3com 7750 Series Configuration manual

Category
Software
Type
Configuration manual

This manual is also suitable for

3Com
®
Switch 7750 Family
Configuration Guide
Switch 7750
Switch 7754
Switch 7757
Switch 7758
www.3Com.com
Part Number: 10015462 Rev. AD
Published: December 2007
3Com Corporation
350 Campus Drive
Marlborough, MA
USA 01752-3064
Copyright © 2006-2007, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any
form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without
written permission from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time
without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or
expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality,
and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license agreement
included with the product as a separate document, in the hard copy documentation, or on the removable media in a
directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will
be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are provided to
you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense. Software is
delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item”
as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial
license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or
FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided
on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered
in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
Cisco is a registered trademark of Cisco Systems, Inc.
Funk RADIUS is a registered trademark of Funk Software, Inc.
Aegis is a registered trademark of Aegis Group PLC.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are
registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a
registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed
to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards.
Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
CONTENTS
ABOUT THIS GUIDE
Conventions 17
Related Documentation 17
1 CLI OVERVIEW
Introduction to the CLI 19
Command Level/Command View 19
CLI Features 29
2 LOGGING INTO AN ETHERNET SWITCH
Logging into an Ethernet Switch 33
Introduction to the User Interface 33
3 LOGGING IN THROUGH THE CONSOLE PORT
Introduction 35
Logging in through the Console Port 35
Console Port Login Configuration 37
Console Port Login Configuration with Authentication Mode Being None 39
Console Port Login Configuration with Authentication Mode Being Password 42
Console Port Login Configuration with Authentication Mode Being Scheme 46
4 LOGGING IN THROUGH TELNET
Introduction 51
Telnet Configuration with Authentication Mode Being None 52
Telnet Configuration with Authentication Mode Being Password 55
Telnet Configuration with Authentication Mode Being Scheme 58
Telneting to a Switch 62
5 LOGGING IN USING MODEM
Introduction 65
Configuration on the Administrator Side 65
Configuration on the Switch Side 65
Modem Connection Establishment 66
Modem Attributes Configuration 68
4 CONTENTS
6 LOGGING IN THROUGH THE WEB-BASED NETWORK MANAGEMENT
S
YSTEM
Introduction 71
Establishing an HTTP Connection 71
Configuring the Login Banner 72
Enabling/Disabling the WEB Server 73
7 LOGGING IN THROUGH NMS
Introduction 75
Connection Establishment Using NMS 75
8 USER CONTROL
Introduction 77
Controlling Telnet Users 77
Controlling Network Management Users by Source IP Addresses 79
Controlling Web Users by Source IP Address 80
9 CONFIGURATION FILE MANAGEMENT
Introduction to Configuration File 83
Configuration File-Related Operations 83
10 VLAN OVERVIEW
VLAN Overview 87
Port-Based VLAN 89
Protocol-Based VLAN 91
11 VLAN CONFIGURATION
VLAN Configuration 95
Configuring a Port-Based VLAN 97
Configuring a Protocol-Based VLAN 100
12 VOICE VLAN CONFIGURATION
Voice VLAN Overview 105
Voice VLAN Configuration 108
Displaying and Maintaining Voice VLAN Configuration 110
Voice VLAN Configuration Example 110
13 ISOLATE-USER-VLAN CONFIGURATION
Isolate-User-VLAN Overview 113
Isolate-User-VLAN Configuration 114
Displaying Isolate-User-VLAN Configuration 116
Isolate-User-VLAN Configuration Example 116
Contents 5
14 SUPER VLAN
Super VLAN Overview 121
Super VLAN Configuration 121
Displaying Super VLAN 123
Super VLAN Configuration Example 124
15 IP ADDRESS CONFIGURATION
IP Address Overview 127
Configuring an IP Address for a VLAN Interface 129
Displaying IP Address Configuration 130
IP Address Configuration Example 130
Troubleshooting 130
16 IP PERFORMANCE CONFIGURATION
IP Performance Overview 131
IP Performance Configuration 131
Configuring TCP Attributes 132
Configuring to Send Special IP Packets to CPU 132
Enabling Forwarding of Directed Broadcasts to a Directly Connected Network 132
Disabling ICMP Error Message Sending 133
Displaying and Debugging IP Performance 133
Troubleshooting 134
17 IPX CONFIGURATION
IPX Protocol Overview 137
IPX Configuration 138
Displaying and Debugging IPX 145
IPX Configuration Example 145
Troubleshooting IPX 147
18 GVRP CONFIGURATION
Introduction to GARP and GVRP 153
GVRP Configuration 156
Displaying and Maintaining GVRP 157
GVRP Configuration Example 158
19 QINQ CONFIGURATION
QinQ Overview 159
QinQ Configuration 160
Displaying QinQ 161
QinQ Configuration Example 161
20 SELECTIVE QINQ CONFIGURATION
Selective QinQ Overview 165
6 CONTENTS
Selective QinQ Configuration 165
Configuring Outer Tag Replacement 166
Selective QinQ Configuration Example 167
21 SHARED VLAN CONFIGURATION
Shared VLAN Overview 169
Shared VLAN Configuration 170
Displaying Shared VLAN 170
Shared VLAN Configuration Example 171
22 PORT BASIC CONFIGURATION
Ethernet Port Configuration 173
Ethernet Port Configuration Example 180
Troubleshooting Ethernet Port Configuration 181
23 LINK AGGREGATION CONFIGURATION
Overview 183
Link Aggregation Configuration 189
Displaying and Maintaining Link Aggregation Configuration 192
Link Aggregation Configuration Example 193
24 PORT ISOLATION CONFIGURATION
Port Isolation Overview 195
Configuring Port Isolation 195
Displaying Port Isolation Configuration 196
Port Isolation Configuration Example 196
25 PORT SECURITY CONFIGURATION
Port Security Overview 199
Port Security Configuration 202
Displaying Port Security Configuration 206
Port Security Configuration Example 206
26 PORT BINDING CONFIGURATION
Port Binding Overview 209
Displaying Port Binding Configuration 209
Port Binding Configuration Example 210
27 DLDP CONFIGURATION
Overview 211
DLDP Fundamentals 212
DLDP Configuration 218
DLDP Network Example 222
Contents 7
28 MAC ADDRESS TABLE MANAGEMENT
Overview 225
Configuring MAC Address Table Management 227
Displaying and Maintaining MAC Address Configuration 230
Configuration Example 231
29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION
Centralized MAC Address Authentication Overview 233
Centralized MAC Address Authentication Configuration 234
Displaying and Debugging Centralized MAC Address Authentication 237
Centralized MAC Address Authentication Configuration Example 237
30 MSTP CONFIGURATION
MSTP Overview 241
Root Bridge Configuration 246
Leaf Node Configuration 259
The mCheck Configuration 263
Protection Function Configuration 264
Digest Snooping Configuration 268
Rapid Transition Configuration 269
BPDU Tunnel Configuration 272
STP Maintenance Configuration 274
MSTP Displaying and Debugging 274
MSTP Implementation Example 275
BPDU Tunnel Configuration Example 277
31 IP ROUTING PROTOCOL OVERVIEW
Introduction to IP Route and Routing Table 281
Routing Management Policy 283
32 STATIC ROUTE CONFIGURATION
Introduction to Static Route 285
Static Route Configuration 286
Displaying and Maintaining the Routing Table 286
Static Route Configuration Example 287
Troubleshooting a Static Route 288
33 RIP CONFIGURATION
RIP Overview 289
Introduction to RIP Configuration Tasks 290
Basic RIP Configuration 291
RIP Route Control 293
RIP Network Adjustment and Optimization 296
Displaying and Maintaining RIP Configuration 298
RIP Configuration Example 299
8 CONTENTS
Troubleshooting RIP Configuration 300
34 OSPF CONFIGURATION
OSPF Overview 301
Introduction to OSPF Configuration Tasks 307
Basic OSPF Configuration 309
OSPF Area Attribute Configuration 311
OSPF Network Type Configuration 312
OSPF Route Control 313
OSPF Network Adjustment and Optimization 316
Displaying OSPF Configuration 320
OSPF Configuration Example 321
Troubleshooting OSPF Configuration 325
35 IS-IS CONFIGURATION
IS-IS Overview 327
Introduction to IS-IS Configuration 332
IS-IS Basic Configuration 333
Displaying Integrated IS-IS Configuration 345
Integrated IS-IS Configuration Example 345
36 BGP CONFIGURATION
BGP Overview 349
BGP Configuration Tasks 354
Basic BGP Configuration 355
Configuring the Way to Advertise/Receive Routing Information 356
Configuring BGP Route Attributes 361
Adjusting and Optimizing a BGP Network 363
Configuring a Large-Scale BGP Network 365
Displaying and maintaining BGP 368
Configuration Example 369
BGP Error Configuration Example 376
37 IP ROUTING POLICY CONFIGURATION
IP Routing Policy Overview 377
IP Routing Policy Configuration 378
Displaying IP Routing Policy 383
IP Routing Policy Configuration Example 383
Troubleshooting IP Routing Policy 385
38 ROUTE CAPACITY CONFIGURATION
Route Capacity Configuration Overview 387
Route Capacity Configuration 387
Displaying Route Capacity Configuration 388
Contents 9
39 802.1X CONFIGURATION
Introduction to 802.1x 389
802.1x Configuration 399
Basic 802.1x Configuration 399
802.1x-Related Parameter Configuration 401
Advanced 802.1x Configuration 401
Displaying and Debugging 802.1x 403
Configuration Example 404
40 HABP CONFIGURATION
Introduction to HABP 409
HABP Server Configuration 409
HABP Client Configuration 410
Displaying HABP 410
HABP Configuration Example 410
41 MULTICAST OVERVIEW
Multicast Overview 413
Multicast Architecture 416
Forwarding Mechanism of Multicast Packets 420
42 GMRP CONFIGURATION
GMRP Overview 423
Configuring GMRP 423
Displaying and Maintaining GMRP 424
GMRP Configuration Example 424
43 IGMP SNOOPING CONFIGURATION
Overview 427
IGMP Snooping Configuration 430
Displaying and Maintaining IGMP Snooping 437
IGMP Snooping Configuration Example 438
Troubleshooting IGMP Snooping 440
44 COMMON MULTICAST CONFIGURATION
Overview 441
Common Multicast Configuration Tasks 441
Displaying Common Multicast Configuration 445
45 STATIC MULTICAST MAC ADDRESS TABLE CONFIGURATION
Overview 447
Configuring a Multicast MAC Address Entry 447
Displaying Multicast MAC Address 447
10 CONTENTS
46 IGMP CONFIGURATION
Overview 449
IGMP Configuration Tasks 454
Displaying IGMP 460
47 PIM CONFIGURATION
PIM Overview 461
Common PIM Configuration 469
PIM-DM Configuration 472
PIM-SM Configuration 472
Displaying and Debugging PIM 475
PIM Configuration Examples 476
Troubleshooting PIM 479
48 MSDP CONFIGURATION
MSDP Overview 481
Configuring MSDP Basic Functions 487
Configuring Connection between MSDP Peers 488
Configuring SA Message Transmission 490
Displaying and Debugging MSDP Configuration 493
MSDP Configuration Example 494
Troubleshooting MSDP Configuration 504
49 AAA & RADIUS & HWTACACS CONFIGURATION
Overview 507
Configuration Tasks 516
AAA Configuration 518
RADIUS Configuration 525
HWTACACS Configuration 532
Displaying and Maintaining AAA & RADIUS & HWTACACS Information 536
AAA & RADIUS & HWTACACS Configuration Example 537
Troubleshooting AAA & RADIUS & HWTACACS Configuration 541
50 EAD CONFIGURATION
Introduction to EAD 543
Typical Network Application of EAD 543
EAD Configuration 544
EAD Configuration Example 545
51 TRAFFIC ACCOUNTING CONFIGURATION
Introduction to Traffic Accounting 547
Configuring Traffic Accounting 548
Displaying Traffic Accounting 549
Traffic Accounting Configuration Example 550
Contents 11
52 VRRP CONFIGURATION
VRRP Overview 553
VRRP Configuration 557
Displaying and Maintaining VRRP 559
VRRP Configuration Example 559
Troubleshooting VRRP 565
53 HA CONFIGURATION
HA Overview 567
HA Configuration 568
Displaying HA 569
54 ARP CONFIGURATION
Introduction to ARP 571
Configuring ARP 575
Displaying and Maintaining ARP Configuration 579
ARP Configuration Example 580
55 PROXY ARP CONFIGURATION
Proxy ARP Overview 583
Configuring Proxy ARP 584
Proxy ARP Configuration Example 584
56 DHCP OVERVIEW
Introduction to DHCP 589
DHCP IP Address Assignment 589
DHCP Packet Format 590
DHCP Packet Processing Modes 592
Protocols and Standards 592
57 DHCP SERVER CONFIGURATION
Introduction to DHCP Server 593
Global Address Pool-Based DHCP Server Configuration 594
Interface Address Pool-Based DHCP Server Configuration 600
DHCP Security Configuration 606
Displaying and Maintaining a DHCP Server 607
DHCP Server Configuration Example 607
Troubleshooting a DHCP Server 609
58 DHCP RELAY AGENT CONFIGURATION
Introduction to DHCP Relay Agent 611
Configuring DHCP Relay Agent 613
Displaying and Maintaining DHCP Relay Agent 620
DHCP Relay Agent Configuration Example 620
12 CONTENTS
Troubleshooting DHCP Relay Agent 621
59 DHCP SNOOPING CONFIGURATION
Configuring DHCP Snooping 623
DHCP Snooping Configuration 628
Displaying and Maintaining DHCP Snooping 632
DHCP Snooping Configuration Example 632
60 ACL CONFIGURATION
ACL Overview 637
Choosing ACL Mode for Traffic Flows 639
Specifying the Matching Order of ACL Rules Sent to a Port 640
Configuring Time Ranges 640
Defining Basic ACLs 641
Defining Advanced ACLs 642
Defining Layer 2 ACLs 647
Defining User-Defined ACLs 649
Applying ACLs on Ports 650
Displaying ACL Configuration 652
ACL Configuration Example 653
61 QOS CONFIGURATION
Overview 657
QoS Supported by the Switch 7750 666
Setting Port Priority 666
Configuring Priority to Be Used When a Packet Enters an Output Queue 667
Configuring Priority Remark 669
Configuring Rate Limit on Ports 671
Configuring TP 672
Configuring Redirect 673
Configuring Queue-scheduling 674
Configuring Congestion Avoidance 675
Configuring Traffic Statistics 676
Configuring Assured Bandwidth 678
Configuring Bidirectional CAR 679
Configuring Traffic-Based Selective QinQ 679
QoS Configuration Example 681
62 MIRRORING CONFIGURATION
Overview 685
Mirroring Supported by the Switch 7750 688
Mirroring Configuration 688
63 CLUSTER
Cluster Overview 703
Contents 13
Management Device Configuration 708
Member Device Configuration 711
Intra-Cluster Configuration 713
Displaying and Maintaining a Cluster 713
Cluster Configuration Example 714
64 POE CONFIGURATION
PoE Overview 719
PoE Configuration 721
Displaying PoE Configuration 723
PoE Configuration Example 724
65 POE PSU SUPERVISION CONFIGURATION
Introduction to PoE PSU Supervision 727
AC Input Alarm Thresholds Configuration 727
DC Output Alarm Threshold Configuration 728
Displaying PoE Supervision Information 729
PoE PSU Supervision Configuration Example 729
66 POE PROFILE CONFIGURATION
Introduction to PoE Profile 731
PoE Profile Configuration Tasks 731
Displaying PoE Profile Configuration 732
PoE Profile Configuration Example 732
67 UDP-HELPER CONFIGURATION
Introduction to UDP-Helper 735
Configuring UDP-Helper 735
Displaying and Maintaining UDP-Helper 736
UDP-Helper Configuration Example 737
68 SNMP CONFIGURATION
SNMP Overview 739
Configuring SNMP Basic Functions 741
Configuring Trap 743
Displaying SNMP 744
SNMP Configuration Example 745
69 RMON CONFIGURATION
Introduction to RMON 747
RMON Configuration 749
Displaying RMON 750
RMON Configuration Example 750
14 CONTENTS
70 NTP CONFIGURATION
Introduction to NTP 753
NTP Implementation Mode Configuration 757
Access Control Permission Configuration 759
NTP Authentication Configuration 759
Configuration of Optional NTP Parameters 761
Displaying and Debugging NTP 762
Configuration Example 762
71 SSH TERMINAL SERVICES
SSH Terminal Services 773
SFTP Service 784
72 FILE SYSTEM MANAGEMENT
File System Configuration 791
73 BIMS CONFIGURATION
Introduction to BIMS 797
BIMS Device Configuration Tasks 798
Basic Configuration of BIMS Device 798
Configuring BIMS Access Mode 799
BIMS Configuration Example 800
74 FTP AND TFTP CONFIGURATION
FTP Configuration 803
TFTP Configuration 810
75 INFORMATION CENTER
Information Center Overview 815
Information Center Configuration 819
Displaying and Debugging Information Center Configuration 825
Information Center Configuration Examples 825
76 DNS CONFIGURATION
DNS Overview 831
Configuring Static DNS Resolution 833
Configuring Dynamic DNS Resolution 833
Displaying and Maintaining DNS 834
Troubleshooting DNS Configuration 835
77 BOOTROM AND HOST SOFTWARE LOADING
Introduction to Loading Approaches 837
Local Software Loading 837
Contents 15
Remote Software Loading 846
78 BASIC SYSTEM CONFIGURATION & DEBUGGING
Basic System Configuration 853
Displaying the System Status 855
System Debugging 855
79 NETWORK CONNECTIVITY TEST
Network Connectivity Test 859
80 DEVICE MANAGEMENT
Introduction to Device Management 861
Device Management Configuration 861
Configuring Pause Frame Protection Mechanism 866
Configuring Layer 3 Connectivity Detection 867
Configuring Queue Traffic Monitoring 868
Configuring Error Packets Monitoring 868
Displaying the Device Management Configuration 869
Remote Switch Update Configuration Example 870
81 REMOTE-PING CONFIGURATION
Remote-ping Overview 873
Remote-ping Configuration 876
Remote-ping Configuration Example 889
82 RRPP CONFIGURATION
RRPP Overview 903
Master Node Configuration 909
Transit Node Configuration 911
Edge Node Configuration 912
Assistant Edge Node Configuration 914
Configuration Example 916
83 TELNET PROTECTION CONFIGURATION
Introduction 921
Telnet Protection Configuration 921
84 SMART LINK CONFIGURATION
Smart Link Overview 923
Configuring Smart Link 925
Displaying and Debugging Smart Link 928
Smart Link Configuration Example 928
16 CONTENTS
85 MONITOR LINK CONFIGURATION
Introduction to Monitor Link 931
Configuring Monitor Link 932
Displaying Monitor Link Configuration 934
Monitor Link Configuration Example 934
86 CONFIGURING HARDWARE-DEPENDENT SOFTWARE
Configuring Boot ROM Upgrade with App File 937
Configuring Inter-Card Link State Adjustment 938
Configuring Internal Channel Monitoring 939
Configuring Switch Chip Auto-reset 939
Configuring CPU Usage Threshold 940
ABOUT THIS GUIDE
This guide describes the 3Com
®
Switch 7750 and how to install hardware,
configure and boot software, and maintain software and hardware. This guide
also provides troubleshooting and support information for your switch.
This guide is intended for Qualified Service personnel who are responsible for
configuring, using, and managing the switches. It assumes a working knowledge
of local area network (LAN) operations and familiarity with communication
protocols that are used to interconnect LANs.
n
Always download the Release Notes for your product from the 3Com World Wide
Web site and check for the latest updates to software and product
documentation:
http://www.3com.com
Conventions Table 1 lists icon conventions that are used throughout this guide.
Related
Documentation
The following manuals offer additional information necessary for managing your
Switch 7750:
Switch 7750 Command Reference Guide — Provides detailed descriptions of
command line interface (CLI) commands, that you require to manage your
Switch 7750.
Switch 7750 Quick Reference Guide — Provides a summary of command line
interface (CLI) commands that are required for you to manage your Switch
7750.
Switch 7750 Getting Started Guide — Provides detailed descriptions of the
hardware, explains how to set up and install the hardware and software for
you Switch 7750.
Table 1 Notice Icons
Icon Notice Type Description
n
Information note Information that describes important features or
instructions.
c
Caution Information that alerts you to potential loss of data
or potential damage to an application, system, or
device.
w
Warning Information that alerts you to potential personal
injury.
18 ABOUT THIS GUIDE
Switch 7750 Release Notes — Contains the latest information about your
product. If information in this guide differs from information in the release
notes, use the information in the Release Notes.
These documents are available in Adobe Acrobat Reader Portable Document
Format (PDF) on the CD-ROM that accompanies your router or on the 3Com
World Wide Web site:
http://www.3com.com/
1
CLI OVERVIEW
Introduction to the CLI A 3Com series Ethernet switch provides a command line interface (CLI) and
commands for you to configure and manage the Ethernet switch. The CLI is
featured by the following:
Commands are grouped by levels. This prevents unauthorized users from
operating the switch with relevant commands.
Users can gain online help at any time by entering the question mark “?”.
Commonly used diagnosing utilities (such as Tracert and Ping) are available.
Debugging information of various kinds is available.
The command history is available. You can recall and execute a history
command easily.
You can execute a command by only entering part of the command in the CLI,
as long as the keywords you input uniquely identify the corresponding ones.
Command
Level/Command View
To prevent unauthorized accesses, commands are grouped by command levels.
Commands fall into four levels: visit, monitor, system, and manage:
Visit level: Commands at this level are mainly used to diagnose network and
change the language mode of user interface, and cannot be saved in
configuration files. For example, the ping, tracert, and language-mode
commands are at this level.
Monitor level: Commands at this level are mainly used to maintain the system
and diagnose service problems, and cannot be saved to configuration files. For
example, the display and debugging commands are at this level.
System level: Commands at this level are mainly used to configure services.
Commands concerning routing and network layers are at this level. You can
utilize network services by using these commands.
Manage level: Commands at this level are associated with the basic operation
of the system, and the system supporting modules. These commands provide
supports to services. Commands concerning file system, FTP, TFTP, user
management, and level setting are at this level.
Users logging into a switch also fall into four levels, each of which corresponding
to one of the above command levels. Users at a specific level can only use the
commands of the same level and those of the lower levels.
20 CHAPTER 1: CLI OVERVIEW
Switching between User
Levels
A user can switch the user level from one to another by executing a related
command after logging into a switch. The administrator can also set user level
switching passwords as required.
Setting a user level switching password
Table 1 lists the operations to set a user level switching password.
Switching to another user level
Table 2 lists operations to switch to another user level.
n
If the user level is not specified when user level switching password are set or
when user level is switched, the user level is 3 by default.
For security purpose, the password a user enters when switching to a higher
user level is not displayed. A user will remain at the original user level if the user
has tried three times to enter the correct password but fails to do this.
Configuring the Level of
a Specific Command in a
Specific View
You can configure the level of a specific command in a specific view. Commands
fall into four command levels: visit, monitor, system, and manage, which are
identified as 0, 1, 2, and 3 respectively. The administrator can change the
command level a command belongs to.
Table 3 lists the operations to configure the level of a specific command.
Tabl e 1 Set a user level switching password
Operation Command Description
Enter system view system-view -
Set a password for
switching from a
lower user level to the
user level identified by
the level argument
super password [ level
level ]{simple | cipher }
password
Optional
A password is necessary only
when a user switches from a lower
user level to a higher user level.
Tabl e 2 Switch to another user level
Operation Command Description
Switch to the user
level identified by the
level argument
super [ level ] Required
Execute this command in user
view.
If a password for switching to the
user level identified by the level
argument is set and you want to
switch to a lower user level, you
will remain at the lower user level
unless you provide the correct
password after executing this
command.
Tabl e 3 Configure the level of a specific command in a specific view
Operation Command Description
Enter system view system-view -
1 / 1

3com 7750 Series Configuration manual

Category
Software
Type
Configuration manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI

Ask the document