Меню
Contents
1. Preface
1.1. Declaration
1.2. Suggestion feedback
1.3. Audience
2. Basic Configuration Guide
2.1. Configuring System Management
2.2. Configuring User Management
2.3. Using FTP/TFTP/SCP client
2.4. Configuring FTP server
2.5. Using Telnet
2.6. Configuring SSH
2.7. Configuring Time & Timezone
2.8. RPC API Configuration Guide
2.9. Configuring HTTP
2.10. Configuring STM
2.11. Configuring syslog
2.12. Configuring mirror
2.13. Configuring Device Management
2.14. Configuring Bootrom
2.15. Configuring SmartConfig
2.16. Reboot Logs
3. Ethernet Configuration Guide
3.1. Configuring Interface
3.2. Configuring Group-speed of Interfaces
3.3. Configuring Layer3 Interfaces
3.4. Configuring Interface Errdisable
3.5. Configuring MAC Address Table
3.6. Configuring VLAN
3.7. Configuring Voice VLAN
3.8. Configuring VLAN Classification
3.9. Configuring VLAN Mapping
3.10. Configuring Link Aggregation
3.11. Configuring Flow Control
3.12. Configuring Storm Control
3.13. Configuring Loopback Detection
3.14. Configuring Layer 2 Protocols Tunneling
3.15. Configuring MSTP
3.16. Configuring MLAG
3.17. Configuring Hash Load-balance
3.18. Configuring PORT-XCONNECT
3.19. Configuring PoE
4. IP Service Configuration Guide
4.1. Configuring Arp
4.2. Configuring Arp proxy
4.3. Configuring DHCP Client
4.4. Configuring DHCP Relay
4.5. Configuring DHCP server
4.6. Configuring DNS
5. IP Routing Configuration Guide
5.1. Configuring IP Unicast-Routing
5.2. Configuring RIP
5.3. Configuring OSPF
5.4. Configuring Prefix-list
5.5. Configuring Route-map
5.6. Configuring Policy-Based Routing
5.7. Configuring BGP
5.8. Configuring IS-IS
6. Multicast Configuration Guide
6.1. Configuring IP Multicast-Routing
6.2. Configuring IGMP
6.3. Configuring PIM-SM
6.4. Configuring PIM-DM
6.5. Configuring IGMP Snooping
6.6. Configuring MVR
7. Security Configuration Guide
7.1. Configuring Port Security
7.2. Configuring Vlan Security
7.3. Configuring Time-Range
7.4. Configuring ACL
7.5. Configuring Extern ACL
7.6. Configuring IPv6 ACL
7.7. Configuring Port-Group
7.8. Configuring Vlan-Group
7.9. Configuring COPP ACL
7.10. Configuring dot1x
7.11. Configuring Guest VLAN
7.12. Configuring ARP Inspection
7.13. Configuring DHCP Snooping
7.14. Configuring IP source guard
7.15. Configuring Private-vlan
7.16. Configuring AAA
7.17. Configuring TACACS+
7.18. Configuring Port Isolate
7.19. Configuring DDoS
7.20. Configuring Key Chain
7.21. Configuring Port-Block
8. Network Management Configuration Guide
8.1. Configuring Network Diagnosis
8.2. Configuring NTP
8.3. Configuring Phy Loopback
8.4. Configuring L2 ping
8.5. Configuring RMON
8.6. Configuring SNMP
8.7. Configuring SFLOW
8.8. Configuring LLDP
8.9. Configuring IPFIX
9. Traffic Managemant Configuration Guide
9.1. Configuring QoS
10. VPN Configuration Guide
10.1. Configuring VRF
10.2. Configuring IPv4 GRE Tunnel
11. Reliability Configuration Guide
11.1. Configuring system process monitor
11.2. Configuring EFM OAM
11.3. Configuring CFM
11.4. Configuring CPU Traffic
11.5. Configuring UDLD
11.6. Configuring ERPS
11.7. Configuring Smart Link
11.8. Configuring Multi-Link
11.9. Configuring Monitor Link
11.10. Configuring VRRP
11.11. Configuring Track
11.12. Configuring IP BFD
11.13. Configuring VARP
12. Network Virtualization Configuration Guide
12.1. Configuring VXLAN
12.2. Configuring NVGRE
12.3. Configuring GENEVE
12.4. Configuring Overlay
13. Intelligent Lossless Network Configuration Guide
13.1. Configuring Prioprity-based Flow Control
13.2. Configuring EFD
Вход
Documentation
AqNOS
User Guide
AqNOS
Command Reference
AqNOS Lite
Command Reference (EN)
Basic Access Switches
AQ-N2000-24P4X | AQ-N2000-24T4X | AQ-N2000-48P4X | AQ-N2000-48T4X
Enterprise network switches
AQ-N3000-24P4Y2Q | AQ-N3000-24T4Y2Q | AQ-N3000-48P4Y2Q | AQ-N3000-48T4Y2Q
Aggregation switches
AQ-N5000-24X2C | AQ-N5000-48Y8C
Data Center Switches
AQ-N6000-32C | AQ-N6000-48Y8C
Online demo
Contact us
Downloads
Basic Guidelines
Basic Guidelines
Templates for management and monitoring systems
SNMP MIB files, Zabbix templates
Scenarios and Usage Practices (AVD)
Scenarios and practices of using Aquarius equipment
Graphic elements
Stencils, icons and stencils for Visio, Draw.io and PowerPoint
Certificates
Certificates and other accompanying documents
Contacts
RU
+7 (495) 729-51-50
tray-arrow-down
magnify
Home
/
AqNOS. Users Guide latest.20241106 documentation
/
Index
Contents
1. Preface
1.1. Declaration
1.2. Suggestion feedback
1.3. Audience
2. Basic Configuration Guide
2.1. Configuring System Management
2.2. Configuring User Management
2.3. Using FTP/TFTP/SCP client
2.4. Configuring FTP server
2.5. Using Telnet
2.6. Configuring SSH
2.7. Configuring Time & Timezone
2.8. RPC API Configuration Guide
2.9. Configuring HTTP
2.10. Configuring STM
2.11. Configuring syslog
2.12. Configuring mirror
2.13. Configuring Device Management
2.14. Configuring Bootrom
2.15. Configuring SmartConfig
2.16. Reboot Logs
3. Ethernet Configuration Guide
3.1. Configuring Interface
3.2. Configuring Group-speed of Interfaces
3.3. Configuring Layer3 Interfaces
3.4. Configuring Interface Errdisable
3.5. Configuring MAC Address Table
3.6. Configuring VLAN
3.7. Configuring Voice VLAN
3.8. Configuring VLAN Classification
3.9. Configuring VLAN Mapping
3.10. Configuring Link Aggregation
3.11. Configuring Flow Control
3.12. Configuring Storm Control
3.13. Configuring Loopback Detection
3.14. Configuring Layer 2 Protocols Tunneling
3.15. Configuring MSTP
3.16. Configuring MLAG
3.17. Configuring Hash Load-balance
3.18. Configuring PORT-XCONNECT
3.19. Configuring PoE
4. IP Service Configuration Guide
4.1. Configuring Arp
4.2. Configuring Arp proxy
4.3. Configuring DHCP Client
4.4. Configuring DHCP Relay
4.5. Configuring DHCP server
4.6. Configuring DNS
5. IP Routing Configuration Guide
5.1. Configuring IP Unicast-Routing
5.2. Configuring RIP
5.3. Configuring OSPF
5.4. Configuring Prefix-list
5.5. Configuring Route-map
5.6. Configuring Policy-Based Routing
5.7. Configuring BGP
5.8. Configuring IS-IS
6. Multicast Configuration Guide
6.1. Configuring IP Multicast-Routing
6.2. Configuring IGMP
6.3. Configuring PIM-SM
6.4. Configuring PIM-DM
6.5. Configuring IGMP Snooping
6.6. Configuring MVR
7. Security Configuration Guide
7.1. Configuring Port Security
7.2. Configuring Vlan Security
7.3. Configuring Time-Range
7.4. Configuring ACL
7.5. Configuring Extern ACL
7.6. Configuring IPv6 ACL
7.7. Configuring Port-Group
7.8. Configuring Vlan-Group
7.9. Configuring COPP ACL
7.10. Configuring dot1x
7.11. Configuring Guest VLAN
7.12. Configuring ARP Inspection
7.13. Configuring DHCP Snooping
7.14. Configuring IP source guard
7.15. Configuring Private-vlan
7.16. Configuring AAA
7.17. Configuring TACACS+
7.18. Configuring Port Isolate
7.19. Configuring DDoS
7.20. Configuring Key Chain
7.21. Configuring Port-Block
8. Network Management Configuration Guide
8.1. Configuring Network Diagnosis
8.2. Configuring NTP
8.3. Configuring Phy Loopback
8.4. Configuring L2 ping
8.5. Configuring RMON
8.6. Configuring SNMP
8.7. Configuring SFLOW
8.8. Configuring LLDP
8.9. Configuring IPFIX
9. Traffic Managemant Configuration Guide
9.1. Configuring QoS
10. VPN Configuration Guide
10.1. Configuring VRF
10.2. Configuring IPv4 GRE Tunnel
11. Reliability Configuration Guide
11.1. Configuring system process monitor
11.2. Configuring EFM OAM
11.3. Configuring CFM
11.4. Configuring CPU Traffic
11.5. Configuring UDLD
11.6. Configuring ERPS
11.7. Configuring Smart Link
11.8. Configuring Multi-Link
11.9. Configuring Monitor Link
11.10. Configuring VRRP
11.11. Configuring Track
11.12. Configuring IP BFD
11.13. Configuring VARP
12. Network Virtualization Configuration Guide
12.1. Configuring VXLAN
12.2. Configuring NVGRE
12.3. Configuring GENEVE
12.4. Configuring Overlay
13. Intelligent Lossless Network Configuration Guide
13.1. Configuring Prioprity-based Flow Control
13.2. Configuring EFD
Index
A
|
C
|
H
|
O
A
Application cases {application-cases-85}
Application cases {application-cases-86}
Application cases {application-cases-87}
Application cases {application-cases-88}
Application cases {application-cases-89}
Application cases {application-cases-90}
Application cases {application-cases-91}
Application cases {application-cases-92}
Application cases {application-cases-93}
Application cases {application-cases-94}
Application cases {application-cases-95}
Application cases {application-cases-96}
Application cases {application-cases-97}
Application cases {application-cases-98}
C
Configuration
,
[1]
,
[2]
,
[3]
,
[4]
,
[5]
,
[6]
,
[7]
,
[8]
,
[9]
,
[10]
,
[11]
,
[12]
,
[13]
H
hostname
O
Overview
,
[1]
,
[2]
,
[3]
,
[4]
,
[5]
,
[6]
,
[7]
,
[8]
,
[9]
,
[10]
,
[11]
,
[12]
,
[13]
latest.20241106
ПАК SharxBase виртуализация
ПАК СУБД Tantor XData
ПАК СРК Аквариус
ПАК Виртуализация с Orion Soft
Удаленное управление с DCImanager
Управление виртуализацией c VMmanager
Виртуализация
Аquarius system center
Мобильные устройства Aquarius с РЕД ОС М
Информационная безопасность
СХД Engine AQ
Корпоративная мобильность
Новости
Календарь мероприятий
Информация о компании
Производство
Устойчивое развитие
Карьерный раздел
Комплаенс и деловая этика
Договорные условия
Лицензии и сертификаты
Брендбук
35-летие компании
Search the site
magnify
Documentation search
To find