3com 10014303 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Hardware 3com 10014303. 3Com 10014303 User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - 3Com Router

3Com Router Configuration Guide for V1.20 http://www.3com.com/ Part No. 10014303 Published January 2004

Página 2 - 1.1. Introduction

3) Configure the maximum queue length of the class Configure maximum queue length of the class and configure the drop type as tail drop. Perform the

Página 3

Table 1-18 Configure exponential of average queue length calculated by WRED Operation Command Configure exponential of average queue length calculate

Página 4 - 1.2 CBQ Configuration Tasks

The discarding mode based on WRED must already have been enabled via the wred ip-precedence command. When the configuration of qos wred is deleted, t

Página 5 - Define the ACL matching rule

If qos gts is used in the class-policy that is applied to the interface, it can only be applied to the outbound interface. When the class including T

Página 6

The following is the rule for a policy to be applied in interface view.  A policy configured with various features (including remark, car, gts, af,

Página 7

In terms of service, service flow 1 must occupy a bandwidth of 10K, service flow 2 must occupy a bandwidth of 20K, under the premise of ensuring voice

Página 8 - Configure bandwidth

[RouterA-qosclass-voip] if-match rtp start-port 16384 end-port 32767 [RouterA-qosclass-voip] quit 5 Configure CBQ policy: [RouterA] qos policy 1 6

Página 9

Chapter 2 Configuring TACACS+ TACACS+ is facilitated with AAA to control PPP, VPDN, and login access to routers. CISCO ACS is the only application so

Página 10

2.2 The Basic Message Interaction Flow of TACACS+ For example, use TACACS+ to implement AAA on a telnet user, and the basic message interaction flow

Página 11

UserHWTACACSClientHWTACACSServerUser logs inAuthentication Start Request packetAuthentication response packet, requesting for the user nameRequest Use

Página 12

1.1. Introduction 1.1.1. Scope This manual provides configuration information for new software features found in V1.20 of the 3Com Router operating s

Página 13

 Standby/Primary server switchover interval  The shared key for the AAA negotiation between the router and TACACS+ Server  Set the timeout time wai

Página 14

 Note: When this command is used without being configured with the parameter shared-key key-string for negotiation, the default key configured using

Página 15

Caution: 1) The entered key must match the key used by the TACACS+ server. 2) All the leading spaces and ending spaces in a key string will be ignor

Página 16

2.5 Displaying and Debugging TACACS+ Execute the following commands in all views. Table 2-7 Display and debug AAA and RADIUS Operation Command Displ

Página 17 - 129.7.66.67

2 Configure “mykey” as the shared key for the AAA negotiation with the TACACS+ server. [3Com-HWTACACS-tactemplate1]shared-key mykey [3Com-HWTACACS-t

Página 18

[3Com-serial0] quit 12 Assign an IP address to the interface Ethernet0. [3Com]interface ethernet 0 [3Com-ethernet0]ip address 10.110.1.10 255.255.0.0

Página 19 - Accounting stop packet

[3Com-HWTACACS-tactemplate1] shared-key mykey [3Com-HWTACACS-tactemplate1] quit 5 Configure the IP address, authentication port, and accounting port

Página 20

13 Apply the default scheme for accounting on telnet login users. [3Com]login-method accounting-mode login telnet default 14 Enable accounting on Se

Página 21 - TACACS+ Server

Chapter 3 Configuring SSH Terminal Service Secure Shell (SSH) is a feature that provides information about security and powerful authentication funct

Página 22 - Transmitted

To set up a secure and authenticated SSH connection, the server and client must go through the communication procedure that falls into five stages; ve

Página 23 - To configure TACACS+:

Chapter 1 Configuring Class-Based Queuing As an extension of WFQ, class based queuing (CBQ) provides users with class definition support. CBQ assigns

Página 24

Table 3-2 Configure and destroy RSA key-pairs Operation Command Generate RSA key-pairs rsa local-key-pair create Destroy the RSA key-pairs rsa local-

Página 25

Set a server key-pair updating interval ssh server rekey-interval hours Restore the default updating interval undo ssh server rekey-interval By defaul

Página 26

when entering key data but they will be deleted by the system. The configured public key must be a consecutive hexadecimal character string coded in t

Página 27 - 2.7 Troubleshooting

Perform the following configuration in system view. Table 3-11 Close SSH processes by force Operation Command Kill SSH process(es) by force kill ssh

Página 28 - Remote LAN

 Choose the proper SSH version. Generally the client provides several SSH versions. V1.20 supports SSH Server 1.5, so you must choose 1.5 or lower. 

Página 29 - 3.1 Configuring SSH

III. Choose the SSH version Click “SSH” under “Connection” in the left “Category” of the interface, then the following interface appears. Figure 3-2

Página 30

Figure 3-3 SSH Client login interface (in password authentication mode ) After you have entered the correct user name and password, you can implement

Página 31

Figure 3-4 PuTTY Generator Software interface (1) Choose “SSH1(RSA)” or “SSH2 RSA” as the parameter and enter the number of bits in the key. Click [G

Página 32

Figure 3-5 PuTTY Key Generator interface (2)  Enter a passphrase, if you want to use one.  Save the key After you have generated the keys, you have

Página 33 - 3.1.2 Configure SSH Client

If you need to perform an RSA authentication, you must specify the RSA private key file. If you only need to perform the password authentication, it i

Página 34

policing upon congestion. If no congestion occurs, the priority class is permitted to use bandwidth exceeding the assigned value. In case of congestio

Página 35 - III. Choose the SSH version

Figure 3-7 SSH Client login interface (in RSA authentication mode) After you have entered the correct username, you can perform the SSH connection. I

Página 36

 Note: If a local key-pair exists, you can omit this step.  Authenticate login users with the password approach [3Com] protocol inbound ssh 5 [3Co

Página 37

Chapter 4 Configuring NTP As provisioned in RFC1305, Network Time Protocol (NTP) is a protocol of the TCP/IP suite, which is used to synchronize the

Página 38

 Upon the departure of the NTP message, Router B adds its timestamp 11:00:02am (T3) again.  Upon the receipt of the response, Router A adds a new ti

Página 39

 Configure the NTP server mode  Configure the NTP peer mode  Configure the NTP broadcast server mode  Configure NTP broadcast client mode  Config

Página 40 - SSH Client

Table 4-2 Configure NTP peer mode Operation Command Configure NTP peer mode ntp-service unicast-peer X.X.X.X [ version number | authentication-key ke

Página 41

Table 4-4 Configure NTP broadcast client mode Operation Command Configure NTP broadcast client mode ntp-service broadcast-client Disable NTP broadcas

Página 42

Table 4-6 Configure NTP multicast client mode Operation Command Configure NTP multicast client mode ntp-service multicast-client [ X.X.X.X ] Disable

Página 43 - 4.2 NTP Configuration Tasks

4.2.4 Specify Reliable Key You must specify a key to be a reliable one before it can be used for authentication. For example, if two routers want to

Página 44 - I. Configure NTP Server Mode

Table 4-11 Set an external reference clock or the local clock as the NTP master clock Operation Command Set an external reference clock or the local

Página 45

Table 1-2 Define/delete the rule matching all packets Operation Command Define the rule matching all packets if-match [logic-not ] any Delete the rul

Página 46

Table 4-13 Set the right for accessing the NTP services provided by the local router Operation Command Set the right for accessing the NTP services p

Página 47

Perform the debugging command in all views to debug the NTP information. Table 4-15 Display and debug the NTP information Operation Command Display t

Página 48 - 4.2.6 Set NTP Master Clock

4.3.2 ntp-service source-interface disable Syntax ntp-service source-interface disable undo ntp-service source-interface disable View Interface view

Página 49

version: Defines NTP version number. number: NTP version number in the range of 1 to 3. authentication-keyid: Defines an authentication key. keyid: Th

Página 50 - 4.3 Display and Debug NTP

4.3.4 ntp-service unicast-server Syntax ntp-service unicast-server X.X.X.X [ version number | authentication-keyid keyid | source-interface { interfa

Página 51 - Example

This command declares that the local time server is the remote server specified by X.X.X.X. X.X.X.X represents a host address, which must not be a b

Página 52 - [3Com] interface Ethernet 0

Chapter 5 Configuring X2T The X.25 to TCP switch (X2T) technology can interconnect X.25 and IP networks and enables access between X.25 and IP hosts.

Página 53 - Ethernet 0

 Configure X2T route I. Enabling X.25 Switching Before configuring X2T, you must enable X.25 switching. Perform the following configuration in system

Página 54

forwarding route Delete the X.25-to-IP X2T forwarding route undo translate x25 x.121-address 2) Configuring an IP-to-X.25 X2T forwarding route Perfo

Página 55

2 Configure the interface at the X.25 network side. [3Com]interface serial 0 [3Com-Serial0]link-protocol x25 dce [3Com-Serial0]x25 x121-address 1111

Página 56 - 5.2 X2T Configuration Tasks

The matching rules of the source MAC address are only meaningful for the policies in inbound direction and the interface of Ethernet type. 5) Define

Página 57 - I. Enabling X.25 Swit

Chapter 6 Configuring Additional ISDN Support ISDN configuration includes the following tasks: • Configuring the ISDN signaling type. • Configuring

Página 58 - [3Com]x25 switching

Configure the router to become ACTIVE to start data exchange before receiving CONNECT ACK messages. undo isdn waitconnectack Configure the interval fo

Página 59 - 5 Configure an X2T route

These can optionally be removed from the SETUP message. 6.2.3 ATT 5ESS (Lucent 5E) Table 6-5 Required ATT 5ESS Commands Operation Command Disable the

Página 60 - 6.2.1 NTT Protocol

Restore the SETUP message. undo isdn ignore llc Configure the router to wait for CONNECT ACK message replies from the connected exchange until switchi

Página 61 - 6.2.2 ANSI Protocol

Use the corresponding command to configure the value of ip precedence during the configuration; otherwise, the configuration of the if-match ip preced

Página 62 - 6.2.4 NI (National ISDN)

Perform the following configurations in the system view. Table 1-12 Define the policy and enter the policy view Operation Command Define the policy a

Página 63 - Operation Command

configured with a maximum bandwidth, the system will assign the class an individual queue, called the default queue. Theoretically, each class can b

Comentários a estes Manuais

Sem comentários