································· 27
About MAC address entry-based frame forwarding ················································································· 27
Restrictions and guidelines for MAC address entry configuration ···························································· 27
Prerequisites for MAC address entry configuration·················································································· 27
Adding or modifying a static or dynamic MAC address entry··································································· 27
Adding or modifying a blackhole MAC address entry ·············································································· 28
Adding or modifying a multiport unicast MAC address entry ··································································· 28
Setting the aging timer for dynamic MAC address entries ··············································································· 29
Disabling MAC address learning ······················································································································ 30
ii
About disabling MAC address learning ···································································································· 30
Disabling global MAC address learning ··································································································· 30
Disabling MAC address learning on an interface ····················································································· 30
Disabling MAC address learning on a VLAN ··························································································· 31
Setting the MAC learning limit ·························································································································· 31
Configuring the unknown frame forwarding rule after the MAC learning limit is reached ································ 32
Enabling MAC address synchronization ·········································································································· 32
Configuring MAC address move notifications and suppression ······································································· 34
Enabling ARP fast update for MAC address moves ························································································ 35
Setting the hash bucket size of the MAC address table··················································································· 35
Enabling MAC hashing conflict logging ············································································································ 36
Disabling packet filter when the source MAC address is a multicast or broadcast MAC address ··················· 36
Enabling SNMP notifications for the MAC address table ················································································· 37
Display and maintenance commands for MAC address table ········································································· 37
MAC address table configuration examples····································································································· 38
Example: Configuring the MAC address table ························································································· 38
Configuring MAC Information ······································································· 40
About MAC Information ···································································································································· 40
Enabling MAC Information ······························································································································· 40
Configuring the MAC Information mode ··········································································································· 40
Setting the MAC change notification interval ··································································································· 41
Setting the MAC Information queue length ······································································································ 41
MAC Information configuration examples ········································································································ 42
Example: Configuring MAC Information ··································································································· 42
Configuring Ethernet link aggregation ·························································· 44
About Ethernet link aggregation ······················································································································· 44
Ethernet link aggregation application scenario ························································································ 44
Aggregate interface, aggregation group, and member port ····································································· 44
Operational key ········································································································································ 45
Configuration types ·································································································································· 45
Link aggregation modes ··························································································································· 45
How static link aggregation works ············································································································ 46
Dynamic link aggregation ························································································································· 47
How dynamic link aggregation works ······································································································· 50
Edge aggregate interface ························································································································· 52
Load sharing modes for link aggregation groups ····················································································· 52
S-MLAG ··················································································································································· 52
Restrictions and guidelines: Mixed use of manual and automatic link aggregation configuration ··················· 53
Ethernet link aggregation tasks at a glance ····································································································· 53
Configuring a manual link aggregation············································································································· 54
Restrictions and guidelines for aggregation group configuration ····························································· 54
Configuring a Layer 2 aggregation group································································································· 55
Configuring S-MLAG ········································································································································ 56
Configuring an aggregate interface ·················································································································· 57
Configuring the description of an aggregate interface ············································································· 57
Configuring jumbo frame support ············································································································· 57
Setting the expected bandwidth for an aggregate interface ····································································· 58
Configuring an edge aggregate interface ································································································· 58
Configuring physical state change suppression on an aggregate interface ············································· 59
Shutting down an aggregate interface ····································································································· 59
Restoring the default settings for an aggregate interface ········································································ 60
Setting the minimum and maximum numbers of Selected ports for an aggregation group ····························· 60
Disabling the default action of selecting a Selected port for dynamic aggregation groups that have not received
LACPDUs ························································································································································· 62
Configuring a dynamic aggregation group to use port speed as the prioritized criterion for reference port
selection ··························································································································································· 62
Configuring load sharing for link aggregation groups······················································································· 63
Setting load sharing modes for link aggregation groups ·········································································· 63
Enabling local-first load sharing for link aggregation ················································································ 63
Enabling link-aggregation traffic redirection ····································································································· 64
iii
About link-aggregation traffic redirection·································································································· 64
Restrictions and guidelines for link-aggregation traffic redirection ··························································· 65
Enabling link-aggregation traffic redirection globally ················································································ 65
Enabling link-aggregation traffic redirection for an aggregation group····················································· 65
Enabling BFD for an aggregation group··········································································································· 65
Display and maintenance commands for Ethernet link aggregation ································································ 66
Ethernet link aggregation configuration examples ··························································································· 67
Example: Configuring a Layer 2 static aggregation group ······································································· 67
Example: Configuring a Layer 2 dynamic aggregation group ·································································· 69
Example: Configuring a Layer 2 edge aggregate interface ······································································ 70
Example: Configuring S-MLAG ················································································································ 72
Configuring port isolation ············································································· 75
About port isolation ·········································································································································· 75
Assigning a port to an isolation group ·············································································································· 75
Display and maintenance commands for port isolation ··················································································· 75
Port isolation configuration examples ·············································································································· 76
Example: Configuring port isolation ········································································································· 76
Spanning tree protocol overview ·································································· 79
About STP ························································································································································ 79
STP protocol frames ································································································································ 79
Basic concepts in STP ····························································································································· 81
Calculation process of the STP algorithm ································································································ 82
Example of STP calculation ····················································································································· 83
The configuration BPDU forwarding mechanism of STP ········································································· 87
STP timers ··············································································································································· 87
About RSTP ····················································································································································· 88
RSTP protocol frames ······························································································································ 88
Basic concepts in RSTP ··························································································································· 89
How RSTP works ····································································································································· 89
RSTP BPDU processing ·························································································································· 89
About PVST ····················································································································································· 90
PVST protocol frames ······························································································································ 90
How PVST works ····································································································································· 91
About MSTP ····················································································································································· 91
MSTP features ········································································································································· 91
MSTP protocol frames ····························································································································· 91
Basic concepts in MSTP ·························································································································· 93
How MSTP works ····································································································································· 96
MSTP implementation on devices ············································································································ 97
Rapid transition mechanism ····························································································································· 97
Edge port rapid transition ························································································································· 97
Root port rapid transition ·························································································································· 98
P/A transition ············································································································································ 98
Protocols and standards ·································································································································· 99
Configuring spanning tree protocols ·························································· 101
Restrictions and guidelines: spanning tree protocol configuration ································································· 101
Restrictions: Compatibility with other features ······················································································· 101
Restrictions: Interface configuration ······································································································· 101
Spanning tree protocol tasks at a glance ······································································································· 101
STP tasks at a glance ···························································································································· 101
RSTP tasks at a glance ·························································································································· 102
PVST tasks at a glance ·························································································································· 103
MSTP tasks at a glance ························································································································· 104
Setting the spanning tree mode ····················································································································· 105
Configuring an MST region ···························································································································· 106
Configuring the root bridge or a secondary root bridge ················································································· 107
Restrictions and guidelines ···················································································································· 107
Configuring the device as the root bridge of a spanning tree ································································· 107
Configuring the device as a secondary root bridge of a spanning tree ·················································· 108
iv
Configuring the device priority ······················································································································· 108
Configuring the maximum hops of an MST region ························································································· 109
Configuring the network diameter of a switched network ·············································································· 109
Setting spanning tree timers ·························································································································· 110
Setting the timeout factor ······························································································································· 111
Configuring the BPDU transmission rate ······································································································· 111
Configuring edge ports ··································································································································· 112
Configuring path costs of ports ······················································································································ 113
About path cost ······································································································································ 113
Specifying a standard for the default path cost calculation ···································································· 113
Configuring path costs of ports ·············································································································· 114
Configuring the port priority ···························································································································· 115
Configuring the port link type ························································································································· 115
Configuring the mode a port uses to recognize and send MSTP frames······················································· 116
Enabling outputting port state transition information ······················································································ 116
Enabling the spanning tree feature ················································································································ 117
Restrictions and guidelines ···················································································································· 117
Enabling the spanning tree feature in STP/RSTP/MSTP mode ····························································· 117
Enabling the spanning tree feature in PVST mode ················································································ 118
Performing mCheck ······································································································································· 118
About mCheck ········································································································································ 118
Restrictions and guidelines ···················································································································· 118
Performing mCheck globally ·················································································································· 118
Performing mCheck in interface view ····································································································· 119
Disabling inconsistent PVID protection ·········································································································· 119
Configuring Digest Snooping ························································································································· 119
Configuring No Agreement Check ················································································································· 121
Configuring TC Snooping ······························································································································· 122
Configuring protection features ······················································································································ 123
Spanning tree protection tasks at a glance ···························································································· 123
Configuring BPDU guard ························································································································ 124
Enabling root guard ································································································································ 125
Enabling loop guard ······························································································································· 125
Configuring port role restriction ·············································································································· 126
Configuring TC-BPDU transmission restriction ······················································································ 127
Enabling TC-BPDU guard ······················································································································ 127
Enabling BPDU drop ······························································································································ 128
Enabling PVST BPDU guard ·················································································································· 128
Disabling dispute guard ·························································································································· 128
Enabling the device to log events of detecting or receiving TC BPDUs························································· 130
Disabling the device from reactivating edge ports shut down by BPDU guard ·············································· 130
Enabling SNMP notifications for new-root election and topology change events ·········································· 131
Display and maintenance commands for the spanning tree protocols ·························································· 132
Spanning tree configuration examples ··········································································································· 132
Example: Configuring MSTP ·················································································································· 132
Example: Configuring PVST ·················································································································· 136
Configuring loop detection ········································································· 140
About loop detection ······································································································································ 140
Loop detection mechanism ···················································································································· 140
Loop detection interval ··························································································································· 141
Loop protection actions ·························································································································· 141
Port status auto recovery ······················································································································· 141
Loop detection tasks at a glance ··················································································································· 142
Enabling loop detection ·································································································································· 142
Restrictions and guidelines for loop detection configuration ·································································· 142
Enabling loop detection globally············································································································· 142
Enabling loop detection on a port ··········································································································· 143
Setting the loop protection action ··················································································································· 143
Restrictions and guidelines for loop protection action configuration ······················································ 143
Setting the global loop protection action ································································································ 143
Setting the loop protection action on an interface ·················································································· 143
v
Setting the loop detection interval ·················································································································· 144
Display and maintenance commands for loop detection ··············································································· 144
Loop detection configuration examples ········································································································· 144
Example: Configuring basic loop detection functions ············································································· 144
Configuring VLANs ···················································································· 148
About VLANs·················································································································································· 148
VLAN frame encapsulation ···················································································································· 148
VLAN types ············································································································································ 149
Port-based VLANs ································································································································· 149
MAC-based VLANs ································································································································ 150
IP subnet-based VLANs ························································································································· 152
Protocol-based VLANs ··························································································································· 153
Layer 3 communication between VLANs ······························································································· 153
Protocols and standards ························································································································ 153
Configuring a VLAN ······································································································································· 153
Restrictions and guidelines ···················································································································· 153
Creating VLANs ····································································································································· 153
Configuring port-based VLANs ······················································································································ 154
Restrictions and guidelines for port-based VLANs ················································································· 154
Assigning an access port to a VLAN ······································································································ 154
Assigning a trunk port to a VLAN ··········································································································· 155
Assigning a hybrid port to a VLAN ········································································································· 155
Configuring MAC-based VLANs ···················································································································· 156
Restrictions and guidelines for MAC-based VLANs ··············································································· 156
Configuring static MAC-based VLAN assignment·················································································· 156
Configuring dynamic MAC-based VLAN assignment ············································································· 157
Configuring server-assigned MAC-based VLAN ···················································································· 158
Configuring IP subnet-based VLANs ············································································································· 158
Configuring protocol-based VLANs ················································································································ 159
Configuring a VLAN group ····························································································································· 160
Configuring VLAN interfaces ·························································································································· 161
Restrictions and guidelines ···················································································································· 161
VLAN interfaces configuration tasks at a glance ···················································································· 161
Prerequisites ·········································································································································· 161
Creating a VLAN interface ····················································································································· 161
Restoring the default settings for the VLAN interface ············································································ 162
Display and maintenance commands for VLANs ··························································································· 162
VLAN configuration examples ························································································································ 163
Example: Configuring port-based VLANs ······························································································ 163
Example: Configuring MAC-based VLANs ····························································································· 164
Example: Configuring IP subnet-based VLANs ····················································································· 166
Example: Configuring protocol-based VLANs ························································································ 168
Configuring private VLAN ·········································································· 172
About private VLAN········································································································································ 172
Restrictions and guidelines: Private VLAN configuration ··············································································· 173
Private VLAN tasks at a glance ····················································································································· 173
Creating a primary VLAN ······························································································································· 173
Creating secondary VLANs ···························································································································· 173
Associating the primary VLAN with secondary VLANs ·················································································· 174
Configuring the uplink port ····························································································································· 174
Configuring a downlink port···························································································································· 174
Configuring Layer 3 communication for secondary VLANs ··········································································· 175
Display and maintenance commands for the private VLAN ··········································································· 176
Private VLAN configuration examples ··········································································································· 176
Example: Configuring promiscuous ports ······························································································ 176
Example: Configuring trunk promiscuous ports ····················································································· 179
Example: Configuring trunk promiscuous and trunk secondary ports ···················································· 182
Example: Configuring Layer 3 communication for secondary VLANs ···················································· 186
vi
Configuring voice VLANs ··········································································· 189
About voice VLANs ········································································································································ 189
Working mechanism ······························································································································· 189
Methods of identifying IP phones ··········································································································· 189
Advertising the voice VLAN information to IP phones············································································ 190
IP phone access methods ······················································································································ 190
Voice VLAN assignment modes············································································································· 191
Cooperation of voice VLAN assignment modes and IP phones ···························································· 192
Security mode and normal mode of voice VLANs ·················································································· 193
Restrictions and guidelines: Voice VLAN configuration ················································································· 193
Voice VLAN tasks at a glance ························································································································ 194
Configuring voice VLAN assignment modes for a port ·················································································· 194
Configuring a port to operate in automatic voice VLAN assignment mode ············································ 194
Configuring a port to operate in manual voice VLAN assignment mode················································ 195
Enabling LLDP for automatic IP phone discovery ·························································································· 196
Configuring LLDP or CDP to advertise a voice VLAN ··················································································· 197
Configuring LLDP to advertise a voice VLAN ························································································ 197
Configuring CDP to advertise a voice VLAN ·························································································· 197
Display and maintenance commands for voice VLANs ················································································· 198
Voice VLAN configuration examples ·············································································································· 198
Example: Configuring automatic voice VLAN assignment mode ··························································· 198
Example: Configuring manual voice VLAN assignment mode ······························································· 200
Configuring MVRP ····················································································· 202
About MVRP ·················································································································································· 202
MRP implementation ······························································································································ 202
MRP messages ······································································································································ 202
MRP timers ············································································································································ 204
MVRP registration modes ······················································································································ 204
Protocols and standards ························································································································ 205
Restrictions and guidelines: MVRP configuration ·························································································· 205
MVRP tasks at a glance ································································································································· 205
Prerequisites ·················································································································································· 205
Enabling MVRP ·············································································································································· 206
Setting an MVRP registration mode ··············································································································· 206
Setting MRP timers ········································································································································ 206
Enabling GVRP compatibility ························································································································· 207
Display and maintenance commands for MVRP ··························································································· 208
MVRP configuration examples ······················································································································· 208
Example: Configuring basic MVRP functions························································································· 208
Configuring QinQ ······················································································· 218
About QinQ ···················································································································································· 218
QinQ benefits ········································································································································· 218
How QinQ works ···································································································································· 218
QinQ implementations ···························································································································· 219
Protocols and standards ························································································································ 219
Restrictions and guidelines: QinQ configuration ···························································································· 220
Enabling QinQ ················································································································································ 220
Configuring transmission for transparent VLANs ··························································································· 221
Configuring the TPID for VLAN tags ·············································································································· 221
About TPID ············································································································································· 221
Restrictions and guidelines ···················································································································· 222
Configuring the TPID for CVLAN tags···································································································· 222
Configuring the TPID for SVLAN tags ···································································································· 223
Display and maintenance commands for QinQ ····························································································· 223
QinQ configuration examples ························································································································· 223
Example: Configuring basic QinQ ·········································································································· 223
Example: Configuring VLAN transparent transmission ·········································································· 225
vii
Configuring VLAN mapping ······································································· 228
About VLAN mapping····································································································································· 228
VLAN mapping types ····························································································································· 228
VLAN mapping application scenarios ···································································································· 228
VLAN mapping implementations ············································································································ 230
Restrictions and guidelines: VLAN mapping configuration ············································································ 232
VLAN mapping tasks at a glance ··················································································································· 232
Prerequisites ·················································································································································· 232
Configuring one-to-one VLAN mapping ········································································································· 233
Configuring many-to-one VLAN mapping ······································································································ 233
Configuring one-to-two VLAN mapping ········································································································· 235
Display and maintenance commands for VLAN mapping ·············································································· 235
VLAN mapping configuration examples ········································································································· 236
Example: Configuring one-to-one VLAN mapping ················································································· 236
Example: Configuring many-to-one VLAN mapping ·············································································· 238
Example: Configuring one-to-two VLAN mapping ·················································································· 240
Configuring LLDP ······················································································ 243
About LLDP ···················································································································································· 243
LLDP agents and bridge modes············································································································· 243
LLDP frame formats ······························································································································· 244
LLDPDUs ··············································································································································· 245
TLVs ······················································································································································· 245
Management address ···························································································································· 248
LLDP operating modes ·························································································································· 248
Transmitting and receiving LLDP frames ······························································································· 249
Collaboration with Track ························································································································· 249
Protocols and standards ························································································································ 249
Restrictions and guidelines: LLDP configuration···························································································· 250
LLDP tasks at a glance ·································································································································· 250
Enabling LLDP ··············································································································································· 251
Setting the LLDP bridge mode ······················································································································· 251
Setting the LLDP operating mode ·················································································································· 251
Setting the LLDP reinitialization delay············································································································ 252
Configuring the advertisable TLVs ················································································································· 252
Configuring advertisement of the management address TLV ········································································ 254
Setting the encapsulation format for LLDP frames ························································································ 255
Setting LLDP frame transmission parameters ······························································································· 256
Configuring the type of port ID TLVs advertised by LLDP ············································································· 256
Enabling displaying LLDP local information about all interfaces ···································································· 257
Enabling LLDP polling ···································································································································· 258
Disabling LLDP PVID inconsistency check ···································································································· 258
Configuring CDP compatibility ······················································································································· 259
Configuring LLDP trapping and LLDP-MED trapping ···················································································· 260
Configuring MAC address learning for DCN ·································································································· 261
Setting the source MAC address of LLDP frames ················································································· 261
Enabling generation of ARP or ND entries for received management address TLVs···························· 262
Display and maintenance commands for LLDP ····························································································· 262
LLDP configuration examples ························································································································ 263
Example: Configuring basic LLDP functions ·························································································· 263
Example: Configuring CDP-compatible LLDP ························································································ 267
Configuring L2PT ······················································································· 270
About L2PT ···················································································································································· 270
L2PT application scenario ······················································································································ 270
Supported protocols ······························································································································· 270
L2PT operating mechanism ··················································································································· 271
L2PT tasks at a glance··································································································································· 272
Enabling L2PT················································································································································ 272
Restrictions and guidelines for L2PT ····································································································· 272
Enabling L2PT for a protocol in Layer 2 Ethernet interface view ··························································· 273
viii
Enabling L2PT for a protocol in Layer 2 aggregate interface view ························································· 273
Setting the destination multicast MAC address for tunneled packets ···························································· 273
Display and maintenance commands for L2PT ····························································································· 274
L2PT configuration examples ························································································································ 274
Example: Configuring L2PT for STP ······································································································ 274
Example: Configuring L2PT for LACP ···································································································· 276
Configuring PPPoE relay ··········································································· 280
About PPPoE ················································································································································· 280
PPPoE network structure ······················································································································· 280
PPPoE relay fundamentals ···················································································································· 281
Protocols and standards ························································································································ 283
Restrictions and guidelines for PPPoE ·········································································································· 283
Configuring the PPPoE relay ························································································································· 283
PPPoE relay tasks at a glance ··············································································································· 283
Enabling the PPPoE relay function ········································································································ 283
Configuring PPPoE relay trusted ports ·································································································· 283
Enabling an interface to strip the vendor-specific tags of the PPPoE server-side packets ···················· 284
Configuring the circuit ID and remote ID padding formats for the client-side PPPoE packets on the PPPoE
relay ······················································································································································· 285
Configuring the vendor-specific tag processing policy for the client-side PPPoE packets on the PPPoE
relay ······················································································································································· 285
Display and maintenance commands for PPPoE relay ················································································· 286
PPPoE configuration examples ····················································································································· 287
Example: Configuring PPPoE relay ······································································································· 287
Document conventions and icons ······························································ 289
Conventions ··················································································································································· 289
Network topology icons ·································································································································· 290
Support and other resources ····································································· 291
Accessing Hewlett Packard Enterprise Support····························································································· 291
Accessing updates ········································································································································· 291
Websites ················································································································································ 292
Customer self repair ······························································································································· 292
Remote support ······································································································································ 292
Documentation feedback ······················································································································· 292
Index ·········································································································· 294
1
Configuring Ethernet interfaces
About Ethernet interface
The Switch Series supports Ethernet interfaces and Console interfaces. For the interface types and
the number of interfaces supported by a switch model, see the installation guide.
This chapter describes how to configure management Ethernet interfaces and Ethernet interfaces.
Ethernet interface naming conventions
The Ethernet interfaces are named in the format of interface type A/B/C. The letters that follow the
interface type represent the following elements:
•
A—IRF member ID. If the switch is not in an IRF fabric, A is 1 by default.
•
B—Card slot number. 0 indicates the interface is a fixed interface of the switch.
•
C—Port index.
Configuring common Ethernet interface settings
Configuring the physical type for a combo interface (single
combo interface)
About combo interface
A combo interface is a logical interface that physically comprises one fiber combo port and one
copper combo port. The two ports share one forwarding channel and one interface view. As a result,
they cannot work simultaneously. When you activate one port, the other port is automatically
disabled. If you execute the combo enable auto command on a combo interface, the interface
automatically identifies the media inserted and activates the corresponding combo port. In the
interface view, you can activate the fiber or copper combo port, and configure other port attributes
such as the interface rate and duplex mode.
Configuration restrictions and guidelines
This feature is available only on devices that support combo interfaces.
Prerequisites
Before you configure combo interfaces, complete the following tasks:
•
Determine the combo interfaces on your device. Identify the two physical interfaces that belong
to each combo interface according to the marks on the device panel.
•
Use the display interface command to determine which port (fiber or copper) of each
combo interface is active:
ï‚¡ If the copper port is active, the output includes "Media type is twisted pair."
ï‚¡ If the fiber port is active, the output does not include this information.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
2
interface interface-type interface-number
3. Activate the copper combo port or fiber combo port.
combo enable { auto | copper | fiber }
The default is auto.
Configuring basic settings of an Ethernet interface
About Ethernet interface basic settings
You can configure an Ethernet interface to operate in one of the following duplex modes:
•
Full-duplex mode—The interface can send and receive packets simultaneously.
•
Half-duplex mode—The interface can only send or receive packets at a given time.
•
Autonegotiation mode—The interface negotiates a duplex mode with its peer.
You can set the speed of an Ethernet interface or enable it to automatically negotiate a speed with its
peer. For a 100-Mbps or 1000-Mbps Layer 2 Ethernet interface, you can also set speed options for
autonegotiation. The two ends can select a speed only from the available options. For more
information, see "Setting speed options for autonegotiation on an Ethernet interface."
Restrictions and guidelines
The shutdown command cannot be configured on an interface in a loopback test.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Set the description for the Ethernet interface.
description text
The default setting is interface-name Interface. For example, GigabitEthernet1/0/1 Interface.
4. Set the duplex mode for the Ethernet interface.
duplex { auto | full | half }
By default, the duplex mode is auto for Ethernet interfaces.
Ethernet copper ports that operate in 1000 Mbps or 10000 Mbps and fiber ports do not support
the half keyword.
5. Set the speed for the Ethernet interface.
speed { 10 | 100 | 1000 | 2500 | 5000 | 10000 | auto }
By default, an Ethernet interface negotiates a speed with its peer.
6. Set the expected bandwidth for the Ethernet interface.
bandwidth bandwidth-value
By default, the expected bandwidth (in kbps) is the interface baud rate divided by 1000.
7. Bring up the Ethernet interface.
undo shutdown
By default, Ethernet interfaces are in up state.
3
Enabling automatic negotiation for speed downgrading
About automatic negotiation for speed downgrading
Perform this task to enable interfaces at two ends of a link to automatically negotiate about
downgrading their speed when the following conditions exist:
•
The interfaces automatically negotiate a speed of 1000 Mbps.
•
The interfaces cannot operate at 1000 Mbps because of link restrictions.
Restrictions and guidelines
This feature is available only on GE interfaces.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable automatic negotiation for speed downgrading.
speed auto downgrade
By default, automatic negotiation for speed downgrading is enabled.
Configuring jumbo frame support
About jumbo frame
Jumbo frames are frames larger than 1522 bytes and are typically received by an Ethernet interface
during high-throughput data exchanges, such as file transfers.
The Ethernet interface processes jumbo frames in the following ways:
•
When the Ethernet interface is configured to deny jumbo frames (by using the undo
jumboframe enable command), the Ethernet interface discards jumbo frames.
•
When the Ethernet interface is configured with jumbo frame support, the Ethernet interface
performs the following operations:
ï‚¡ Processes jumbo frames within the specified length.
ï‚¡ Discards jumbo frames that exceed the specified length.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Configure jumbo frame support.
jumboframe enable [ size ]
By default, the device allows jumbo frames within 10240 bytes to pass through.
If you set the size argument multiple times, the most recent configuration takes effect.
4
Configuring physical state change suppression on an
Ethernet interface
About physical state change suppression
The physical link state of an Ethernet interface is either up or down. Each time the physical link of an
interface comes up or goes down, the interface immediately reports the change to the CPU. The
CPU then performs the following operations:
•
Notifies the upper-layer protocol modules (such as routing and forwarding modules) of the
change for guiding packet forwarding.
•
Automatically generates traps and logs to inform users to take the correct actions.
To prevent frequent physical link flapping from affecting system performance, configure physical
state change suppression. You can configure this feature to suppress only link-down events, only
link-up events, or both. If an event of the specified type still exists when the suppression interval
expires, the system reports the event to the CPU.
Restrictions and guidelines
Do not enable this feature on an interface that has RRPP, spanning tree protocols, or Smart Link
enabled.
You can configure different suppression intervals for link-up and link-down events.
If you execute the link-delay command multiple times on an interface, the following rules apply:
•
You can configure the suppression intervals for link-up and link-down events separately.
•
If you configure the suppression interval multiple times for link-up or link-down events, the most
recent configuration takes effect.
The link-delay, dampening, and port link-flap protect enable commands are
mutually exclusive on an Ethernet interface.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Configure physical state change suppression.
link-delay { down | up } [ msec ] delay-time
By default, each time the physical link of an interface goes up or comes down, the interface
immediately reports the change to the CPU.
Configuring dampening on an Ethernet interface
About dampening
The interface dampening feature uses an exponential decay mechanism to prevent excessive
interface flapping events from adversely affecting routing protocols and routing tables in the network.
Suppressing interface state change events protects the system resources.
If an interface is not dampened, its state changes are reported. For each state change, the system
also generates an SNMP trap and log message.
After a flapping interface is dampened, it does not report its state changes to the CPU. For state
change events, the interface only generates SNMP trap and log messages.
5
Parameters
•
Penalty—The interface has an initial penalty of 0. When the interface flaps, the penalty
increases by 1000 for each down event until the ceiling is reached. It does not increase for up
events. When the interface stops flapping, the penalty decreases by half each time the half-life
timer expires until the penalty drops to the reuse threshold.
•
Ceiling—The penalty stops increasing when it reaches the ceiling.
•
Suppress-limit—The accumulated penalty that triggers the device to dampen the interface. In
dampened state, the interface does not report its state changes to the CPU. For state change
events, the interface only generates SNMP traps and log messages.
•
Reuse-limit—When the accumulated penalty decreases to this reuse threshold, the interface is
not dampened. Interface state changes are reported to the upper layers. For each state change,
the system also generates an SNMP trap and log message.
•
Decay—The amount of time (in seconds) after which a penalty is decreased.
•
Max-suppress-time—The maximum amount of time the interface can be dampened. If the
penalty is still higher than the reuse threshold when this timer expires, the penalty stops
increasing for down events. The penalty starts to decrease until it drops below the reuse
threshold.
When executing the dampening command, follow these rules to set the values mentioned above:
•
The ceiling is equal to 2(Max-suppress-time/Decay) Ă— reuse-limit. It is not user configurable.
•
The configured suppress limit is lower than or equal to the ceiling.
•
The ceiling is lower than or equal to the maximum suppress limit supported.
Figure 1 shows the change rule of the penalty value. The lines t0 and t2 indicate the start time and
end time of the suppression, respectively. The period from t0 to t2 indicates the suppression period, t0
to t1 indicates the max-suppress-time, and t1 to t2 indicates the complete decay period.
Figure 1 Change rule of the penalty value
Restrictions and guidelines
•
The dampening, link-delay, and port link-flap protect enable commands are
mutually exclusive on an interface.
Not suppressed Not suppressedSuppressed
Penalty
Time
Reuse limit
Suppress limit
Ceiling
t
0
t
1
t
2
6
•
The dampening command does not take effect on the administratively down events. When
you execute the shutdown command, the penalty restores to 0, and the interface reports the
down event to the upper-layer protocols.
•
Do not enable the dampening feature on an interface with RRPP, MSTP, or Smart Link enabled.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable dampening on the interface.
dampening [ half-life reuse suppress max-suppress-time ]
By default, interface dampening is disabled on Ethernet interfaces.
Enabling link flapping protection on an interface
About link flapping protection
Link flapping on an interface changes network topology and increases the system overhead. For
example, in an active/standby link scenario, when interface status on the active link changes
between UP and DOWN, traffic switches between active and standby links. To solve this problem,
configure this feature on the interface.
With this feature enabled on an interface, when the interface goes down, the system enables link
flapping detection. During the link flapping detection interval, if the number of detected flaps reaches
or exceeds the link flapping detection threshold, the system shuts down the interface.
Restrictions and guidelines
This feature takes effect only if it is configured in both the system view and Ethernet interface view.
IRF system stability might be affected by IRF physical link flapping. For IRF system stability, this
feature is enabled by default on IRF physical interfaces and the enabling status of this feature is not
affected by the status of global link flapping protection. When the number of flaps detected on an IRF
physical interface exceeds the threshold within the detection interval, the device outputs a log rather
than shuts down the IRF physical interface.
The dampening, link-delay, and port link-flap protect enable commands are
mutually exclusive on an Ethernet interface.
To bring up an interface that has been shut down by link flapping protection, execute the undo
shutdown command.
In the display interface command output, the Link-Flap DOWN value of the Current state
field indicates that the interface has been shut down by link flapping protection.
Procedure
1. Enter system view.
system-view
2. Enable link flapping protection globally.
link-flap protect enable
By default, link flapping protection is disabled globally.
3. Enter Ethernet interface view.
interface interface-type interface-number
4. Enable link flapping protection on the Ethernet interface.
7
port link-flap protect enable [ interval interval | threshold threshold ]
*
By default, link flapping protection is disabled on an Ethernet interface.
Configuring storm suppression
About storm suppression
The storm suppression feature ensures that the size of a particular type of traffic (broadcast,
multicast, or unknown unicast traffic) does not exceed the threshold on an interface. When the
broadcast, multicast, or unknown unicast traffic on the interface exceeds this threshold, the system
discards packets until the traffic drops below this threshold.
Both storm suppression and storm control can suppress storms on an interface. Storm suppression
uses the chip to suppress traffic. Storm suppression has less impact on the device performance than
storm control, which uses software to suppress traffic.
Restrictions and guidelines
•
For the traffic suppression result to be determined, do not configure storm control together with
storm suppression for the same type of traffic. For more information about storm control, see
"Configuring storm control on an Ethernet interface."
•
When you configure the suppression threshold in kbps, the actual suppression threshold might
be different from the configured one as follows:
ï‚¡ If the configured value is smaller than 64, the value of 64 takes effect.
ï‚¡ If the configured value is greater than 64 but not an integer multiple of 64, the integer
multiple of 64 that is greater than and closest to the configured value takes effect.
For the suppression threshold that takes effect, see the prompt on the device.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable broadcast suppression and set the broadcast suppression threshold.
broadcast-suppression { ratio | pps max-pps | kbps max-kbps }
By default, broadcast suppression is disabled.
4. Enable multicast suppression and set the multicast suppression threshold.
multicast-suppression { ratio | pps max-pps | kbps max-kbps }
By default, multicast suppression is disabled.
5. Enable unknown unicast suppression and set the unknown unicast suppression threshold.
unicast-suppression { ratio | pps max-pps | kbps max-kbps }
By default, unknown unicast suppression is disabled.
Configuring generic flow control on an Ethernet interface
About generic flow control
To avoid dropping packets on a link, you can enable generic flow control at both ends of the link.
When traffic congestion occurs at the receiving end, the receiving end sends a flow control (Pause)
frame to ask the sending end to suspend sending packets. Generic flow control includes the
following types:
8
•
TxRx-mode generic flow control—Enabled by using the flow-control command. With
TxRx-mode generic flow control enabled, an interface can both send and receive flow control
frames:
ï‚¡ When congestion occurs, the interface sends a flow control frame to its peer.
ï‚¡ When the interface receives a flow control frame from its peer, it suspends sending packets
to its peer.
•
Rx-mode generic flow control—Enabled by using the flow-control receive enable
command. With Rx-mode generic flow control enabled, an interface can receive flow control
frames, but it cannot send flow control frames:
ï‚¡ When congestion occurs, the interface cannot send flow control frames to its peer.
ï‚¡ When the interface receives a flow control frame from its peer, it suspends sending packets
to its peer.
To handle unidirectional traffic congestion on a link, configure the flow-control receive
enable command at one end and the flow-control command at the other end. To enable both
ends of a link to handle traffic congestion, configure the flow-control command at both ends.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable generic flow control.
ï‚¡ Enable TxRx-mode generic flow control.
flow-control
ï‚¡ Enable Rx-mode generic flow control.
flow-control receive enable
By default, generic flow control is disabled on an Ethernet interface.
Enabling energy saving features on an Ethernet interface
About energy saving features on an Ethernet interface
This feature contains auto power-down and Energy Efficient Ethernet (EEE) on an Ethernet
interface.
When an Ethernet interface with auto power-down enabled has been down for a certain period of
time, both of the following events occur:
•
The device automatically stops supplying power to the Ethernet interface.
•
The Ethernet interface enters the power save mode.
The time period depends on the chip specifications and is not configurable.
When the Ethernet interface comes up, both of the following events occur:
•
The device automatically restores power supply to the Ethernet interface.
•
The Ethernet interface restores to its normal state.
With Energy Efficient Ethernet (EEE) enabled, a link-up interface enters low power state if it has not
received any packet for a period of time. The time period depends on the chip specifications and is
not configurable. When a packet arrives later, the device automatically restores power supply to the
interface and the interface restores to the normal state.
9
Restrictions and guidelines
Fiber ports do not support this feature.
Configuring auto power-down on an Ethernet interface
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable auto power-down on the Ethernet interface.
port auto-power-down
By default, auto power-down is disabled on an Ethernet interface.
Configuring EEE on an Ethernet interface
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Enable EEE on the Ethernet interface.
eee enable
By default, EEE is disabled on an Ethernet interface.
Setting the statistics polling interval
About statistics polling interval
To display the interface statistics collected in the last statistics polling interval, use the display
interface command. To clear the interface statistics, use the reset counters interface
command.
A device supports either the system view settings or the Ethernet interface view settings.
•
The statistics polling interval configured in system view takes effect on all Ethernet interfaces.
•
The statistics polling interval configured in Ethernet interface view takes effect only on the
current interface.
For an Ethernet interface, the statistics polling interval configured in Ethernet interface view takes
priority.
Restrictions and guidelines for setting the statistics polling interval
As a best practice, use the default setting when you set the statistics polling interval in system view.
A short statistics polling interval might decrease the system performance and result in inaccurate
statistics.
Setting the statistics polling interval in system view
1. Enter system view.
system-view
2. Set the statistics polling interval.
flow-interval interval
The default setting is 300 seconds.
Setting the statistics polling interval in Ethernet interface view
1. Enter system view.
10
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Set the statistics polling interval for the Ethernet interface.
flow-interval interval
By default, the statistics polling interval is 300 seconds.
Enabling loopback testing on an Ethernet interface
About loopback testing
Perform this task to determine whether an Ethernet link works correctly.
Loopback testing includes the following types:
•
Internal loopback testing—Tests the device where the Ethernet interface resides. The
Ethernet interface sends outgoing packets back to the local device. If the device fails to receive
the packets, the device fails.
•
External loopback testing—Tests the hardware function of the Ethernet interface. The
Ethernet interface sends outgoing packets to the local device through a self-loop plug. If the
device fails to receive the packets, the hardware function of the Ethernet interface fails.
Restrictions and guidelines
•
After you enable this feature on an Ethernet interface, the interface does not forward data
traffic.
•
An Ethernet interface in a loopback test cannot correctly forward data packets.
•
You cannot perform a loopback test on Ethernet interfaces manually brought down (displayed
as in ADM or Administratively DOWN state).
•
The speed, duplex, mdix-mode, and shutdown commands cannot be configured on an
Ethernet interface in a loopback test.
•
After you enable this feature on an Ethernet interface, the Ethernet interface switches to full
duplex mode. After you disable this feature, the Ethernet interface restores to its duplex setting.
•
The shutdown, port up-mode, and loopback commands are mutually exclusive.
Procedure
1. Enter system view.
system-view
2. Enter Ethernet interface view.
interface interface-type interface-number
3. Configure loopback testing on the Ethernet interface.
ï‚¡ Enable loopback testing on the Ethernet interface.
loopback{ external | internal }
By default, loopback testing is disabled on an Ethernet interface.
ï‚¡ Perform a loopback test.
loopback-test{ external | internal }
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335

HPE Networking Comware 5120v3 Switch Series Layer 2—LAN Switching Configuration Guide

Category
Software
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI