H3C ES4200 Switch Series Web Configuration Guide-R88xx-6W100

HomeSupportSwitchesE SeriesES4200 SeriesTechnical DocumentsConfigure & DeployConfiguration GuidesH3C ES4200 Switch Series Web Configuration Guide-R88xx-6W100
01-text
Title Size Download
01-text 2.16 MB

Contents

Logging in to the device· 1

Using the web interface· 2

Overview· 2

Webpage layout 2

Top-level menu items and features· 3

Home· 3

System menu· 3

Monitoring menu· 4

Switch Settings menu· 4

VLAN Settings menu· 5

QoS Settings· 5

Home· 6

Overview· 6

Device Info· 6

Overview· 6

Procedure· 6

Port Statistics· 6

System·· 8

IP Settings· 8

Configuring IP settings· 8

Configuring DNS settings· 9

Account 9

System Restart 9

System Upgrade· 10

Restore to Factory· 11

Monitoring· 13

Port Statistics· 13

Cable Detection· 13

Overview· 13

Restrictions and guidelines· 13

Procedure· 14

Loop Prevention· 14

Overview· 14

Hardware and feature compatibility· 15

Procedure· 15

Configuration examples· 18

Example: Configuring basic loop detection functions· 18

Switch Settings· 21

Port Settings· 21

Overview· 21

Configuring port settings· 21

Port Info· 22

Port Mirroring· 22

Overview· 22

Concepts· 22

Configuring port mirroring· 23

Displaying and clearing port mirroring information· 23

Port Isolation· 23

Overview· 23

Configuring port isolation settings· 23

Displaying port isolation information· 24

Static MAC· 24

Overview· 24

Configuring static MAC address settings· 26

Displaying static MAC addresses· 26

Filtering MAC addresses· 26

MAC List 27

DHCP Snooping· 28

Overview· 28

DHCP snooping benefits· 28

Configuring DHCP snooping· 29

Displaying DHCP snooping information· 30

PoE Settings· 30

Overview· 30

Procedure· 31

Configuration examples· 32

Example: Configuring port mirroring· 32

Example: Configuring port isolation· 34

MAC address configuration example· 35

Example: Enabling DHCP snooping globally· 38

VLAN Settings· 40

Overview· 40

Restrictions and guidelines· 40

VLAN features· 40

Overview· 40

Procedure· 40

VLAN Members· 40

Creating VLANs· 40

Deleting VLANs· 41

VLAN Settings· 41

Overview· 41

Configuring port VLAN settings· 42

Displaying port VLAN information· 43

Configuration example· 44

Network configuration· 44

Procedure· 44

QoS Settings· 49

Port Rate Limit 49

Overview· 49

Configuring port bandwidth settings· 49

Displaying port bandwidth information· 49

Storm Control 50

Overview· 50

Configuring storm control 50

Displaying storm control information· 50

Troubleshooting· 51

A fiber port fails to come up· 51

Symptom·· 51

Troubleshooting flowchart 51

Solution· 51

A copper port fails to come up· 52

Symptom·· 52

Troubleshooting flowchart 53

Solution· 53

PoE power supply anomaly· 54

Symptom·· 54

Troubleshooting flowchart 54

Solution· 54

Error packets on a port 55

Symptom·· 55

Troubleshooting flowchart 55

Solution· 55

 


Logging in to the device

 

NOTE:

As a best practice, use the following Web browsers:

·     Google Chrome 109.0.5414.120 or higher.

·     Mozilla Firefox 110.0 or higher.

·     Microsoft Edge 89.0.774.68 or higher.

Internet Explorer Web browsers are not supported in the current software version.

 

1.     Connect the PC to the LAN port on the device.

2.     Assign an IP address in the 192.168.0.233/24 network for the PC.

3.     Check whether the PC is enabled with the proxy service. If the PC uses a proxy server to access the Internet, disable the proxy service.

4.     Open the browser, enter http://192.168.0.233 in the address bar, and then press Enter. 192.168.0.233 is the default management IP address of the device, and you can edit the address after login.

5.     On the login page, enter the default username (admin) and password (admin), and then click Log In. As a best practice, change the login password immediately after the first successful login for security purposes. For configuration procedures, see "Account.”

Figure 1 Web login page

 


Using the web interface

Overview

The top-level menus on the webpage navigation pane include Home, System, Monitoring, Switch Settings, VLAN Settings, and QoS Settings. Clicking on a top-level menu expands its submenu, displaying the feature names. Clicking on a feature name opens the webpage for configuring that feature.

Clicking the  icon on the bottom of the navigation pane opens the feedback page. The feedback page is an important channel for communication with users, and we highly appreciate your opinions. You can fill out the form with your functional suggestions, views on the product interface, discovered bugs, and requirements for new features. We will read every piece of feedback carefully and continuously optimize our product based on your opinions. Thank you for your support and understanding.

Webpage layout

Figure 2 Webpage layout

1) Navigation pane

2) Port state pane

3) Content pane

 

As shown in the figure above, the webpage has the following functional areas:

·     Navigation pane—Provides the Web menu for device functions in a tree structure. You can easily select function menus in the navigation pane. The content pane displays the selection result. You can click the H3C logo on the top of the navigation pane to access the H3C official website, and click the feedback icon  on the bottom of the navigation pane to open the feedback page.

·     Port state paneDisplays port quantity and port state information.

¡     Click the  or  icon on the right of the port state pane to hide or display the port state pane.

¡     When the port state pane is displayed, the pane displays the port quantity and port physical state, and the information is refreshed every 10 seconds.

¡     Table 1 provides the port state description.

·     Content pane—Allows users to perform configuration tasks, and view information and the operation result.

Table 1 Port state description

Port type

Icon

Description

Copper port

The port is disconnected.

The port is connected.

A loop was detected on the port, and loop protection was triggered.

A loop was detected on the port.

Fiber port

The port is disconnected.

The port is connected.

A loop was detected on the port, and loop protection was triggered.

A loop was detected on the port.

 

Top-level menu items and features

Home

The homepage displays basic device information and port information.

System menu

Use Table 2 to navigate to the tasks you can perform from the System menu.

Table 2 System menu navigator

Menus

Tasks

IP Settings

Configure device management IP.

Account

Manage account and password.

System Restart

Reboot the device

System Upgrade

Update system software.

Restore to Factory

Restore factory default settings.

 

Monitoring menu

Use Table 3 to navigate to the tasks you can perform from the Monitoring menu.

Table 3 Monitoring menu navigator

Menus

Tasks

Port Statistics

Display port statistics information.

Cable Detection

Perform cable diagnosis and analysis.

Loop Prevention

·     Loop protection

·     Loop detection

 

Switch Settings menu

Use Table 4 to navigate to the tasks you can perform from the Switch Settings menu.

Table 4 Switch Settings menu navigator

Menus

Tasks

Port Settings

·     Edit port state.

·     Configure port rate and duplex mode.

·     Configure traffic control.

·     Display port information.

Port Mirroring

·     Enable/disable port mirroring.

·     Configure source and destination ports.

·     Display port mirroring information.

Port Isolation

·     Enable/disable port isolation.

·     Display port isolation information.

Static MAC

·     Add and delete static MAC address entries.

·     Configure MAC blocking.

·     Display MAC address information.

MAC Search

Filter MAC address entries.

MAC List

·     Display existing MAC address entries.

·     Clear dynamic MAC address entries.

DHCP Snooping

·     Enable/disable DHCP snooping.

·     Configure trusted and untrusted ports.

·     Display DHCP snooping information.

PoE Settings

·     Enable/disable PoE for interfaces.

·     Display PoE information.

 

VLAN Settings menu

Use Table 5 to navigate to the tasks you can perform from the VLAN Settings menu.

Table 5 VLAN Settings menu navigator

Menus

Tasks

VLAN Members

·     Enable/disable VLAN.

·     Create and delete VLANs.

·     Display static VLAN information.

VLAN Settings

·     Enable/disable VLAN.

·     Divide VLANs based on ports.

·     Display port VLAN information.

 

QoS Settings

Use Table 6 to navigate to the tasks you can perform from the QoS Settings menu.

Table 6 QoS Settings menu navigator

Menus

Tasks

Port Rate Limit

·     Enable/disable port rate limiting.

·     Display port bandwidth information.

Storm Control

·     Enable/disable storm control.

·     Display storm control information.

 

 


Home

Overview

The homepage displays device information and port information.

Device Info

Overview

A device can run in standalone mode or iOptic node mode.

·     Standalone modeA device in standalone mode can be managed through the webpage.

·     iOptic node modeA device in iOptic node mode can be managed through the webpage and SmartMC platform.

When a device runs in iOptic node mode, restarting the device restores its factory defaults.

Procedure

1.     From the navigation pane, select Home.

2.     You can view device information and switch device operating mode in the device information area. A device operates in iOptic node mode by default.

Figure 3 Homepage

 

Port Statistics

1.     From the navigation pane, select Home.

2.     In the port statistics area, you can view port statistics information, including port physical state, packets sent successfully, and packets failed to be sent.


System

IP Settings

Configuring IP settings

1.     From the navigation pane, select System > IP Settings.

2.     Configure the DHCP enabling state.

¡     In standalone mode, DHCP is enabled by default.

¡     By default, a device in iOptic node mode is disabled with DHCP when it is not incorporated and enabled with DHCP after it is incorporated.

3.     Select the management VLAN.

 

NOTE:

The management VLAN feature is not supported when an ES4200 switch operates in iOptic node mode.

 

4.     Enter the management IP address, subnet mask, and gateway address.

5.     Click Submit.

6.     In the dialog box that opens, click OK.

Figure 4 IP settings page

 

Figure 5 Confirming operation

 

Configuring DNS settings

1.     From the navigation pane, select System > IP Settings.

2.     Enter the DNS address.

3.     Click Submit.

Account

1.     From the navigation pane, select System > Account.

2.     In the New Password field, enter a new password.

The default password is admin.

3.     Enter the new password again in the Confirm Password field.

4.     Click Submit.

Figure 6 Configuring account information

 

System Restart

1.     From the navigation pane, select System > System Restart.

2.     Click Restart. Refresh the webpage later to re-enter the system.

Figure 7 System restart page

 

Figure 8 Prompt page

 

System Upgrade

1.     From the navigation pane, select System > System Upgrade.

2.     Click Select File, and then select the target local file.

3.     Click Upgrade.

4.     In the dialog box that opens, click OK. Refresh the webpage after the file is uploaded successfully to re-enter the system.

Figure 9 System upgrade page

 

Figure 10 Confirming operation

 

Restore to Factory

1.     From the navigation pane, select System > Restore to Factory.

2.     Click Restore to Factory. Wait for the restoration to complete.

Figure 11 Restoring factory default settings

 

Figure 12 Prompt page

 

 


Monitoring

Port Statistics

1.     From the navigation pane, select Monitoring > Port Statistics.

2.     You can view port statistics information, including port physical state, packets sent successfully, and packets failed to be sent.

Figure 13 Port statistics page

 

Cable Detection

Overview

Table 7 Cable detection results

Detection result

Description

Error

Failed to obtain data.

Short Circuit

Verify whether a loop exists or change the cable.

Disconnected

Verify whether a loop exists or change the cable.

Mismatch

Verify whether a loop exists or change the cable.

Connected

The cable is in good condition.

 

Restrictions and guidelines

Administratively shut down ports do not support cable detection.

Procedure

1.     From the navigation pane, select Monitoring > Cable Detection.

2.     Select the target ports.

3.     Click the detect icon .

Figure 14 Cable detection page

 

Figure 15 Cable detection results

 

Loop Prevention

Overview

Background

The loop detection mechanism performs periodic checks for Layer 2 loops. The mechanism immediately generates a log message when a loop occurs so that you are promptly notified to adjust network connections and configurations.

·     Loop detection—When the system detects a loop on a port, it does not take any actions on the port, but it will display a red icon for the port on the port state pane.

·     Loop protection—When the system detects a loop on a port, it automatically blocks that port to avoid packet flooding. The system also displays the port as blocked in the Port Loop Info list and the port state pane (yellow icon).

Loop prevention interval

Loop detection is a continuous process as the network changes. Loop detection frames are sent at the loop detection intervals to determine whether loops occur on ports and whether loops are removed.

Port state auto recovery

When the device detects a loop on a port and does not receive any loop detection packets within the recovery interval, it assumes that the loop has been eliminated. The port is then automatically restored to normal forwarding state. This process is the automatic port state recovery process.

Hardware and feature compatibility

Support for this feature varies by device model.

 

Product model

Description

·     ES4200-2T1S-M

·     ES4200-4T1MS-B

·     ES4200-4T2RMS-B

·     ES4200-4P2RMS-B

·     ES4200-8T2RS

·     ES4200-8P2RS

·     ES4200-4T2ST

·     ES4200-4P2ST

·     ES4200-8T2ST

·     ES4200-8P2ST

·     ES4200-8T2S

·     ES4200-8P2S

·     ES4200-4P2RS

·     ES4200-4P2RST

Support configuring loop detection and loop protection, and related parameters

·     ES4200-8P2RX-B

·     ES4200-16P2RX-B

·     ES4200-16T2RX

·     ES4200-16P2RS

Support only loop protection. Both the detection interval and the recovery interval are 5 seconds.

 

Procedure

Enabling or disabling loop protection

1.     From the navigation pane, select Monitoring > Loop Prevention.

2.     Enable or disable the loop protection feature.

By default, loop protection is enabled.

Configuring loop protection and loop detection

1.     From the navigation pane, select Monitoring > Loop Prevention.

2.     To configure loop protection:

¡     Select Loop Protection from the Loop Feature list.

¡     Configure the detection interval. The default interval is two seconds.

¡     Configure the recovery interval. The default interval is 10 seconds.

3.     To configure loop detection:

¡     Select Loop Detection from the Loop Feature list.

¡     Configure the detection interval. The default interval is two seconds.

¡     Configure the recovery interval. The default interval is 10 seconds.

4.     Click Submit.

Displaying port loop information

After enabling loop prevention, you can view the port state information:

·     As shown in Figure 18, port 3 is blocked because a loop is detected on it.

·     As shown in Figure 19, port 2 and port 3 are displayed with a red icon on the port state pane because a loop is detected.

Figure 16 Loop prevention page

 

Figure 17 Loop prevention page

 

Figure 18 Loop protection

 

Figure 19 Loop detection

 

Configuration examples

Example: Configuring basic loop detection functions

Network configuration

As shown in Figure 20, configure loop detection on Device A to automatically shut down the interface on which a loop is detected.

Figure 20 Network diagram

 

Procedure

1.     From the navigation pane, select Monitoring > Loop Prevention.

2.     Select Loop Protection from the Loop Feature list.

3.     Set the detection interval to 100 milliseconds.

4.     Set the recovery interval to 10000 milliseconds.

5.     Click Submit.

Figure 21 Loop prevention page

 

Figure 22 Loop protection

 

Verifying the configuration

As shown in Figure 23, when a loop is detected on port 2, you can view that port 2 is blocked and its icon is displayed in yellow.

Figure 23 Port loop information

 


Switch Settings

Port Settings

Overview

This feature allows you to view the physical state, operating mode, rate, and traffic control information about each port and edit port settings.

Interface rate

Generally, a device automatically negotiates the rate of an Ethernet interface with the peer device. The negotiated rate can be any rate within the rate capability range. To allow the interface to use only specific rates, you can configure auto negotiation rate settings.

Operating mode

You can configure an Ethernet interface to operate in one of the following duplex modes:

·     Full duplex mode—The interface can send and receive packets simultaneously.

·     Half duplex mode—The interface can only send or receive packets at a given time.

·     Auto negotiation mode—The interface negotiates a duplex mode with its peer.

Flow control

With flow control enabled, when traffic congestion occurs at the receiving end, the receiving end sends a flow control (Pause) frame to ask the sending end to suspend sending packets.

Configuring port settings

1.     From the navigation pane, select Switch Settings > Port Settings.

2.     From the Port Settings list, select the ports to configure.

3.     Bring up or shut down the ports. By default, a port is up.

4.     Select a rate and duplex mode. By default, the auto mode is used.

5.     Enable or disable flow control. By default, flow control is enabled.

6.     Click Submit.

Figure 24 Configuring port settings

 

Port Info

1.     From the navigation pane, select Switch Settings > Port Settings.

2.     You can view port information in the Port Info area.

Port Mirroring

Overview

Port mirroring copies the packets passing through a port to the destination port that connects to a data monitoring device for packet analysis.

Concepts

Mirroring source

Monitored port on the device. Packets of the monitored port will be copied and sent to the destination port.

Mirroring destination

Port that connects to the data monitoring device. Packets of the source port will be copied and sent to the destination port.

Mirroring direction

Direction of packets copied on a mirroring source.

·     RxCopies only packets received by the source port.

·     TxCopies only packets sent by the source port.

·     BothCopies packets sent and received by the source port.

Configuring port mirroring

1.     From the navigation pane, select Switch Settings > Port Mirroring.

2.     Select a mirroring direction. By default, port mirroring is disabled.

3.     Select the monitor and source ports.

4.     Click Submit.

Figure 25 Configuring port mirroring

 

Displaying and clearing port mirroring information

1.     From the navigation pane, select Switch Settings > Port Mirroring.

2.     You can view port mirroring information in the Port Mirroring Info area.

3.     To clear port mirroring information, click the delete icon .

Port Isolation

Overview

The port isolation feature isolates Layer 2 traffic for data privacy and security without using VLANs.

Configuring port isolation settings

1.     From the navigation pane, select Switch Settings > Port Isolation.

2.     Enable or disable port isolation. By default, port isolation is disabled.

3.     In the dialog box that opens, click OK.

Figure 26 Configuring port isolation settings

 

Figure 27 Confirming operation

 

Displaying port isolation information

1.     From the navigation pane, select Switch Settings > Port Isolation.

2.     You can view port isolation information in the Port Isolation Info area.

Static MAC

Overview

An Ethernet device uses a MAC address table to forward frames. A MAC address entry includes a destination MAC address, an outgoing interface, and a VLAN ID. When the device receives a frame, it uses the destination MAC address of the frame to look for a match in the MAC address table.

·     The device forwards the frame out of the outgoing interface in the matching entry if a match is found.

·     The device floods the frame in the VLAN of the frame if no match is found.

MAC address entry generation

The entries in the MAC address table include entries automatically learned by the device and entries manually added.

MAC address learning

The device can automatically populate its MAC address table by learning the source MAC addresses of incoming frames on each interface.

The device performs the following operations to learn the source MAC address of incoming packets:

1.     Checks the source MAC address (for example, MAC-SOURCE) of the frame.

2.     Looks up the source MAC address in the MAC address table.

¡     The device updates the entry if an entry is found.

¡     The device adds an entry for MAC-SOURCE and the incoming port if no entry is found.

For security and efficient use of table space, the MAC address table uses an aging timer for each dynamic MAC address entry. If a dynamic MAC address entry is not updated before the aging timer expires, the device deletes the entry. This aging mechanism ensures that the MAC address table can promptly update to accommodate latest network topology changes.

Manually configuring MAC address entries

Dynamic MAC address learning does not distinguish between illegitimate and legitimate frames, which can invite security hazards. When Host A is connected to Port A, a MAC address entry will be learned for the MAC address of Host A (for example, MAC A). When an illegal user sends frames with MAC A as the source MAC address to Port B, the device performs the following operations:

·     Learns a new MAC address entry with Port B as the outgoing interface and overwrites the old entry for MAC A.

·     Forwards frames destined for MAC A out of Port B to the illegal user.

As a result, the illegal user obtains the data of Host A. To improve the security for Host A, manually configure a static entry to bind Host A to Port A. Then, the frames destined for Host A are always sent out of Port A. Other hosts using the forged MAC address of Host A cannot obtain the frames destined for Host A.

Types of MAC address entries

A MAC address table can contain the following types of entries:

·     Static entries—A static entry is manually added to forward frames with a specific destination MAC address out of the associated interface, and it never ages out.

·     Dynamic entries—A dynamic entry is dynamically learned to forward frames with a specific destination MAC address out of the associated interface. A dynamic entry might age out.

Blackhole entries

A blackhole entry is manually configured and never ages out. A blackhole entry is configured for filtering out frames with a specific source or destination MAC address. For example, to block all frames destined for or sourced from a user, you can configure the MAC address of the user as a blackhole MAC address entry.

Configuring static MAC address settings

1.     From the navigation pane, select Switch Settings > Static MAC.

2.     Enter the target MAC address.

3.     Enter the ID of the VLAN to which the interface belongs.

4.     Select the outgoing interface from the port list.

5.     Enable MAC blocking as needed. By default, MAC blocking is disabled.

6.     Click Add.

Figure 28 Configuring static MAC address settings

 

Displaying static MAC addresses

1.     From the navigation pane, select Switch Settings > Static MAC.

2.     You can view the static MAC addresses in the Static MAC Info area.

Filtering MAC addresses

1.     From the navigation pane, select Switch Settings > MAC Search.

2.     Enter the target MAC address and its VLAN ID, and then click Search.

The page will display the filtering result.

Figure 29 MAC address filtering

 

Figure 30 MAC address filtering result

 

MAC List

1.     From the navigation pane, select Switch Settings > MAC List.

2.     You can view the MAC address information.

Figure 31 MAC address list

 

DHCP Snooping

Overview

DHCP snooping is a security feature for DHCP.

DHCP snooping works between the DHCP client and server, or between the DHCP client and DHCP relay agent. When a DHCP snooping device is located between a DHCP server and a DHCP relay agent, the DHCP snooping feature does not take effect.

DHCP snooping benefits

DHCP snooping guarantees that DHCP clients obtain IP addresses from authorized DHCP servers. DHCP snooping defines trusted and untrusted ports to make sure clients obtain IP addresses only from authorized DHCP servers.

·     Trusted—A trusted port can forward DHCP messages correctly to make sure the clients get IP addresses from authorized DHCP servers.

·     Untrusted—An untrusted port discards received DHCP-ACK and DHCP-OFFER messages to prevent unauthorized servers from assigning IP addresses.

Configure the DHCP snooping device's ports facing the DHCP server as trusted ports, and configure other ports as untrusted ports. The trusted port forwards response messages from the DHCP server to the client. The untrusted port connected to the unauthorized DHCP server discards incoming DHCP response messages.

Configuring DHCP snooping

1.     From the navigation pane, select Switch Settings > DHCP Snooping.

2.     Configure the DHCP snooping feature state, and then click OK in the dialog box that opens.

By default, DHCP snooping is disabled.

3.     Configure DHCP snooping settings:

a.     Select the trusted or untrusted port state. By default, all ports on the device are trusted ports after DHCP snooping is enabled.

b.     Select the target ports from the port list.

c.     Click Submit.

Figure 32 DHCP snooping page

 

Figure 33 Confirming operation

 

Figure 34 DHCP snooping page

 

Displaying DHCP snooping information

1.     From the navigation pane, select Switch Settings > DHCP Snooping.

2.     You can view DHCP snooping information in the Port Info area.

PoE Settings

Overview

Power over Ethernet (PoE) enables a device to supply power for powered devices (PDs) over twisted pair cables.

PoE system

As shown in Figure 35, a PoE system includes the following elements:

·     PoE power supply—A PoE power supply provides power for the entire PoE system.

·     PSE—A power sourcing equipment (PSE) supplies power to PDs.

·     PI—A power interface (PI) is a PoE-capable Ethernet interface on a PSE.

·     PD—A powered device (PD) receives power from a PSE. PDs include IP telephones, APs, portable chargers, POS terminals, and Web cameras. You can also connect a PD to a redundant power source for reliability.

Figure 35 PoE system diagram

 

Procedure

1.     From the navigation pane, select Switch Settings > PoE Settings.

2.     In the PoE Info area, configure the PoE state for the target port. By default, PoE is enabled for a port.

3.     In the dialog box that opens, click OK.

Figure 36 PoE settings page

 

Figure 37 Confirming operation

 

Configuration examples

Example: Configuring port mirroring

Network configuration

As shown in Figure 38, the device connects to the marketing and technology departments through port 1 and to the server through port 2. Configure local port mirroring in source port mode to enable the server to monitor the bidirectional traffic of the two departments.

Figure 38 Network diagram

 

Procedure

1.     From the navigation pane, select Switch Settings > Port Mirroring.

2.     Select Both in the direction list.

3.     Select port 2 as the monitor port, and select port 1 as the source port.

4.     Click Submit.

Figure 39 Port mirroring page

 

Figure 40 Configuring port mirroring

 

Verifying the configuration

As shown in Figure 41, the port mirroring direction is both, the monitor port is port 2, and the source port is port 1. Verify that you can monitor the incoming packets and outgoing packets of the marketing and technology departments on the server.

Figure 41 Port mirroring information

 

Example: Configuring port isolation

Network configuration

As shown in Figure 42, LAN users Host A, Host B, and Host C are connected to Port 1, Port 2, and Port 3 on the device, respectively. The device connects to the Internet through Port 4.

Configure the device to provide Internet access for all the hosts, and isolate them from one another.

Figure 42 Network diagram

 

Procedure

1.     From the navigation pane, select Switch Settings > Port Isolation.

2.     Configure the port isolation state, and then click OK in the dialog box that opens.

By default, port isolation is disabled.

Figure 43 Port isolation page

 

Figure 44 Confirming operation

 

Verifying the configuration

1.     From the navigation pane, select Switch Settings > Port Isolation.

2.     Verify that Port 1, Port 2, and Port 3 are isolated from one another at Layer 2, and Host A, Host B, and Host C cannot communicate with each other at Layer 2.

Figure 45 Port isolation information

 

MAC address configuration example

Network configuration

Host A at MAC address 00:0f:e2:35:dc:71 is connected to Port 1 of Device and belongs to VLAN 1. Host B at MAC address 00:0f:e2:35:ab:cd, which behaved suspiciously on the network, also belongs to VLAN 1. Configure the MAC address table as follows:

·     To prevent MAC address spoofing, add a static entry for Host A in the MAC address table of Device.

·     To drop all frames destined for Host B, add a blackhole MAC address entry for Host B.

Figure 46 Network diagram

 

Procedure

# Add a static MAC address entry with destination address 00:0f:e2:35:dc:71, outgoing interface Port 1, and VLAN ID 1.

1.     From the navigation pane, select Switch Settings > Static MAC.

2.     Enter MAC address 00:0f:e2:35:dc:71 and VLAN ID 1, select port 1 as the outgoing interface, and then click Add.

# Add a static MAC address entry with destination address 00:0f:e2:35:ab:cd, outgoing interface Port 1, and VLAN ID 1, and block the MAC address.

1.     From the navigation pane, select Switch Settings > Static MAC.

2.     Enter MAC address 00:0f:e2:35:ab:cd and VLAN ID 1, select port 1 as the outgoing interface, enable MAC blocking, and then click Add.

Figure 47 Static MAC address entries

 

Figure 48 Adding a static MAC address entry

 

Figure 49 Adding a static MAC address entry and blocking it

 

Verifying the configuration

Verify that the MAC address entries are displayed in the list.

Figure 50 Static MAC address entries

 

Example: Enabling DHCP snooping globally

Network configuration

Switch B is connected to the authorized DHCP server through Ethernet port 1, to the unauthorized DHCP server through Ethernet port 3, and to the DHCP client through Ethernet port 2.

Configure only the port connected to the authorized DHCP server to forward the responses from the DHCP server.

Figure 51 Network diagram

 

Procedure

# Enable DHCP snooping globally:

1.     From the navigation pane, select Switch Settings > DHCP Snooping.

2.     Enable DHCP snooping.

Figure 52 DHCP snooping page

 

# Configure port 1 as a trusted port:

1.     From the navigation pane, select Switch Settings > DHCP Snooping.

2.     Select the port state to trusted.

3.     Select port 1 from the port list.

4.     Click Submit.

Figure 53 Configuring DHCP snooping settings

 

Verifying the configuration

Verify that the DHCP client can obtain an IP address and other configuration parameters only from the authorized DHCP server.


VLAN Settings

Overview

The Virtual Local Area Network (VLAN) technology divides a physical LAN into multiple logical LANs. Each VLAN is a broadcast domain. Hosts in the same VLAN can communicate with one another at Layer 2, but they are isolated from hosts in other VLANs at Layer 2.

Restrictions and guidelines

An ES4200 switch supports VLAN settings when it runs in standalone mode.

VLAN features

Overview

If you disable the VLAN feature, the device forwards received packets without processing VLAN tags.

Procedure

1.     Access the VLAN members or VLAN settings page.

2.     Enable or disable the VLAN feature, and then click OK in the dialog box that opens.

By default, VLAN is enabled.

VLAN Members

Creating VLANs

1.     From the navigation pane, select VLAN Settings > VLAN Members.

2.     Enter the target VLAN ID, and then click Add.

By default, only system-defined VLAN 1 exists.

Figure 54 Creating a VLAN

 

Deleting VLANs

1.     From the navigation pane, select VLAN Settings > VLAN Members.

2.     Select the VLANs to be deleted, and then click Delete. VLAN 1 cannot be deleted.

VLAN Settings

Overview

Port-based VLANs group VLAN members by port. A port forwards packets from a VLAN only after it is assigned to the VLAN.

Port link type

You can set the link type of a port to access or trunk. The port link type determines whether the port can be assigned to multiple VLANs. The link types use the following VLAN tag handling methods:

·     Access—An access port can forward packets only from one VLAN and send these packets untagged. An access port is typically used in the following conditions:

¡     Connecting to a terminal device that does not support VLAN packets.

¡     In scenarios that do not distinguish VLANs.

·     Trunk—A trunk port can forward packets from multiple VLANs. Except packets from the port VLAN ID (PVID), packets sent out of a trunk port are VLAN-tagged. Ports connecting network devices are typically configured as trunk ports.

PVID

The PVID (native VLAN) identifies the default VLAN of a port. Untagged packets received on a port are considered as the packets from the port PVID.

An access port can join only one VLAN. The VLAN to which the access port belongs is the PVID of the port. A trunk port supports multiple VLANs and the PVID configuration.

How ports of different link types handle frames

Actions

Access

Trunk

In the inbound direction for an untagged frame

Tags the frame with the PVID tag.

·     If the PVID is permitted on the port, tags the frame with the PVID tag.

·     If not, drops the frame.

In the inbound direction for a tagged frame

·     Receives the frame if its VLAN ID is the same as the PVID.

·     Drops the frame if its VLAN ID is different from the PVID.

·     Receives the frame if its VLAN is permitted on the port.

·     Drops the frame if its VLAN is not permitted on the port.

In the outbound direction

Removes the VLAN tag and sends the frame.

·     Removes the tag and sends the frame if the frame carries the PVID tag and the port belongs to the PVID.

·     Sends the frame without removing the tag if its VLAN is carried on the port but is different from the PVID.

 

Configuring port VLAN settings

Configuring access ports and specifying an access VLAN

1.     From the navigation pane, select VLAN Settings > VLAN Settings.

2.     Select the target ports from the port list.

3.     Select the access link type. The default link type is access.

4.     Select an access VLAN. By default, all access ports belong to VLAN 1.

5.     Click Submit.

Figure 55 Configuring access ports and specifying an access VLAN

 

Configuring trunk ports and specifying PVID and permit VLAN

1.     From the navigation pane, select VLAN Settings > VLAN Settings.

2.     Select the target ports from the port list.

3.     Select the trunk link type. The default link type is access.

4.     Select native and permit VLANs.

5.     Click Submit.

Displaying port VLAN information

1.     From the navigation pane, select VLAN Settings > VLAN Settings.

2.     You can view port VLAN information in the Port VLAN Info area.


Configuration example

Network configuration

·     Host A and Host C belong to Department A but access the company network through different devices. Host B and Host D belong to Department B and access the company network through different devices.

·     To ensure communication security and avoid flooding broadcast packets, use VLANs to isolate Layer 2 traffic of different departments. Configure department A to use VLAN 100, and configure department B to use VLAN 200.

Figure 56 Network diagram

 

Procedure

Configuring Device A

# Create VLAN 100 and VLAN 200:

1.     From the navigation pane, select VLAN Settings > VLAN Members.

2.     Enter VLAN ID 100, and then click Add.

3.     Enter VLAN ID 200, and then click Add.

Figure 57 Adding VLAN IDs

 

# Configure port VLANs:

1.     From the navigation pane, select VLAN Settings > VLAN Settings.

2.     Assign port 1 to VLAN 100:

a.     Select port 1 from the port list.

b.     Select the access link type.

c.     Select VLAN 100 from the access VLAN list.

d.     Click Submit.

Figure 58 Configuring VLAN settings for port 1

 

3.     Assign port 2 to VLAN 200:

a.     Select port 2 from the port list.

b.     Select the access link type.

c.     Select VLAN 200 from the access VLAN list.

d.     Click Submit.

Figure 59 Configuring VLAN settings for port 2

 

4.     Configure port 3 as a trunk port and assign it to VLANs 100 and 200, so that Device A can send packets from VLAN 100 and VLAN 200 to Device B.

a.     Select port 3 from the port list.

b.     Select the trunk link type.

c.     Select VLAN 1 from the native VLAN list.

d.     Select VLANs 100 and 200 from the permit VLAN list.

e.     Click Submit.

Figure 60 Configuring VLAN settings for port 3

 

Configuring Device B

Configure Device B in the same way you configure Device A.

Configuring the hosts

Assign Host A and Host C to the same subnet, for example, 192.168.100.0/24. Assign Host B and Host D to the same subnet, for example, 192.168.200.0/24.

Verifying the configuration

Verify that Host A and Host C can successfully ping each other, and they cannot ping Host B or Host D. Verify that Host B and Host D can successfully ping each other, and they cannot ping Host A or Host C.

 


QoS Settings

Port Rate Limit

Overview

This feature allows you to limit the total packet rate.

Configuring port bandwidth settings

1.     From the navigation pane, select QoS Settings > Port Rate Limit.

2.     Select the target ports from the port list.

3.     Select Tx or Rx from the type list.

4.     Select a port rate limit state.

By default, port rate limit is disabled.

5.     If you enable port rate limit, enter the rate limit.

6.     Click Submit.

Figure 61 Configuring port bandwidth settings

 

Displaying port bandwidth information

1.     From the navigation pane, select QoS Settings > Port Rate Limit.

2.     You can view port bandwidth information in the Port Bandwidth Info area.

Storm Control

Overview

After you configure broadcast/unknown unicast/unknown multicast storm control on an interface, if the broadcast/unknown unicast/unknown multicast traffic exceeds the specified threshold, the system discards the excessive traffic.

After packets of a protocol are added to the storm suppression and storm control allowlist, storm suppression and storm control do not take effect on packets of the protocol.

Configuring storm control

1.     From the navigation pane, select QoS Settings > Storm Control.

2.     Select a traffic type from the Storm Type list.

3.     Select the target ports.

4.     Enable or disable storm control. By default, storm control is disabled.

5.     Set the suppression threshold in the Speed field.

6.     Click Submit.

Figure 62 Configuring storm control

 

Displaying storm control information

1.     From the navigation pane, select QoS Settings > Storm Control.

2.     You can view storm control information in the Storm Control Info area.


Troubleshooting

A fiber port fails to come up

Symptom

A fiber port fails to come up.

Troubleshooting flowchart

Figure 63 Troubleshooting link up failure on a fiber port

 

Solution

Verifying that the ports at both ends are operating correctly

Use a transceiver module and a fiber to connect the port to another port on the local end. Identify whether the port can come up:

·     If the port can come up, you can determine that the peer port fails. Replace the peer port with a new port operating correctly.

·     If the port cannot come up, you can determine that the local port fails. Replace the local port with a new port operating correctly.

Verifying that the transceiver module and cable are operating correctly

If the transceiver module is not operating correctly, replace it with a H3C transceiver module that matches the fiber port. Perform the following tasks to troubleshoot the transceiver module:

1.     Verify that the wavelength and transmission distance of the local transceiver module are consistent with the wavelength and transmission distance of the peer transceiver module.

2.     Use an optical power meter to verify that the Tx power and Rx power of the transceiver module are stable and are within the correct range.

For more information about transceiver modules and cables, see the installation guide.

Verifying that the fiber is operating correctly

Verify that the fiber matches the transceiver module. If they do not match, replace the fiber with a new one that matches the transceiver module. For more information about fibers, see the installation guide.

Contacting H3C Support

If the issue persists after the above procedures, collect the fault information, and contact H3C Support.

A copper port fails to come up

Symptom

A copper port fails to come up.

Troubleshooting flowchart

Figure 64 Troubleshooting link up failure on a copper port

 

Solution

Verifying that the local and remote ports are consistent in rate and duplex mode

To view port rate and duplex mode information, see "Port Info." If the local and remote ports are inconsistent in rate and duplex mode, edit the settings. For procedures, see "Configuring port settings."

Verifying that the network cable is in good condition

Replace the network cable with a new one to verify that the network cable is in good condition.

Verifying that the local port is operating correctly

Replace the local port with a new one to verify that the local port is operating correctly.

Verifying that the peer port is operating correctly

Replace the peer port with a new one to verify that the peer port is operating correctly.

Contacting H3C Support

If the issue persists after the above procedures, contact H3C Support.

PoE power supply anomaly

Symptom

The PoE device cannot supply power correctly.

Troubleshooting flowchart

Figure 65 Troubleshooting PoE power supply anomaly

 

Solution

1.     Verify that the PoE settings are correct. For more information, see "PoE."

If the PoE power is close to or reach the maximum power, disable unnecessary PoE port features or use PoE power with higher-wattage supply.

2.     Verify that the PoE port is operating correctly.

Replace the PoE port with a new one to verify that the PoE port is operating correctly. If the PoE port is not operating correctly, replace and port and send the fault information to Technical Support.

3.     If the issue persists after the above procedures, collect the fault information, and contact H3C Support.

Error packets on a port

Symptom

Error packets were collected on a port.

Troubleshooting flowchart

Figure 66 Troubleshooting error packets on a port

 

Solution

1.     Verify that the port and cable connector are operating correctly.

¡     Verify that the port and cable connector are connected tightly.

¡     Inspect the port for any abnormalities, such as foreign objects inside the port, bent pins, or malformation. If abnormalities are found, replace the port or transceiver module.

¡     Verify that the cable connector is not damaged. In case of any damages, replace it.

2.     Verify that the transceiver module is operating correctly.

Use a fiber to connect the Tx and Rx ends of the port's transceiver module, and then refresh the traffic statistics page to see if the number of error packets increase. If the number increases, the transceiver module is not operating correctly.

3.     Replace the port with a new one to verify that the port is operating correctly.

Replace the port with a new one to verify that the port is operating correctly. If the port is not operating correctly, replace the port and send the fault information to H3C Support.

4.     Verify that the transmission link is operating correctly.

¡     Use a tester to test the transmission link. Poor link quality or excessive optical signal attenuation can lead to packet errors during transmission.

¡     Verify that the devices on the transmission link (including the fiber converter, adapter cable, and transmission device) are operating correctly. In case of any failures, replace the devices or link.

5.     Access the details page of the failed port, restart the link, and verify whether the port recovers.

6.     If the issue persists after the above procedures, collect the fault information, and contact H3C Support.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网