HP 10500 series Manuals

Manuals and User Guides for HP 10500 series. We have 14 HP 10500 series manuals available for free PDF download: Security Configuration Manual, Configuration Manual, Command Reference Manual, Specifications, Datasheet

HP 10500 series Security Configuration Manual

HP 10500 series Security Configuration Manual (596 pages)

Brand: HP | Category: Switch | Size: 6.06 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Configuring Aaa15................................................................................................................................................................
Radius16................................................................................................................................................................
Hwtacacs21................................................................................................................................................................
Ldap23................................................................................................................................................................
Aaa Implementation On The Device25................................................................................................................................................................
Aaa For Mpls L3vpns27................................................................................................................................................................
Radius Attributes28................................................................................................................................................................
Fips Compliance31................................................................................................................................................................
Configuring Aaa Schemes32................................................................................................................................................................
Configuring User Group Attributes35................................................................................................................................................................
Configuring Radius Schemes37................................................................................................................................................................
Configuring Hwtacacs Schemes47................................................................................................................................................................
Configuring Ldap Schemes53................................................................................................................................................................
Configuring Aaa Methods For Isp Domains56................................................................................................................................................................
Creating An Isp Domain57................................................................................................................................................................
Configuring Authentication Methods For An Isp Domain58................................................................................................................................................................
Configuring Authorization Methods For An Isp Domain59................................................................................................................................................................
Configuring Accounting Methods For An Isp Domain60................................................................................................................................................................
Enabling The Session-control Feature61................................................................................................................................................................
Configuring The Radius Dae Server Feature62................................................................................................................................................................
Configuring A Nas-id Profile63................................................................................................................................................................
Local Authentication, Hwtacacs Authorization, And Radius Accounting For Ssh Users65................................................................................................................................................................
Authentication And Authorization For Ssh Users By A Radius Server67................................................................................................................................................................
Authentication For Ssh Users By An Ldap Server70................................................................................................................................................................
Aaa For 802.1x Users By A Radius Server75................................................................................................................................................................
Troubleshooting Radius79................................................................................................................................................................
Radius Packet Delivery Failure80................................................................................................................................................................
Troubleshooting Ldap81................................................................................................................................................................
X Overview82................................................................................................................................................................
X-related Protocols83................................................................................................................................................................
Eap Over Radius84................................................................................................................................................................
X Authentication Initiation85................................................................................................................................................................
X Authentication Procedures86................................................................................................................................................................
Eap Relay87................................................................................................................................................................
Eap Termination88................................................................................................................................................................
Configuring 802.1x90................................................................................................................................................................
Guest Vlan92................................................................................................................................................................
Auth-fail Vlan93................................................................................................................................................................
Critical Vlan94................................................................................................................................................................
Using 802.1x Authentication With Other Features96................................................................................................................................................................
Redirect Url Assignment97................................................................................................................................................................
Configuration Prerequisites98................................................................................................................................................................
Enabling 802.1x99................................................................................................................................................................
Enabling Eap Relay Or Eap Termination100................................................................................................................................................................
Specifying An Access Control Method101................................................................................................................................................................
Setting The 802.1x Authentication Timeout Timers102................................................................................................................................................................
Configuration Guidelines103................................................................................................................................................................
Configuration Procedure104................................................................................................................................................................
Enabling The Periodic Online User Reauthentication Feature105................................................................................................................................................................
Manually Reauthenticating All Online 802.1x Users On A Port106................................................................................................................................................................
Configuring An 802.1x Guest Vlan107................................................................................................................................................................
Enabling The 802.1x Critical Voice Vlan110................................................................................................................................................................
Sending Eap-success Packets For 802.1x Users Assignment To The 802.1x Critical Vlan111................................................................................................................................................................
Enabling 802.1x Guest Vlan Assignment Delay112................................................................................................................................................................
Configuring 802.1x Smarton113................................................................................................................................................................
Displaying And Maintaining 802.1x114................................................................................................................................................................
X Guest Vlan And Authorization Vlan Configuration Example116................................................................................................................................................................
X With Acl Assignment Configuration Example119................................................................................................................................................................
X With Ead Assistant Configuration Example (with Dhcp Relay Agent)120................................................................................................................................................................
X With Ead Assistant Configuration Example (with Dhcp Server)123................................................................................................................................................................
X Smarton Configuration Example125................................................................................................................................................................
Troubleshooting 802.1x Ead Assistant For Web Browser Users127................................................................................................................................................................
Configuring Mac Authentication128................................................................................................................................................................
Vlan Assignment129................................................................................................................................................................
Acl Assignment130................................................................................................................................................................
Configuration Task List132................................................................................................................................................................
Configuring The User Account Format133................................................................................................................................................................
Enabling Mac Authentication Offline Detection134................................................................................................................................................................
Configuring Mac Authentication Delay135................................................................................................................................................................
Configuration Restrictions And Guidelines136................................................................................................................................................................
Configuring A Mac Authentication Critical Vlan137................................................................................................................................................................
Enabling The Mac Authentication Critical Voice Vlan138................................................................................................................................................................
Including User Ip Addresses In Mac Authentication Requests139................................................................................................................................................................
Mac Authentication Configuration Examples141................................................................................................................................................................
Radius-based Mac Authentication Configuration Example143................................................................................................................................................................
Acl Assignment Configuration Example145................................................................................................................................................................
Ftp Server147................................................................................................................................................................
Configuring Portal Authentication148................................................................................................................................................................
Interaction Between Portal System Components150................................................................................................................................................................
Portal Support For Eap151................................................................................................................................................................
Portal Configuration Task List153................................................................................................................................................................
Configuring A Portal Authentication Server155................................................................................................................................................................
Enabling Portal Authentication On An Interface156................................................................................................................................................................
Specifying A Portal Web Server On An Interface157................................................................................................................................................................
Configuring An Authentication Source Subnet158................................................................................................................................................................
Configuring An Authentication Destination Subnet159................................................................................................................................................................
Setting The Maximum Number Of Portal Users160................................................................................................................................................................
Enabling Outgoing Packets Filtering On A Portal-enabled Interface161................................................................................................................................................................
Configuring Portal Authentication Server Detection162................................................................................................................................................................
Configuring Portal Web Server Detection163................................................................................................................................................................
Configuring Portal User Synchronization164................................................................................................................................................................
Configuring The Portal Fail-permit Feature165................................................................................................................................................................
Applying A Nas-id Profile To An Interface166................................................................................................................................................................
Configuring The Local Portal Web Server Feature167................................................................................................................................................................
Configuring A Local Portal Web Server169................................................................................................................................................................
Logging Out Online Portal Users170................................................................................................................................................................
Portal Configuration Examples171................................................................................................................................................................
Authentication Server175................................................................................................................................................................
Configuring Re-dhcp Portal Authentication176................................................................................................................................................................
Configuring Cross-subnet Portal Authentication179................................................................................................................................................................
Configuring Extended Direct Portal Authentication182................................................................................................................................................................
Configuring Extended Re-dhcp Portal Authentication185................................................................................................................................................................
Configuring Extended Cross-subnet Portal Authentication189................................................................................................................................................................
Configuring Portal Server Detection And Portal User Synchronization192................................................................................................................................................................
Configuring Cross-subnet Portal Authentication For Mpls L3vpns198................................................................................................................................................................
Configuring Direct Portal Authentication Using The Local Portal Web Server200................................................................................................................................................................
Troubleshooting Portal203................................................................................................................................................................
Cannot Log Out Portal Users On The Radius Server204................................................................................................................................................................
Configuring Port Security206................................................................................................................................................................
General Guidelines And Restrictions209................................................................................................................................................................
Setting Port Security's Limit On The Number Of Secure Mac Addresses On A Port210................................................................................................................................................................
Configuring Port Security Features212................................................................................................................................................................
Configuring Secure Mac Addresses213................................................................................................................................................................
Enabling Mac Move215................................................................................................................................................................
Applying A Nas-id Profile To Port Security216................................................................................................................................................................
Port Security Configuration Examples217................................................................................................................................................................
Userloginwithoui Configuration Example218................................................................................................................................................................
Configure Port Security220................................................................................................................................................................
Macaddresselseuserloginsecure Configuration Example221................................................................................................................................................................
Troubleshooting Port Security225................................................................................................................................................................
Configuring Password Control227................................................................................................................................................................
Password Updating And Expiration228................................................................................................................................................................
User Login Control229................................................................................................................................................................
Setting Global Password Control Parameters231................................................................................................................................................................
Setting User Group Password Control Parameters232................................................................................................................................................................
Setting Local User Password Control Parameters233................................................................................................................................................................
Displaying And Maintaining Password Control234................................................................................................................................................................
Verifying The Configuration236................................................................................................................................................................
Managing Public Keys238................................................................................................................................................................
Distributing A Local Host Public Key240................................................................................................................................................................
Destroying A Local Key Pair241................................................................................................................................................................
Entering A Peer Host Public Key242................................................................................................................................................................
Example For Importing A Public Key From A Public Key File244................................................................................................................................................................
Configuring Ssl247................................................................................................................................................................
Configuring An Ssl Client Policy251................................................................................................................................................................
Displaying And Maintaining Ssl253................................................................................................................................................................
Configuring Pki256................................................................................................................................................................
Pki Architecture257................................................................................................................................................................
Pki Applications258................................................................................................................................................................
Configuring A Pki Domain260................................................................................................................................................................
Requesting A Certificate262................................................................................................................................................................
Configuring Automatic Certificate Request263................................................................................................................................................................
Aborting A Certificate Request264................................................................................................................................................................
Verifying Certificates Without Crl Checking266................................................................................................................................................................
Specifying The Storage Path For The Certificates And Crls267................................................................................................................................................................
Removing A Certificate268................................................................................................................................................................
Displaying And Maintaining Pki269................................................................................................................................................................
Requesting A Certificate From An Rsa Keon Ca Server270................................................................................................................................................................
Requesting A Certificate From A Windows Server 2003 Ca Server272................................................................................................................................................................
Requesting A Certificate From An Openca Server276................................................................................................................................................................
Certificate-based Access Control Policy Configuration Example279................................................................................................................................................................
Certificate Import And Export Configuration Example280................................................................................................................................................................
Troubleshooting Pki Configuration285................................................................................................................................................................
Failed To Obtain The Ca Certificate286................................................................................................................................................................
Failed To Request Local Certificates287................................................................................................................................................................
Failed To Obtain Crls288................................................................................................................................................................
Failed To Import The Local Certificate289................................................................................................................................................................
Failed To Set The Storage Path290................................................................................................................................................................
Configuring Ipsec291................................................................................................................................................................
Security Association293................................................................................................................................................................
Ipsec Implementation294................................................................................................................................................................
Ipsec Rri295................................................................................................................................................................
Protocols And Standards296................................................................................................................................................................
Configuring An Acl297................................................................................................................................................................
Configuring An Ipsec Transform Set298................................................................................................................................................................
Configuring A Manual Ipsec Policy300................................................................................................................................................................
Configuring An Ike-based Ipsec Policy302................................................................................................................................................................
Applying An Ipsec Policy To An Interface306................................................................................................................................................................
Enabling Acl Checking For De-encapsulated Packets307................................................................................................................................................................
Configuring Ipsec Anti-replay Redundancy308................................................................................................................................................................
Binding A Source Interface To An Ipsec Policy309................................................................................................................................................................
Enabling Logging Of Ipsec Packets310................................................................................................................................................................
Configuring The Df Bit Of Ipsec Packets311................................................................................................................................................................
Configuring Ipsec For Ipv6 Routing Protocols312................................................................................................................................................................
Configuring Snmp Notifications For Ipsec313................................................................................................................................................................
Displaying And Maintaining Ipsec314................................................................................................................................................................
Ipsec Configuration Examples315................................................................................................................................................................
Configuring An Ike-based Ipsec Tunnel For Ipv4 Packets317................................................................................................................................................................
Configuring An Ike-based Ipsec Tunnel For Ipv6 Packets320................................................................................................................................................................
Configuring Ipsec For Ripng322................................................................................................................................................................
Configuring Ike327................................................................................................................................................................
Ike Security Mechanism328................................................................................................................................................................
Configuring An Ike Profile330................................................................................................................................................................
Configuring An Ike Proposal332................................................................................................................................................................
Configuring An Ike Keychain333................................................................................................................................................................
Configuring The Global Identity Information334................................................................................................................................................................
Configuring The Ike Keepalive Feature335................................................................................................................................................................
Enabling Invalid Spi Recovery336................................................................................................................................................................
Setting The Maximum Number Of Ike Sas337................................................................................................................................................................
Displaying And Maintaining Ike338................................................................................................................................................................
Aggressive Mode With Rsa Signature Authentication Configuration Example341................................................................................................................................................................
Troubleshooting Ike345................................................................................................................................................................
Ipsec Sa Negotiation Failed Because No Matching Ipsec Transform Sets Were Found346................................................................................................................................................................
Configuring Ikev2350................................................................................................................................................................
New Features In Ikev2351................................................................................................................................................................
Configuring An Ikev2 Profile352................................................................................................................................................................
Configuring An Ikev2 Policy355................................................................................................................................................................
Configuring An Ikev2 Proposal356................................................................................................................................................................
Configuring An Ikev2 Keychain357................................................................................................................................................................
Configure Global Ikev2 Parameters358................................................................................................................................................................
Configuring The Ikev2 Nat Keepalive Feature359................................................................................................................................................................
Ikev2 Configuration Examples360................................................................................................................................................................
Ikev2 With Rsa Signature Authentication Configuration Example363................................................................................................................................................................
Troubleshooting Ikev2368................................................................................................................................................................
Configuring Ssh370................................................................................................................................................................
Ssh Authentication Methods371................................................................................................................................................................
Ssh Support For Suite B372................................................................................................................................................................
Enabling The Stelnet Server374................................................................................................................................................................
Enabling The Scp Server375................................................................................................................................................................
Configuring A Client's Host Public Key376................................................................................................................................................................
Configuring An Ssh User377................................................................................................................................................................
Configuring The Ssh Management Parameters378................................................................................................................................................................
Specifying A Pki Domain For The Ssh Server379................................................................................................................................................................
Specifying The Source Ip Address For Ssh Packets380................................................................................................................................................................
Establishing A Connection To An Stelnet Server Based On Suite B383................................................................................................................................................................
Establishing A Connection To An Sftp Server384................................................................................................................................................................
Establishing A Connection To An Sftp Server Based On Suite B386................................................................................................................................................................
Working With Sftp Directories387................................................................................................................................................................
Displaying Help Information388................................................................................................................................................................
Establishing A Connection To An Scp Server Based On Suite B391................................................................................................................................................................
Specifying Public Key Algorithms For Ssh2392................................................................................................................................................................
Specifying Mac Algorithms For Ssh2393................................................................................................................................................................
Publickey Authentication Enabled Stelnet Server Configuration Example396................................................................................................................................................................
Password Authentication Enabled Stelnet Client Configuration Example401................................................................................................................................................................
Publickey Authentication Enabled Stelnet Client Configuration Example404................................................................................................................................................................
Stelnet Configuration Example Based On 128-bit Suite B Algorithms406................................................................................................................................................................
Sftp Configuration Examples410................................................................................................................................................................
Password Authentication Enabled Sftp Server Configuration Example411................................................................................................................................................................
Publickey Authentication Enabled Sftp Client Configuration Example413................................................................................................................................................................
Sftp Configuration Example Based On 192-bit Suite B Algorithms416................................................................................................................................................................
Scp Configuration Examples420................................................................................................................................................................
Scp Configuration Example Based On Suite B Algorithms422................................................................................................................................................................
Netconf Over Ssh Configuration Example With Password Authentication429................................................................................................................................................................
Configuring Ip Source Guard432................................................................................................................................................................
Dynamic Ipsg Bindings433................................................................................................................................................................
Configuring The Ipv4sg Feature434................................................................................................................................................................
Configuring The Ipv6sg Feature435................................................................................................................................................................
Displaying And Maintaining Ipsg436................................................................................................................................................................
Ipsg Configuration Examples437................................................................................................................................................................
Dynamic Ipv4sg Using Dhcp Snooping Configuration Example438................................................................................................................................................................
Dynamic Ipv4sg Using Dhcp Relay Configuration Example439................................................................................................................................................................
Static Ipv6sg Configuration Example440................................................................................................................................................................
Dynamic Ipv6sg Using Dhcpv6 Snooping Configuration Example441................................................................................................................................................................
Configuring Arp Attack Protection442................................................................................................................................................................
Configuring Arp Source Suppression443................................................................................................................................................................
Configuration Example444................................................................................................................................................................
Configuring Arp Packet Rate Limit445................................................................................................................................................................
Configuring Source Mac-based Arp Attack Detection446................................................................................................................................................................
Configuring Arp Packet Source Mac Consistency Check448................................................................................................................................................................
Configuring Authorized Arp449................................................................................................................................................................
Configuration Example (on A Dhcp Relay Agent)450................................................................................................................................................................
Configuring Arp Detection451................................................................................................................................................................
Configuring User Validity Check452................................................................................................................................................................
Configuring Arp Packet Validity Check453................................................................................................................................................................
Enabling Arp Detection Logging454................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example456................................................................................................................................................................
Configuring Arp Scanning And Fixed Arp457................................................................................................................................................................
Configuring The Checking Of Sender Ip Addresses For Arp Packets461................................................................................................................................................................
Configuring Urpf462................................................................................................................................................................
Urpf Operation463................................................................................................................................................................
Network Application464................................................................................................................................................................
Configuring Ipv6 Urpf467................................................................................................................................................................
Ipv6 Urpf Operation468................................................................................................................................................................
Configuring Fips472................................................................................................................................................................
Configuring Fips Mode473................................................................................................................................................................
Configuration Changes In Fips Mode474................................................................................................................................................................
Exiting Fips Mode475................................................................................................................................................................
Power-up Self-tests476................................................................................................................................................................
Triggering Self-tests477................................................................................................................................................................
Entering Fips Mode Through Manual Reboot478................................................................................................................................................................
Exiting Fips Mode Through Automatic Reboot480................................................................................................................................................................
Configuring Attack Detection And Prevention482................................................................................................................................................................
Scanning Attacks483................................................................................................................................................................
Flood Attacks484................................................................................................................................................................
Tcp Fragment Attack485................................................................................................................................................................
Attack Detection And Prevention Configuration Task List486................................................................................................................................................................
Configuring A Scanning Attack Defense Policy488................................................................................................................................................................
Configuring Attack Detection Exemption493................................................................................................................................................................
Applying An Attack Defense Policy To The Device494................................................................................................................................................................
Configuring Tcp Fragment Attack Prevention495................................................................................................................................................................
Configuring Login Attack Prevention496................................................................................................................................................................
Displaying And Maintaining Attack Detection And Prevention497................................................................................................................................................................
Attack Detection And Prevention Configuration Examples499................................................................................................................................................................
Ip Blacklist Configuration Example502................................................................................................................................................................
Configuring Macsec504................................................................................................................................................................
Macsec Applications505................................................................................................................................................................
Macsec Configuration Task List508................................................................................................................................................................
Configuring A Preshared Key509................................................................................................................................................................
Configuring The Macsec Confidentiality Offset510................................................................................................................................................................
Configuring Macsec Protection Parameters By Mka Policy511................................................................................................................................................................
Applying An Mka Policy512................................................................................................................................................................
Troubleshooting Macsec516................................................................................................................................................................
Configuring Mff517................................................................................................................................................................
Basic Concepts518................................................................................................................................................................
Mff Working Mechanism519................................................................................................................................................................
Configuring A Network Port520................................................................................................................................................................
Displaying And Maintaining Mff521................................................................................................................................................................
Auto-mode Mff Configuration Example In A Ring Network523................................................................................................................................................................
Manual-mode Mff Configuration Example In A Tree Network525................................................................................................................................................................
Manual-mode Mff Configuration Example In A Ring Network526................................................................................................................................................................
Configuring Nd Attack Defense528................................................................................................................................................................
Configuring Nd Attack Detection529................................................................................................................................................................
Specifying The Role Of The Attached Device531................................................................................................................................................................
Enabling The Ra Guard Logging Feature532................................................................................................................................................................
Configuring Keychains535................................................................................................................................................................
Displaying And Maintaining Keychain536................................................................................................................................................................
Configuring Switch B537................................................................................................................................................................
Configure Ospf537................................................................................................................................................................
Document Conventions And Icons541................................................................................................................................................................
Network Topology Icons542................................................................................................................................................................
Support And Other Resources543................................................................................................................................................................
Websites544................................................................................................................................................................
Index546................................................................................................................................................................

Advertisement

HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (512 pages)

Brand: HP | Category: Switch | Size: 5.7 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Configuring Basic Mpls10................................................................................................................................................................
Mpls Network Architecture11................................................................................................................................................................
Lsp Establishment12................................................................................................................................................................
Mpls Forwarding13................................................................................................................................................................
Protocols And Standards14................................................................................................................................................................
Mpls Configuration Task List15................................................................................................................................................................
Setting Mpls Mtu16................................................................................................................................................................
Specifying The Label Type Advertised By Egress17................................................................................................................................................................
Enabling Sending Mpls Ttl-expired Messages19................................................................................................................................................................
Configuring A Static Lsp21................................................................................................................................................................
Configuration Procedure22................................................................................................................................................................
Configuration Restrictions And Guidelines23................................................................................................................................................................
Verifying The Configuration24................................................................................................................................................................
Configuring Ldp26................................................................................................................................................................
Ldp Operation27................................................................................................................................................................
Label Distribution And Control28................................................................................................................................................................
Ldp-igp Synchronization31................................................................................................................................................................
Ldp Over Mpls Te33................................................................................................................................................................
Protocols34................................................................................................................................................................
Enabling Ldp35................................................................................................................................................................
Configuring Hello Parameters36................................................................................................................................................................
Restrictions And Guidelines37................................................................................................................................................................
Configuring Ldp Backoff39................................................................................................................................................................
Configuring Ldp To Redistribute Bgp Unicast Routes40................................................................................................................................................................
Configuring The Ldp Label Distribution Control Mode41................................................................................................................................................................
Configuring A Label Acceptance Policy42................................................................................................................................................................
Configuring Ldp Loop Detection43................................................................................................................................................................
Configuring Ldp Session Protection44................................................................................................................................................................
Configuring Ldp Gr45................................................................................................................................................................
Configuring Ldp Is-is Synchronization47................................................................................................................................................................
Resetting Ldp Sessions48................................................................................................................................................................
Ipv4 Ldp Configuration Examples49................................................................................................................................................................
Label Acceptance Control Configuration Example53................................................................................................................................................................
Label Advertisement Control Configuration Example57................................................................................................................................................................
Ldp Frr Configuration Example62................................................................................................................................................................
Ipv6 Ldp Configuration Examples65................................................................................................................................................................
Ipv6 Label Acceptance Control Configuration Example70................................................................................................................................................................
Ipv6 Label Advertisement Control Configuration Example74................................................................................................................................................................
Configuring Mpls Te81................................................................................................................................................................
Crlsp Establishment Using Pce Path Calculation83................................................................................................................................................................
Traffic Forwarding84................................................................................................................................................................
Make-before-break85................................................................................................................................................................
Route Pinning86................................................................................................................................................................
Diffserv-aware Te87................................................................................................................................................................
Bidirectional Mpls Te Tunnel89................................................................................................................................................................
Enabling Mpls Te92................................................................................................................................................................
Configuring Ds-te93................................................................................................................................................................
Configuring An Mpls Te Tunnel To Use A Dynamic Crlsp94................................................................................................................................................................
Configuring Mpls Te Attributes For A Link95................................................................................................................................................................
Configuring Mpls Te Tunnel Constraints96................................................................................................................................................................
Establishing An Mpls Te Tunnel By Using Rsvp-te98................................................................................................................................................................
Controlling Mpls Te Tunnel Setup101................................................................................................................................................................
Configuring An Mpls Te Tunnel To Use A Crlsp Calculated By Pces102................................................................................................................................................................
Establishing A Crlsp By Using The Path Calculated By Pces103................................................................................................................................................................
Configuring Traffic Forwarding104................................................................................................................................................................
Configuring A Bidirectional Mpls Te Tunnel105................................................................................................................................................................
Configuring Crlsp Backup106................................................................................................................................................................
Configuring Mpls Te Frr107................................................................................................................................................................
Configuring Node Fault Detection111................................................................................................................................................................
Enabling Snmp Notifications For Mpls Te112................................................................................................................................................................
Mpls Te Configuration Examples113................................................................................................................................................................
Establishing An Mpls Te Tunnel With Rsvp-te118................................................................................................................................................................
Establishing An Inter-as Mpls Te Tunnel With Rsvp-te123................................................................................................................................................................
Establishing An Inter-area Mpls Te Tunnel Over A Crlsp Calculated By Pces130................................................................................................................................................................
Bidirectional Mpls Te Tunnel Configuration Example135................................................................................................................................................................
Crlsp Backup Configuration Example141................................................................................................................................................................
Manual Bypass Tunnel For Frr Configuration Example145................................................................................................................................................................
Auto Frr Configuration Example151................................................................................................................................................................
Ietf Ds-te Configuration Example157................................................................................................................................................................
Troubleshooting Mpls Te164................................................................................................................................................................
Configuring A Static Crlsp165................................................................................................................................................................
Configuring Rsvp172................................................................................................................................................................
Crlsp Setup Procedure173................................................................................................................................................................
Rsvp Authentication174................................................................................................................................................................
Configuring Rsvp Refresh176................................................................................................................................................................
Configuring Rsvp Authentication177................................................................................................................................................................
Setting A Dscp Value For Outgoing Rsvp Packets179................................................................................................................................................................
Displaying And Maintaining Rsvp180................................................................................................................................................................
Rsvp Gr Configuration Example186................................................................................................................................................................
Configuring Tunnel Policies189................................................................................................................................................................
Tunnel Policy Configuration Examples191................................................................................................................................................................
Configuring Mpls L3vpn194................................................................................................................................................................
Mpls L3vpn Route Advertisement196................................................................................................................................................................
Mpls L3vpn Packet Forwarding197................................................................................................................................................................
Mpls L3vpn Networking Schemes198................................................................................................................................................................
Inter-as Vpn200................................................................................................................................................................
Ospf Vpn Extension204................................................................................................................................................................
Bgp As Number Substitution And Soo Attribute207................................................................................................................................................................
Mpls L3vpn Frr208................................................................................................................................................................
Ecmp Vpn Route Redistribution210................................................................................................................................................................
Configuring Basic Mpls L3vpn211................................................................................................................................................................
Configuring Routing Between A Pe And A Ce213................................................................................................................................................................
Configuring Routing Between Pes218................................................................................................................................................................
Configuring Inter-as Vpn220................................................................................................................................................................
Configuring Inter-as Option B221................................................................................................................................................................
Configuring Inter-as Option C222................................................................................................................................................................
Configuring An Ospf Sham Link224................................................................................................................................................................
Configuring A Loopback Interface225................................................................................................................................................................
Specifying The Vpn Label Processing Mode On The Egress Pe226................................................................................................................................................................
Configuring Mpls L3vpn Frr227................................................................................................................................................................
Configuring Bgp Rt Filtering228................................................................................................................................................................
Procedure229................................................................................................................................................................
Enabling Ecmp Vpn Route Redistribution230................................................................................................................................................................
Enabling Snmp Notifications For Mpls L3vpn231................................................................................................................................................................
Displaying And Maintaining Mpls L3vpn232................................................................................................................................................................
Mpls L3vpn Configuration Examples233................................................................................................................................................................
Configuring A Hub-spoke Network239................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option A245................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option B250................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option C255................................................................................................................................................................
Configuring Bgp As Number Substitution266................................................................................................................................................................
Configuring Bgp As Number Substitution And Soo Attribute270................................................................................................................................................................
Configuring Mpls L3vpn Frr Through Vpnv4 Route Backup For A Vpnv4 Route272................................................................................................................................................................
Configuring Mpls L3vpn Frr Through Vpnv4 Route Backup For An Ipv4 Route274................................................................................................................................................................
Configuring Mpls L3vpn Frr Through Ipv4 Route Backup For A Vpnv4 Route276................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn279................................................................................................................................................................
Ipv6 Mpls L3vpn Routing Information Advertisement280................................................................................................................................................................
Configuring Bgp Vpnv6 Route Control290................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn291................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn Option A292................................................................................................................................................................
Configuring An Ospfv3 Sham Link293................................................................................................................................................................
Creating A Sham Link294................................................................................................................................................................
Enabling Logging For Bgp Route Flapping295................................................................................................................................................................
Ipv6 Mpls L3vpn Configuration Examples296................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn Inter-as Option A309................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn Inter-as Option C314................................................................................................................................................................
Configuring Mpls L2vpn332................................................................................................................................................................
Remote Connection Model333................................................................................................................................................................
Pw Types334................................................................................................................................................................
Control Word336................................................................................................................................................................
Multi-segment Pw337................................................................................................................................................................
Vccv338................................................................................................................................................................
Restrictions And Guidelines For Mpls L2vpn339................................................................................................................................................................
Enabling L2vpn340................................................................................................................................................................
Configuring A Pw341................................................................................................................................................................
Configuring An Ldp Pw342................................................................................................................................................................
Configuring A Remote Ccc Connection344................................................................................................................................................................
Binding An Ethernet Service Instance To A Cross-connect345................................................................................................................................................................
Configuring Pw Redundancy346................................................................................................................................................................
Configuring Ldp Pw Redundancy347................................................................................................................................................................
Mpls L2vpn Configuration Examples348................................................................................................................................................................
Configuring A Bgp Pw356................................................................................................................................................................
Configuring An Intra-domain Multi-segment Pw370................................................................................................................................................................
Configuring An Inter-domain Multi-segment Pw373................................................................................................................................................................
Configuring Vpls380................................................................................................................................................................
Vpls Implementation381................................................................................................................................................................
H-vpls383................................................................................................................................................................
Restrictions And Guidelines For Vpls385................................................................................................................................................................
Configuring A Vsi387................................................................................................................................................................
Configuring A Bgp Auto-discovery Ldp Pw390................................................................................................................................................................
Binding An Ethernet Service Instance To A Vsi392................................................................................................................................................................
Configuring Upe Dual Homing393................................................................................................................................................................
Configuring Mac Address Learning395................................................................................................................................................................
Vpls Configuration Examples396................................................................................................................................................................
Ldp Pw Configuration Example401................................................................................................................................................................
Bgp Pw Configuration Example403................................................................................................................................................................
Bgp Auto-discovery Ldp Pw Configuration Example408................................................................................................................................................................
H-vpls Using Mpls Access Configuration Example412................................................................................................................................................................
Ethernet Service Instance And Vsi Binding Configuration Example417................................................................................................................................................................
H-vpls Upe Dual Homing Configuration Example421................................................................................................................................................................
Configuring Mpls Oam427................................................................................................................................................................
Configuring Mpls Ping For Lsps428................................................................................................................................................................
Configuring Mce430................................................................................................................................................................
Mce Overview432................................................................................................................................................................
Mce Configuration Task List433................................................................................................................................................................
Creating A Vpn Instance434................................................................................................................................................................
Configuring Routing On An Mce435................................................................................................................................................................
Configuring Routing Between An Mce And A Vpn Site436................................................................................................................................................................
Configuring Routing Between An Mce And A Pe440................................................................................................................................................................
Displaying And Maintaining Mce443................................................................................................................................................................
Configuring The Mce That Uses Ebgp To Advertise Vpn Routes To The Pe448................................................................................................................................................................
Configuring Ipv6 Mce453................................................................................................................................................................
Configuring Vpn Instances454................................................................................................................................................................
Configuring Route Related Attributes For A Vpn Instance455................................................................................................................................................................
Displaying And Maintaining Ipv6 Mce463................................................................................................................................................................
Ipv6 Mce Configuration Example464................................................................................................................................................................
Document Conventions And Icons470................................................................................................................................................................
Network Topology Icons471................................................................................................................................................................
Support And Other Resources472................................................................................................................................................................
Websites473................................................................................................................................................................
Index475................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (428 pages)

Brand: HP | Category: Network Router | Size: 4.18 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Mce9................................................................................................................................................................
Mpls L3vpn Concepts10................................................................................................................................................................
Multi-vpn-instance Ce12................................................................................................................................................................
Using Mce In Tunneling Applications13................................................................................................................................................................
Configuring Routing On An Mce14................................................................................................................................................................
Route Exchange Between An Mce And A Pe16................................................................................................................................................................
Associating A Vpn Instance With An Interface17................................................................................................................................................................
Configuring Routing Between Mce And Pe23................................................................................................................................................................
Resetting Bgp Connections27................................................................................................................................................................
Displaying And Maintaining Mce28................................................................................................................................................................
Mce Configuration Examples29................................................................................................................................................................
Using Bgp To Advertise Vpn Routes To The Pe34................................................................................................................................................................
Using Tunnels To Advertise Vpn Routes37................................................................................................................................................................
Configuring Ipv6 Mce44................................................................................................................................................................
Configuring Route Attributes For A Vpn Instance45................................................................................................................................................................
Configuring Routing On An Ipv6 Mce46................................................................................................................................................................
Configuring Routing Between Ipv6 Mce And Pe50................................................................................................................................................................
Resetting Ipv6 Bgp Connections53................................................................................................................................................................
Ipv6 Mce Configuration Example54................................................................................................................................................................
Configuring Basic Mpls60................................................................................................................................................................
Mpls Network Structure62................................................................................................................................................................
Label Distribution And Management63................................................................................................................................................................
Mpls Forwarding65................................................................................................................................................................
Protocols68................................................................................................................................................................
Enabling The Mpls Function69................................................................................................................................................................
Configuring A Static Lsp70................................................................................................................................................................
Establishing Dynamic Lsps Through Ldp71................................................................................................................................................................
Configuring Remote Ldp Session Parameters72................................................................................................................................................................
Configuring Php73................................................................................................................................................................
Configuring The Label Distribution Control Mode74................................................................................................................................................................
Configuring Ldp Loop Detection75................................................................................................................................................................
Configuring Ldp Md5 Authentication76................................................................................................................................................................
Configuring A Dscp For Outgoing Ldp Packets77................................................................................................................................................................
Maintaining Ldp Sessions78................................................................................................................................................................
Configuring A Ttl Processing Mode For An Lsr79................................................................................................................................................................
Sending Back Icmp Ttl Exceeded Messages For Mpls Ttl Expired Packets80................................................................................................................................................................
Configuring Ldp Gr81................................................................................................................................................................
Configuring Ldp Nsr83................................................................................................................................................................
Configuring Mpls Lsp Ping84................................................................................................................................................................
Configuring Periodic Lsp Tracert85................................................................................................................................................................
Enabling Mpls Trap86................................................................................................................................................................
Displaying Mpls Ldp Operation88................................................................................................................................................................
Clearing Mpls Statistics89................................................................................................................................................................
Configuration Considerations90................................................................................................................................................................
Configuring Ldp To Establish Lsps Dynamically92................................................................................................................................................................
Configuring Bfd For Lsps96................................................................................................................................................................
Configuring Mpls Te98................................................................................................................................................................
Basic Concepts99................................................................................................................................................................
Cr-lsp100................................................................................................................................................................
Rsvp-te101................................................................................................................................................................
Traffic Forwarding105................................................................................................................................................................
Cr-lsp Backup106................................................................................................................................................................
Ps For An Mpls Te Tunnel108................................................................................................................................................................
Mpls Te Configuration Task List109................................................................................................................................................................
Creating An Mpls Te Tunnel Over A Static Cr-lsp110................................................................................................................................................................
Configuring An Mpls Te Tunnel With A Dynamic Signaling Protocol111................................................................................................................................................................
Configuration Procedure112................................................................................................................................................................
Configuring Rsvp-te Advanced Features115................................................................................................................................................................
Configuring Rsvp State Timers116................................................................................................................................................................
Configuring The Rsvp Hello Extension117................................................................................................................................................................
Configuring Rsvp Authentication118................................................................................................................................................................
Tuning Cr-lsp Setup119................................................................................................................................................................
Configuring Cr-lsp Reoptimization120................................................................................................................................................................
Tuning Mpls Te Tunnel Setup121................................................................................................................................................................
Assigning Priorities To A Tunnel122................................................................................................................................................................
Forwarding Traffic Along Mpls Te Tunnels Through Automatic Route Advertisement123................................................................................................................................................................
Configuring Traffic Forwarding Tuning Parameters124................................................................................................................................................................
Specifying The Link Metric Type For Tunnel Path Calculation125................................................................................................................................................................
Configuring Frr126................................................................................................................................................................
Configuring A Bypass Tunnel On Its Plr127................................................................................................................................................................
Configuring Node Protection128................................................................................................................................................................
Inspecting An Mpls Te Tunnel129................................................................................................................................................................
Configuring Periodic Lsp Tracert For An Mpls Te Tunnel131................................................................................................................................................................
Configuring Protection Switching132................................................................................................................................................................
Configuring Mpls Te Examples135................................................................................................................................................................
Mpls Te Using Rsvp-te Configuration Example140................................................................................................................................................................
Rsvp-te Gr Configuration Example146................................................................................................................................................................
Mpls Rsvp-te And Bfd Cooperation Configuration Example148................................................................................................................................................................
Cr-lsp Backup Configuration Example150................................................................................................................................................................
Frr Configuration Example153................................................................................................................................................................
Mpls Te In Mpls L3vpn Configuration Example162................................................................................................................................................................
Troubleshooting Mpls Te170................................................................................................................................................................
Configuring Vpls171................................................................................................................................................................
Mac Address Learning And Flooding172................................................................................................................................................................
Vpls Loop Avoidance173................................................................................................................................................................
Vpls Packet Encapsulation174................................................................................................................................................................
Vpls Configuration Task List176................................................................................................................................................................
Enabling L2vpn And Mpls L2vpn177................................................................................................................................................................
Configuring Bgp Vpls178................................................................................................................................................................
Configuring The Bgp Extension179................................................................................................................................................................
Binding A Service Instance With A Vpls Instance180................................................................................................................................................................
Displaying And Maintaining Vpls181................................................................................................................................................................
Vpls Configuration Examples182................................................................................................................................................................
Binding Service Instances With Vpls Instances183................................................................................................................................................................
Configuring Pw Redundancy For H-vpls Access187................................................................................................................................................................
Configuring Bfd For The Primary Link In An H-vpls Network191................................................................................................................................................................
Troubleshooting Vpls196................................................................................................................................................................
Configuring Mpls L2vpn198................................................................................................................................................................
Mpls L2vpn Network Models199................................................................................................................................................................
Implementation Of Mpls L2vpn201................................................................................................................................................................
Vc Encapsulations Types206................................................................................................................................................................
Configuring Basic Mpls L2vpn207................................................................................................................................................................
Configuring Vlan Encapsulation208................................................................................................................................................................
Configuring Svc Mpls L2vpn209................................................................................................................................................................
Configuring The Remote Peer210................................................................................................................................................................
Inspecting Vcs Through Mpls Lsp Ping212................................................................................................................................................................
Creating And Configuring Mpls L2vpn213................................................................................................................................................................
Resetting L2vpn Bgp Sessions215................................................................................................................................................................
Mpls L2vpn Configuration Examples217................................................................................................................................................................
Configuring Martini Mpls L2vpn224................................................................................................................................................................
Configuring Kompella Mpls L2vpn228................................................................................................................................................................
Configuring A Vc For A Service Instance230................................................................................................................................................................
Troubleshooting Mpls L2vpn235................................................................................................................................................................
Configuring Mpls L3vpn236................................................................................................................................................................
Mpls L3vpn Packet Forwarding239................................................................................................................................................................
Mpls L3vpn Networking Schemes240................................................................................................................................................................
Mpls L3vpn Routing Information Advertisement243................................................................................................................................................................
Inter-as Vpn244................................................................................................................................................................
Carrier's Carrier247................................................................................................................................................................
Nested Vpn249................................................................................................................................................................
Hovpn251................................................................................................................................................................
Ospf Vpn Extension253................................................................................................................................................................
Bgp As Number Substitution And Soo255................................................................................................................................................................
Mpls L3vpn Configuration Task List256................................................................................................................................................................
Configuring Vpn Instances257................................................................................................................................................................
Configuring Routing Between Pe And Ce261................................................................................................................................................................
Configuring Routing Between Pes267................................................................................................................................................................
Configuring Inter-as Vpn270................................................................................................................................................................
Configuring Inter-as Option B271................................................................................................................................................................
Configuring Inter-as Option C272................................................................................................................................................................
Configuring Nested Vpn273................................................................................................................................................................
Configuration Restrictions And Guidelines274................................................................................................................................................................
Configuring Hovpn275................................................................................................................................................................
Configuring A Loopback Interface276................................................................................................................................................................
Configuring Bgp As Number Substitution And Soo277................................................................................................................................................................
Mpls L3vpn Configuration Examples281................................................................................................................................................................
Configuring Mpls L3vpns Using Ibgp Between Pe And Ce288................................................................................................................................................................
Configuring A Hub-spoke Network295................................................................................................................................................................
Configuring Inter-as Option A303................................................................................................................................................................
Configuring Carrier's Carrier319................................................................................................................................................................
Configuring Ospf Sham Links342................................................................................................................................................................
Configuring Bgp As Number Substitution347................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn354................................................................................................................................................................
Ipv6 Mpls L3vpn Packet Forwarding355................................................................................................................................................................
Ipv6 Mpls L3vpn Network Schemes And Functions356................................................................................................................................................................
Configuring Route Related Attributes For A Vpn Instance358................................................................................................................................................................
Configuring Routing Features For The Bgp-vpnv6 Subaddress Family364................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn365................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn Option A366................................................................................................................................................................
Ipv6 Mpls L3vpn Configuration Examples368................................................................................................................................................................
Configuring Ipv6 Mpls L3vpns369................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn Option C381................................................................................................................................................................
Support And Other Resources396................................................................................................................................................................
Conventions397................................................................................................................................................................
Index399................................................................................................................................................................

Advertisement

HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (367 pages)

Security Configuration Guide  
Brand: HP | Category: Switch | Size: 3.58 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Aaa11................................................................................................................................................................
Radius12................................................................................................................................................................
Hwtacacs17................................................................................................................................................................
Domain-based User Management19................................................................................................................................................................
Aaa For Mpls L3vpns20................................................................................................................................................................
Radius Attributes21................................................................................................................................................................
Fips Compliance24................................................................................................................................................................
Configuring Aaa Schemes26................................................................................................................................................................
Configuring Radius Schemes30................................................................................................................................................................
Configuring Hwtacacs Schemes42................................................................................................................................................................
Configuring Aaa Methods For Isp Domains48................................................................................................................................................................
Configuration Prerequisites49................................................................................................................................................................
Configuring Isp Domain Attributes50................................................................................................................................................................
Configuring Authentication Methods For An Isp Domain51................................................................................................................................................................
Configuring Authorization Methods For An Isp Domain52................................................................................................................................................................
Configuring Accounting Methods For An Isp Domain54................................................................................................................................................................
Tearing Down User Connections55................................................................................................................................................................
Configuring A Nas Id-vlan Binding56................................................................................................................................................................
Aaa Configuration Examples57................................................................................................................................................................
Local Authentication And Authorization For Telnet Users58................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server59................................................................................................................................................................
Aaa For Portal Users By A Radius Server62................................................................................................................................................................
Aaa For 802.1x Users By A Radius Server70................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server76................................................................................................................................................................
Troubleshooting Aaa79................................................................................................................................................................
Troubleshooting Hwtacacs81................................................................................................................................................................
X Overview82................................................................................................................................................................
X-related Protocols83................................................................................................................................................................
Eap Over Radius84................................................................................................................................................................
Initiating 802.1x Authentication85................................................................................................................................................................
X Authentication Procedures86................................................................................................................................................................
Eap Relay87................................................................................................................................................................
Eap Termination88................................................................................................................................................................
Configuring 802.1x90................................................................................................................................................................
Enabling 802.1x96................................................................................................................................................................
Setting The Port Authorization State97................................................................................................................................................................
Specifying An Access Control Method98................................................................................................................................................................
Setting The 802.1x Authentication Timeout Timers99................................................................................................................................................................
Configuration Guidelines100................................................................................................................................................................
Configuring The Authentication Trigger Function101................................................................................................................................................................
Specifying A Mandatory Authentication Domain On A Port102................................................................................................................................................................
Enabling The Periodic Online User Re-authentication Function103................................................................................................................................................................
Configuring An 802.1x Guest Vlan104................................................................................................................................................................
Displaying And Maintaining 802.1x108................................................................................................................................................................
Configuration Procedure109................................................................................................................................................................
Verifying The Configuration110................................................................................................................................................................
X Guest Vlan And Vlan Assignment Configuration Example111................................................................................................................................................................
Configuring Ead Fast Deployment116................................................................................................................................................................
Configuring The Redirect Url117................................................................................................................................................................
Ead Fast Deployment Configuration Example118................................................................................................................................................................
Troubleshooting Ead Fast Deployment120................................................................................................................................................................
Configuring Mac Authentication121................................................................................................................................................................
Mac Authentication Timers122................................................................................................................................................................
Critical Vlan123................................................................................................................................................................
Configuring Mac Authentication Globally124................................................................................................................................................................
Specifying A Mac Authentication Domain125................................................................................................................................................................
Configuring A Mac Authentication Critical Vlan126................................................................................................................................................................
Configuring Mac Authentication Delay127................................................................................................................................................................
Mac Authentication Configuration Examples128................................................................................................................................................................
Radius-based Mac Authentication Configuration Example129................................................................................................................................................................
Acl Assignment Configuration Example131................................................................................................................................................................
Configuring Portal Authentication134................................................................................................................................................................
Portal Authentication Modes136................................................................................................................................................................
Portal Support For Eap137................................................................................................................................................................
Portal Authentication Across Vpns141................................................................................................................................................................
Specifying The Portal Server143................................................................................................................................................................
Controlling Access Of Portal Users144................................................................................................................................................................
Configuring An Authentication Source Subnet145................................................................................................................................................................
Specifying A Portal Authentication Domain146................................................................................................................................................................
Specifying The Nas-port-id For An Interface147................................................................................................................................................................
Specifying A Source Ip Address For Outgoing Portal Packets148................................................................................................................................................................
Configuring Portal Detection Functions149................................................................................................................................................................
Configuring Portal User Information Synchronization150................................................................................................................................................................
Logging Off Portal Users151................................................................................................................................................................
Portal Configuration Examples152................................................................................................................................................................
Configure The Switch156................................................................................................................................................................
Configuring Re-dhcp Portal Authentication157................................................................................................................................................................
Configuring Cross-subnet Portal Authentication159................................................................................................................................................................
Configuring Direct Portal Authentication With Extended Functions161................................................................................................................................................................
Configuring Re-dhcp Portal Authentication With Extended Functions163................................................................................................................................................................
Configuring Cross-subnet Portal Authentication With Extended Functions165................................................................................................................................................................
Configuring Portal Server Detection And Portal User Information Synchronization167................................................................................................................................................................
Configuring The Switch171................................................................................................................................................................
Cross-subnet Portal Authentication Across Vpns173................................................................................................................................................................
Troubleshooting Portal175................................................................................................................................................................
Configuring Port Security176................................................................................................................................................................
Working With Guest Vlan And Auth-fail Vlan179................................................................................................................................................................
Enabling Port Security180................................................................................................................................................................
Setting The Port Security Mode181................................................................................................................................................................
Configuring Ntk182................................................................................................................................................................
Enabling Port Security Traps183................................................................................................................................................................
Ignoring Authorization Information From The Server185................................................................................................................................................................
Port Security Configuration Examples186................................................................................................................................................................
Configuring The Userloginwithoui Mode188................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode193................................................................................................................................................................
Troubleshooting Port Security195................................................................................................................................................................
Cannot Set The Port Security Mode196................................................................................................................................................................
Configuring A User Profile198................................................................................................................................................................
Applying A Qos Policy199................................................................................................................................................................
Displaying And Maintaining User Profiles200................................................................................................................................................................
Managing Public Keys201................................................................................................................................................................
Creating A Local Asymmetric Key Pair202................................................................................................................................................................
Destroying A Local Asymmetric Key Pair203................................................................................................................................................................
Specifying The Peer Public Key On The Local Device204................................................................................................................................................................
Displaying Public Keys205................................................................................................................................................................
Importing A Public Key From A Public Key File207................................................................................................................................................................
Configuring Ssh210................................................................................................................................................................
Ssh Authentication211................................................................................................................................................................
Generating Local Dsa Or Rsa Key Pairs213................................................................................................................................................................
Enabling The Sftp Server Function214................................................................................................................................................................
Configuring A Client's Host Public Key215................................................................................................................................................................
Configuring An Ssh User216................................................................................................................................................................
Setting The Ssh Management Parameters217................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Ssh Server218................................................................................................................................................................
Stelnet Client Configuration Task List219................................................................................................................................................................
Establishing A Connection To An Stelnet Server220................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Stelnet Client221................................................................................................................................................................
Configuring The Device As An Sftp Client222................................................................................................................................................................
Working With Sftp Directories223................................................................................................................................................................
Working With Sftp Files224................................................................................................................................................................
Terminating The Connection With The Sftp Server225................................................................................................................................................................
Transferring Files With An Scp Server226................................................................................................................................................................
Stelnet Configuration Examples227................................................................................................................................................................
When The Switch Acts As An Stelnet Server For Publickey Authentication229................................................................................................................................................................
When The Switch Acts As An Stelnet Client For Password Authentication234................................................................................................................................................................
When The Switch Acts As An Stelnet Client For Publickey Authentication237................................................................................................................................................................
Sftp Configuration Examples239................................................................................................................................................................
When The Switch Acts As An Sftp Client For Publickey Authentication241................................................................................................................................................................
Ssh Connection242................................................................................................................................................................
Configuring Tcp Attack Protection245................................................................................................................................................................
Configuring Ip Source Guard246................................................................................................................................................................
Dynamic Ipv4 Source Guard Entries247................................................................................................................................................................
Configuring The Ipv4 Source Guard Function248................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Entry249................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Entries Allowed On A Port250................................................................................................................................................................
Configuring A Static Ipv6 Source Guard Entry251................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Source Guard Entries Allowed On A Port252................................................................................................................................................................
Ip Source Guard Configuration Examples253................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Snooping255................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Relay256................................................................................................................................................................
Static Ipv6 Source Guard Entry Configuration257................................................................................................................................................................
Global Static Ip Source Guard Configuration258................................................................................................................................................................
Troubleshooting Ip Source Guard260................................................................................................................................................................
Configuring Arp Attack Protection261................................................................................................................................................................
Configuring Unresolvable Ip Attack Protection262................................................................................................................................................................
Unresolvable Ip Attack Protection Configuration Example263................................................................................................................................................................
Configuring Arp Packet Rate Limit264................................................................................................................................................................
Displaying And Maintaining Source Mac-based Arp Attack Detection265................................................................................................................................................................
Configuring Arp Active Acknowledgement266................................................................................................................................................................
Configuring Arp Detection267................................................................................................................................................................
Configuring Arp Packet Validity Check268................................................................................................................................................................
Configuring Arp Restricted Forwarding269................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example271................................................................................................................................................................
Arp Restricted Forwarding Configuration Example272................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp274................................................................................................................................................................
Configuring Nd Attack Defense276................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets277................................................................................................................................................................
Configuring Urpf278................................................................................................................................................................
Network Application281................................................................................................................................................................
Urpf Configuration Example282................................................................................................................................................................
Configuring Mff283................................................................................................................................................................
Basic Concepts284................................................................................................................................................................
Mff Work Flow285................................................................................................................................................................
Displaying And Maintaining Mff287................................................................................................................................................................
Configuring Auto-mode Mff In A Ring Network288................................................................................................................................................................
Configuring Manual-mode Mff In A Tree Network290................................................................................................................................................................
Configuring Manual-mode Mff In A Ring Network292................................................................................................................................................................
Configuring Password Control294................................................................................................................................................................
Enabling Password Control297................................................................................................................................................................
Setting Global Password Control Parameters298................................................................................................................................................................
Setting User Group Password Control Parameters299................................................................................................................................................................
Setting Local User Password Control Parameters300................................................................................................................................................................
Setting Super Password Control Parameters301................................................................................................................................................................
Password Control Configuration Example302................................................................................................................................................................
Configuring Fips305................................................................................................................................................................
Displaying And Maintaining Fips307................................................................................................................................................................
Configuring Ipsec309................................................................................................................................................................
Protocols And Standards312................................................................................................................................................................
Configuring Acls313................................................................................................................................................................
Configuring An Ipsec Transform Set314................................................................................................................................................................
Configuring An Ipsec Policy315................................................................................................................................................................
Applying An Ipsec Policy Group To An Interface319................................................................................................................................................................
Enabling Acl Checking Of De-encapsulated Ipsec Packets320................................................................................................................................................................
Configuring Packet Information Pre-extraction321................................................................................................................................................................
Displaying And Maintaining Ipsec322................................................................................................................................................................
Configuring Ike325................................................................................................................................................................
Ike Functions326................................................................................................................................................................
Relationship Between Ike And Ipsec327................................................................................................................................................................
Configuring A Name For The Local Security Gateway328................................................................................................................................................................
Configuring An Ike Peer329................................................................................................................................................................
Setting Keepalive Timers331................................................................................................................................................................
Configuring A Dpd Detector332................................................................................................................................................................
Displaying And Maintaining Ike333................................................................................................................................................................
Troubleshooting Ike336................................................................................................................................................................
Failing To Establish An Ipsec Tunnel337................................................................................................................................................................
Support And Other Resources338................................................................................................................................................................
Conventions339................................................................................................................................................................
Index341................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (327 pages)

Brand: HP | Category: Network Router | Size: 3.27 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Mce7................................................................................................................................................................
Mpls L3vpn Concepts8................................................................................................................................................................
How Mce Works10................................................................................................................................................................
Configuring Vpn Instances On An Mce Device11................................................................................................................................................................
Configuring Routing On An Mce Device12................................................................................................................................................................
Configuration Prerequisites13................................................................................................................................................................
Configuring Routing Between An Mce And A Pe19................................................................................................................................................................
Displaying And Maintaining Mce23................................................................................................................................................................
Using Bgp To Advertise Vpn Routes To The Pe29................................................................................................................................................................
Configuring Ipv6 Mce34................................................................................................................................................................
Configuring Route Attributes For A Vpn Instance35................................................................................................................................................................
Configuring Routing On An Ipv6 Mce Device36................................................................................................................................................................
Configuring Routing Between An Ipv6 Mce And A Pe41................................................................................................................................................................
Displaying Information About Ipv6 Mce44................................................................................................................................................................
Configuring Basic Mpls51................................................................................................................................................................
Mpls Network Architecture52................................................................................................................................................................
Lsp Establishment53................................................................................................................................................................
Mpls Forwarding54................................................................................................................................................................
Protocols And Standards55................................................................................................................................................................
Configuring Mpls Mtu56................................................................................................................................................................
Configuring Ttl Propagation57................................................................................................................................................................
Enabling Sending Mpls Ttl-expired Messages58................................................................................................................................................................
Displaying And Maintaining Mpls59................................................................................................................................................................
Configuring A Static Lsp60................................................................................................................................................................
Displaying Static Lsps61................................................................................................................................................................
Configuring Ldp64................................................................................................................................................................
Ldp Operation65................................................................................................................................................................
Label Distribution And Control66................................................................................................................................................................
Protocols69................................................................................................................................................................
Enabling Ldp70................................................................................................................................................................
Configuring Ldp Session Parameters71................................................................................................................................................................
Configuring Ldp Backoff72................................................................................................................................................................
Configuring Ldp Md5 Authentication73................................................................................................................................................................
Configuring The Ldp Label Distribution Control Mode74................................................................................................................................................................
Configuring A Label Acceptance Policy75................................................................................................................................................................
Configuring Ldp Loop Detection76................................................................................................................................................................
Configuring Ldp Session Protection77................................................................................................................................................................
Configuring Ldp Gr78................................................................................................................................................................
Ldp Configuration Examples79................................................................................................................................................................
Label Acceptance Control Configuration Example82................................................................................................................................................................
Configuration Considerations83................................................................................................................................................................
Label Advertisement Control Configuration Example86................................................................................................................................................................
Configuring Tunnel Policies91................................................................................................................................................................
Displaying Tunnel Information92................................................................................................................................................................
Configuring Mpls L3vpn93................................................................................................................................................................
Mpls L3vpn Route Advertisement95................................................................................................................................................................
Mpls L3vpn Packet Forwarding96................................................................................................................................................................
Mpls L3vpn Networking Schemes97................................................................................................................................................................
Inter-as Vpn99................................................................................................................................................................
Carrier's Carrier102................................................................................................................................................................
Nested Vpn104................................................................................................................................................................
Hovpn106................................................................................................................................................................
Ospf Vpn Extension108................................................................................................................................................................
Bgp As Number Substitution109................................................................................................................................................................
Mpls L3vpn Configuration Task List110................................................................................................................................................................
Configuring Routing Between A Pe And A Ce113................................................................................................................................................................
Configuring Routing Between Pes117................................................................................................................................................................
Configuring Bgp Vpnv4 Route Control118................................................................................................................................................................
Configuring Inter-as Vpn120................................................................................................................................................................
Configuring Inter-as Option C121................................................................................................................................................................
Configuring Nested Vpn123................................................................................................................................................................
Configuring Hovpn124................................................................................................................................................................
Specifying The Vpn Label Processing Mode On The Egress Pe125................................................................................................................................................................
Displaying And Maintaining Mpls L3vpn126................................................................................................................................................................
Mpls L3vpn Configuration Examples127................................................................................................................................................................
Configuring An Mpls L3vpn Over A Gre Tunnel135................................................................................................................................................................
Configure A Gre Tunnel138................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option A139................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option B144................................................................................................................................................................
Configuring Mpls L3vpn Inter-as Option C149................................................................................................................................................................
Configuring Mpls L3vpn Carrier's Carrier155................................................................................................................................................................
Configuring Bgp As Number Substitution180................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn185................................................................................................................................................................
Ipv6 Mpls L3vpn Packet Forwarding186................................................................................................................................................................
Ipv6 Mpls L3vpn Network Schemes And Functions187................................................................................................................................................................
Configuring Vpn Instances188................................................................................................................................................................
Configuring Bgp Vpnv6 Route Control194................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn195................................................................................................................................................................
Configuring Inter-as Ipv6 Vpn Option A196................................................................................................................................................................
Displaying And Maintaining Ipv6 Mpls L3vpn197................................................................................................................................................................
Ipv6 Mpls L3vpn Configuration Examples199................................................................................................................................................................
Configuring An Ipv6 Mpls L3vpn Over A Gre Tunnel206................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn Inter-as Option A210................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn Inter-as Option C215................................................................................................................................................................
Configuring Ipv6 Mpls L3vpn Carrier's Carrier222................................................................................................................................................................
Configuring Mpls L2vpn230................................................................................................................................................................
Mpls L2vpn Connection Establishment231................................................................................................................................................................
Ethernet Over Mpls232................................................................................................................................................................
Multi-segment Pw233................................................................................................................................................................
Mpls L2vpn Configuration Task List235................................................................................................................................................................
Enabling L2vpn236................................................................................................................................................................
Configuring A Service Instance On A Layer 2 Ethernet Interface237................................................................................................................................................................
Configuring A Pw238................................................................................................................................................................
Binding An Ac To A Cross-connect239................................................................................................................................................................
Configure Static Pw Redundancy240................................................................................................................................................................
Displaying And Maintaining Mpls L2vpn241................................................................................................................................................................
Configuring An Ldp Pw (vlan Mode)246................................................................................................................................................................
Configuring An Ldp Pw (flexible Mode)250................................................................................................................................................................
Configuring Ldp Pw Redundancy254................................................................................................................................................................
Configuring An Intra-domain Multi-segment Pw259................................................................................................................................................................
Configuring An Inter-domain Multi-segment Pw263................................................................................................................................................................
Configuring Vpls270................................................................................................................................................................
Vpls Implementation271................................................................................................................................................................
Pe Dual Homing273................................................................................................................................................................
Vpls Configuration Task List274................................................................................................................................................................
Configuring A Vsi276................................................................................................................................................................
Configuring An Ldp Pw277................................................................................................................................................................
Configuring Pe Dual Homing278................................................................................................................................................................
Configuring A Dual-homed Pe With Redundant Ldp Pws279................................................................................................................................................................
Vpls Configuration Examples280................................................................................................................................................................
Ldp Pw Configuration Example284................................................................................................................................................................
Support And Other Resources289................................................................................................................................................................
Conventions290................................................................................................................................................................
Index292................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (239 pages)

Brand: HP | Category: Switch | Size: 2.25 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Using The Cli9................................................................................................................................................................
Entering System View From User View10................................................................................................................................................................
Using The Undo Form Of A Command11................................................................................................................................................................
Entering A Command12................................................................................................................................................................
Abbreviating Commands13................................................................................................................................................................
Configuring And Using Command Hotkeys14................................................................................................................................................................
Enabling Redisplaying Entered-but-not-submitted Commands15................................................................................................................................................................
Using The Command History Function16................................................................................................................................................................
Pausing Between Screens Of Output17................................................................................................................................................................
Filtering The Output From A Display Command18................................................................................................................................................................
Saving The Output From A Display Command To A File20................................................................................................................................................................
Viewing And Managing The Output From A Display Command Effectively22................................................................................................................................................................
Login Overview23................................................................................................................................................................
Logging In Through The Console Port For The First Device Access25................................................................................................................................................................
Logging In To The Cli28................................................................................................................................................................
Login Authentication Modes29................................................................................................................................................................
Logging In Through The Console Port Locally30................................................................................................................................................................
Configuring Password Authentication For Console Login31................................................................................................................................................................
Configuring Scheme Authentication For Console Login32................................................................................................................................................................
Logging In Through Telnet34................................................................................................................................................................
Configuring Password Authentication For Telnet Login36................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login37................................................................................................................................................................
Using The Device To Log In To A Telnet Server41................................................................................................................................................................
Logging In Through Ssh42................................................................................................................................................................
Using The Device To Log In To An Ssh Server44................................................................................................................................................................
Displaying And Maintaining Cli Login48................................................................................................................................................................
Accessing The Device Through Snmp49................................................................................................................................................................
Configuring Snmpv1 Or Snmpv2c Access50................................................................................................................................................................
Controlling User Access51................................................................................................................................................................
Configuration Example52................................................................................................................................................................
Configuring Command Authorization54................................................................................................................................................................
Configuring Command Accounting56................................................................................................................................................................
Configuration Procedure57................................................................................................................................................................
Configuring Rbac60................................................................................................................................................................
Assigning User Roles63................................................................................................................................................................
Creating User Roles64................................................................................................................................................................
Configuring Feature Groups65................................................................................................................................................................
Changing The Interface Policy Of A User Role66................................................................................................................................................................
Assigning User Roles To Local Aaa Authentication Users68................................................................................................................................................................
Configuring Temporary User Role Authorization69................................................................................................................................................................
Configuring User Role Authentication70................................................................................................................................................................
Obtaining Temporary User Role Authorization71................................................................................................................................................................
Rbac Configuration Examples72................................................................................................................................................................
Rbac Configuration Example For Radius Authentication Users73................................................................................................................................................................
Rbac Configuration Example For Hwtacacs Authentication Users76................................................................................................................................................................
Troubleshooting Rbac80................................................................................................................................................................
Login Attempts By Radius Users Always Fail81................................................................................................................................................................
Configuring Ftp82................................................................................................................................................................
Configuring Authentication And Authorization83................................................................................................................................................................
Manually Releasing Ftp Connections84................................................................................................................................................................
Ftp Server Configuration Example In Irf Mode86................................................................................................................................................................
Using The Device As An Ftp Client87................................................................................................................................................................
Managing Directories On The Ftp Server89................................................................................................................................................................
Changing To Another User Account90................................................................................................................................................................
Terminating The Ftp Connection91................................................................................................................................................................
Ftp Client Configuration Example In Irf Mode93................................................................................................................................................................
Configuring Tftp95................................................................................................................................................................
Configuring The Device As An Ipv6 Tftp Client96................................................................................................................................................................
Managing The File System97................................................................................................................................................................
Managing Files99................................................................................................................................................................
Copying A File100................................................................................................................................................................
Deleting Files From The Recycle Bin101................................................................................................................................................................
Displaying Directory Information102................................................................................................................................................................
Managing Storage Media103................................................................................................................................................................
Setting The Operation Mode For Files And Folders104................................................................................................................................................................
Managing Configuration Files105................................................................................................................................................................
Configuration File Formats106................................................................................................................................................................
Startup Configuration File Selection107................................................................................................................................................................
Enabling Configuration Encryption108................................................................................................................................................................
Specifying A Next-startup Configuration File109................................................................................................................................................................
Backing Up The Main Next-startup Configuration File To A Tftp Server110................................................................................................................................................................
Deleting A Next-startup Configuration File111................................................................................................................................................................
Upgrading Software113................................................................................................................................................................
Comware Image Redundancy And Loading Procedure114................................................................................................................................................................
Upgrade Methods115................................................................................................................................................................
Preparing For The Upgrade116................................................................................................................................................................
Specifying The Startup Image File And Completing The Upgrade (in Standalone Mode)117................................................................................................................................................................
Specifying The Startup Image File And Completing The Upgrade (in Irf Mode)118................................................................................................................................................................
Restoring Or Downgrading The Bootware Image120................................................................................................................................................................
Displaying And Maintaining Software Image Settings121................................................................................................................................................................
Issu Overview124................................................................................................................................................................
Issu Methods For A Compatible Version125................................................................................................................................................................
Issu Method For An Incompatible Version126................................................................................................................................................................
Issu Prerequisites127................................................................................................................................................................
Performing An Issu By Using Issu Series Commands129................................................................................................................................................................
Performing An Issu For A Single-mpu Device130................................................................................................................................................................
Performing An Issu In Irf Mode131................................................................................................................................................................
Performing An Issu For A Multichassis Irf Fabric132................................................................................................................................................................
Performing An Issu For A Dual-mpu Single-chassis Irf Fabric133................................................................................................................................................................
Performing An Issu For A Single-mpu Single-chassis Irf Fabric135................................................................................................................................................................
Displaying And Maintaining Issu136................................................................................................................................................................
Issu Examples For Using Issu Series Commands In Standalone Mode138................................................................................................................................................................
Feature Upgrade To An Incompatible Version140................................................................................................................................................................
Feature Rollback Example142................................................................................................................................................................
Issu Examples For Using Issu Series Commands In Irf Mode144................................................................................................................................................................
Performing An Issu By Using Install Series Commands153................................................................................................................................................................
Uninstalling Feature Or Patch Images154................................................................................................................................................................
Rolling Back The Software Configuration155................................................................................................................................................................
Aborting A Software Activate/deactivate Operation156................................................................................................................................................................
Issu Examples For Using Install Series Commands In Standalone Mode157................................................................................................................................................................
Issu Examples For Using Install Series Commands In Irf Mode160................................................................................................................................................................
Managing The Device166................................................................................................................................................................
Specifying The System Time Source167................................................................................................................................................................
Configuring Banners168................................................................................................................................................................
Rebooting The Device170................................................................................................................................................................
Scheduling A Device Reboot171................................................................................................................................................................
Schedule Configuration Example173................................................................................................................................................................
Disabling Password Recovery Capability176................................................................................................................................................................
Setting The Port Status Detection Timer177................................................................................................................................................................
Setting Memory Usage Thresholds178................................................................................................................................................................
Configuring The Temperature Alarm Thresholds179................................................................................................................................................................
Specifying A Traffic Load Sharing Mode For An Lpu181................................................................................................................................................................
Specifying An Operating Mode For An Lpu182................................................................................................................................................................
Configuration Guidelines184................................................................................................................................................................
Configuring The Asset Profile Of A Physical Component185................................................................................................................................................................
Verifying And Diagnosing Transceiver Modules186................................................................................................................................................................
Disabling Alarm Traps For Transceiver Modules187................................................................................................................................................................
Configuring Tcl191................................................................................................................................................................
Configuring Mdcs192................................................................................................................................................................
Default Mdc And Non-default Mdcs193................................................................................................................................................................
Creating An Mdc194................................................................................................................................................................
Assigning Physical Interfaces To An Mdc195................................................................................................................................................................
Specifying A Cpu Weight For An Mdc196................................................................................................................................................................
Specifying A Memory Space Percentage For An Mdc197................................................................................................................................................................
Displaying And Maintaining Mdcs198................................................................................................................................................................
Using Automatic Configuration204................................................................................................................................................................
Interface Selection Process206................................................................................................................................................................
Automatic-configuration Parameter Acquisition Process207................................................................................................................................................................
Deploying And Configuring Servers For Automatic Configuration209................................................................................................................................................................
Dhcp Server Configuration Guidelines210................................................................................................................................................................
Support And Other Resources212................................................................................................................................................................
Conventions213................................................................................................................................................................
Index215................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (231 pages)

Layer 3 - IP Services  
Brand: HP | Category: Switch | Size: 2.41 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Arp10................................................................................................................................................................
Arp Table11................................................................................................................................................................
Configuring A Static Arp Entry12................................................................................................................................................................
Configuring The Maximum Number Of Dynamic Arp Entries For An Interface13................................................................................................................................................................
Configuring Arp Quick Update14................................................................................................................................................................
Configuring Multicast Arp15................................................................................................................................................................
Displaying And Maintaining Arp16................................................................................................................................................................
Arp Configuration Examples17................................................................................................................................................................
Multicast Arp Configuration Example (in Standalone Mode)18................................................................................................................................................................
Multicast Arp Configuration Example (in Irf Mode)19................................................................................................................................................................
Configuring Gratuitous Arp21................................................................................................................................................................
Configuration Procedure22................................................................................................................................................................
Configuring Proxy Arp24................................................................................................................................................................
Enabling Common Proxy Arp25................................................................................................................................................................
Displaying And Maintaining Proxy Arp26................................................................................................................................................................
Local Proxy Arp Configuration Example In Case Of Port Isolation27................................................................................................................................................................
Local Proxy Arp Configuration Example In Super Vlan29................................................................................................................................................................
Local Proxy Arp Configuration Example In Isolate-user-vlan30................................................................................................................................................................
Configuring Arp Snooping32................................................................................................................................................................
Configuring Ip Addressing33................................................................................................................................................................
Special Ip Addresses34................................................................................................................................................................
Assigning An Ip Address To An Interface35................................................................................................................................................................
Displaying And Maintaining Ip Addressing37................................................................................................................................................................
Dhcp Overview38................................................................................................................................................................
Dynamic Ip Address Allocation Process39................................................................................................................................................................
Dhcp Message Format40................................................................................................................................................................
Dhcp Options41................................................................................................................................................................
Protocols And Standards44................................................................................................................................................................
Configuring The Dhcp Server45................................................................................................................................................................
Ip Address Allocation Sequence46................................................................................................................................................................
Dhcp Server Configuration Task List47................................................................................................................................................................
Creating A Dhcp Address Pool48................................................................................................................................................................
Configuring Dynamic Address Allocation For An Extended Address Pool50................................................................................................................................................................
Configuring A Domain Name Suffix For The Client51................................................................................................................................................................
Configuring Bims Server Information For The Client52................................................................................................................................................................
Configuring The Tftp Server And Bootfile Name For The Client53................................................................................................................................................................
Specifying A Server's Ip Address For The Dhcp Client54................................................................................................................................................................
Enabling Dhcp55................................................................................................................................................................
Configuration Guidelines56................................................................................................................................................................
Configuring The Dhcp Server Security Functions57................................................................................................................................................................
Enabling Client Offline Detection58................................................................................................................................................................
Specifying The Threshold For Sending Trap Messages59................................................................................................................................................................
Dhcp Server Configuration Examples60................................................................................................................................................................
Dynamic Ip Address Assignment Configuration Example62................................................................................................................................................................
Self-defined Option Configuration Example63................................................................................................................................................................
Troubleshooting Dhcp Server Configuration64................................................................................................................................................................
Configuring The Dhcp Relay Agent65................................................................................................................................................................
Dhcp Relay Agent Support For Option 8266................................................................................................................................................................
Dhcp Relay Agent Configuration Task List67................................................................................................................................................................
Correlating A Dhcp Server Group With A Relay Agent Interface68................................................................................................................................................................
Configuring The Dhcp Relay Agent Security Functions69................................................................................................................................................................
Enabling Unauthorized Dhcp Server Detection70................................................................................................................................................................
Configuring The Dhcp Relay Agent To Handle Option 8272................................................................................................................................................................
Setting The Dscp Value For Dhcp Packets73................................................................................................................................................................
Dhcp Relay Agent Configuration Examples74................................................................................................................................................................
Dhcp Relay Agent Option 82 Support Configuration Example75................................................................................................................................................................
Troubleshooting Dhcp Relay Agent Configuration76................................................................................................................................................................
Configuring Dhcp Client77................................................................................................................................................................
Displaying And Maintaining The Dhcp Client78................................................................................................................................................................
Verifying The Configuration79................................................................................................................................................................
Configuring Dhcp Snooping81................................................................................................................................................................
Application Environment Of Trusted Ports82................................................................................................................................................................
Dhcp Snooping Support For Option 8283................................................................................................................................................................
Dhcp Snooping Configuration Task List84................................................................................................................................................................
Configuring Dhcp Snooping Entries Backup87................................................................................................................................................................
Enabling Dhcp Starvation Attack Protection88................................................................................................................................................................
Enabling Dhcp-request Message Attack Protection89................................................................................................................................................................
Displaying And Maintaining Dhcp Snooping90................................................................................................................................................................
Dhcp Snooping Configuration Examples91................................................................................................................................................................
Configuring Ipv4 Dns93................................................................................................................................................................
Configuring The Ipv4 Dns Client94................................................................................................................................................................
Configuring Dynamic Domain Name Resolution95................................................................................................................................................................
Displaying And Maintaining Ipv4 Dns96................................................................................................................................................................
Dynamic Domain Name Resolution Configuration Example97................................................................................................................................................................
Troubleshooting Ipv4 Dns Configuration100................................................................................................................................................................
Configuring Ip Forwarding Basics101................................................................................................................................................................
Configuring Ip Performance Optimization103................................................................................................................................................................
Configuration Example104................................................................................................................................................................
Configuring The Tcp Send/receive Buffer Size105................................................................................................................................................................
Configuring Tcp Timers106................................................................................................................................................................
Disadvantages Of Sending Icmp Error Packets107................................................................................................................................................................
Configuring Udp Helper111................................................................................................................................................................
Displaying And Maintaining Udp Helper112................................................................................................................................................................
Configuring Ipv6 Basics114................................................................................................................................................................
Ipv6 Addresses115................................................................................................................................................................
Ipv6 Neighbor Discovery Protocol118................................................................................................................................................................
Ipv6 Path Mtu Discovery121................................................................................................................................................................
Configuring Basic Ipv6 Functions123................................................................................................................................................................
Manual Configuration124................................................................................................................................................................
Configuring An Ipv6 Link-local Address125................................................................................................................................................................
Configure An Ipv6 Anycast Address126................................................................................................................................................................
Configuring Ipv6 Nd127................................................................................................................................................................
Setting The Age Timer For Nd Entries In Stale State128................................................................................................................................................................
Configuring The Maximum Number Of Attempts To Send An Ns Message For Dad131................................................................................................................................................................
Configuring Path Mtu Discovery132................................................................................................................................................................
Configuring Icmpv6 Packet Sending133................................................................................................................................................................
Enabling Sending Icmpv6 Time Exceeded Messages134................................................................................................................................................................
Displaying And Maintaining Ipv6 Basics Configuration135................................................................................................................................................................
Ipv6 Basics Configuration Example137................................................................................................................................................................
Troubleshooting Ipv6 Basics Configuration142................................................................................................................................................................
Dhcpv6 Overview143................................................................................................................................................................
Iaid144................................................................................................................................................................
Assignment Involving Four Messages145................................................................................................................................................................
Stateless Dhcpv6 Configuration146................................................................................................................................................................
Configuring Dhcpv6 Relay Agent148................................................................................................................................................................
Configuration Prerequisites149................................................................................................................................................................
Displaying And Maintaining The Dhcpv6 Relay Agent150................................................................................................................................................................
Configuring Dhcpv6 Client153................................................................................................................................................................
Stateless Dhcpv6 Configuration Example154................................................................................................................................................................
Configuring Ipv6 Dns156................................................................................................................................................................
Setting The Dscp Value For Ipv6 Dns Packets157................................................................................................................................................................
Ipv6 Dns Configuration Examples158................................................................................................................................................................
Configuring Tunneling164................................................................................................................................................................
Ipv4 Over Ipv4 Tunneling166................................................................................................................................................................
Ipv4 Over Ipv6 Tunneling167................................................................................................................................................................
Ipv6 Over Ipv6 Tunneling168................................................................................................................................................................
Tunneling Configuration Task List169................................................................................................................................................................
Configuring An Ipv6 Manual Tunnel171................................................................................................................................................................
Configuring A 6to4 Tunnel175................................................................................................................................................................
Configuration Considerations177................................................................................................................................................................
Configuring An Isatap Tunnel179................................................................................................................................................................
Configuring An Ipv4 Over Ipv4 Tunnel183................................................................................................................................................................
Configuring An Ipv4 Over Ipv6 Tunnel187................................................................................................................................................................
Configuring An Ipv6 Over Ipv6 Tunnel191................................................................................................................................................................
Displaying And Maintaining Tunneling Configuration196................................................................................................................................................................
Configuring Gre198................................................................................................................................................................
Gre Encapsulation And De-encapsulation Processes199................................................................................................................................................................
Configuring A Gre Over Ipv4 Tunnel200................................................................................................................................................................
Configuring A Gre Over Ipv6 Tunnel201................................................................................................................................................................
Displaying And Maintaining Gre203................................................................................................................................................................
Gre Over Ipv6 Tunnel Configuration Example206................................................................................................................................................................
Verify The Configuration209................................................................................................................................................................
Troubleshooting Gre210................................................................................................................................................................
Support And Other Resources211................................................................................................................................................................
Conventions212................................................................................................................................................................
Index214................................................................................................................................................................
HP 10500 series Command Reference Manual

HP 10500 series Command Reference Manual (136 pages)

Unified Wired-WLAN Products  
Brand: HP | Category: Switch | Size: 0.68 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Ethernet Interface Configuration Commands6................................................................................................................................................................
Default7................................................................................................................................................................
Display Interface8................................................................................................................................................................
Duplex16................................................................................................................................................................
Flow-interval17................................................................................................................................................................
Jumboframe Enable18................................................................................................................................................................
Loopback Internal19................................................................................................................................................................
Shutdown20................................................................................................................................................................
Speed21................................................................................................................................................................
Display Port-group Manual23................................................................................................................................................................
Group-member24................................................................................................................................................................
Port-group Manual26................................................................................................................................................................
Loopback And Null Interface Configuration Commands28................................................................................................................................................................
Display Interface Loopback29................................................................................................................................................................
Display Interface Null32................................................................................................................................................................
Interface Loopback33................................................................................................................................................................
Interface Null34................................................................................................................................................................
Reset Counters Interface Null35................................................................................................................................................................
Vlan Configuration Commands37................................................................................................................................................................
Display Interface Vlan-interface39................................................................................................................................................................
Display Vlan42................................................................................................................................................................
Interface Vlan-interface44................................................................................................................................................................
Name46................................................................................................................................................................
Reset Counters Interface Vlan-interface47................................................................................................................................................................
Vlan48................................................................................................................................................................
Port-based Vlan Configuration Commands49................................................................................................................................................................
Port50................................................................................................................................................................
Port Access Vlan51................................................................................................................................................................
Port Hybrid Pvid52................................................................................................................................................................
Port Hybrid Vlan53................................................................................................................................................................
Port Link-type54................................................................................................................................................................
Port Trunk Permit Vlan55................................................................................................................................................................
Port Trunk Pvid57................................................................................................................................................................
Mac-based Vlan Configuration Commands58................................................................................................................................................................
Display Mac-vlan Interface59................................................................................................................................................................
Mac-vlan Enable60................................................................................................................................................................
Mac-vlan Mac-address61................................................................................................................................................................
Mac Address Table Commands63................................................................................................................................................................
Display Mac-address Aging-time64................................................................................................................................................................
Display Mac-address Mac-learning65................................................................................................................................................................
Display Mac-address Statistics66................................................................................................................................................................
Mac-address (interface View)67................................................................................................................................................................
Mac-address (system View)68................................................................................................................................................................
Mac-address Mac-learning Disable69................................................................................................................................................................
Mac-address Max-mac-count70................................................................................................................................................................
Mac-address Timer71................................................................................................................................................................
Ethernet Link Aggregation Configuration Commands73................................................................................................................................................................
Display Link-aggregation Load-sharing Mode76................................................................................................................................................................
Display Link-aggregation Member-port78................................................................................................................................................................
Display Link-aggregation Summary79................................................................................................................................................................
Display Link-aggregation Verbose80................................................................................................................................................................
Enable Snmp Trap Updown81................................................................................................................................................................
Interface Bridge-aggregation82................................................................................................................................................................
Lacp Period Short83................................................................................................................................................................
Link-aggregation Load-sharing Mode84................................................................................................................................................................
Link-aggregation Port-priority85................................................................................................................................................................
Port Link-aggregation Group86................................................................................................................................................................
Reset Lacp Statistics87................................................................................................................................................................
Layer 2 Forwarding Configuration Commands89................................................................................................................................................................
Reset Mac-forwarding Statistics90................................................................................................................................................................
Fast Layer 2 Forwarding Configuration Commands91................................................................................................................................................................
Mac-fast-forwarding94................................................................................................................................................................
Pppoe Server Commands96................................................................................................................................................................
Pppoe-server Abnormal-offline-count Threshold97................................................................................................................................................................
Pppoe-server Bind98................................................................................................................................................................
Pppoe-server Log-information Off99................................................................................................................................................................
Pppoe-server Max-sessions Remote-mac100................................................................................................................................................................
Pppoe-server Normal-offline-percent Threshold101................................................................................................................................................................
Reset Pppoe-server102................................................................................................................................................................
Fpga Fast Forwarding Configuration Commands103................................................................................................................................................................
Lldp Configuration Commands105................................................................................................................................................................
Display Lldp Neighbor-information111................................................................................................................................................................
Display Lldp Statistics115................................................................................................................................................................
Display Lldp Status116................................................................................................................................................................
Display Lldp Tlv-config118................................................................................................................................................................
Lldp Admin-status120................................................................................................................................................................
Lldp Check-change-interval121................................................................................................................................................................
Lldp Compliance Cdp122................................................................................................................................................................
Lldp Enable123................................................................................................................................................................
Lldp Fast-count124................................................................................................................................................................
Lldp Management-address-format String125................................................................................................................................................................
Lldp Management-address-tlv126................................................................................................................................................................
Lldp Timer Notification-interval127................................................................................................................................................................
Lldp Timer Tx-delay128................................................................................................................................................................
Lldp Timer Tx-interval129................................................................................................................................................................
Support And Other Resources132................................................................................................................................................................
Conventions133................................................................................................................................................................
Index135................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (129 pages)

PoE+ Unified Wired-WLAN Switch  
Brand: HP | Category: Switch | Size: 1.32 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Using The Cli7................................................................................................................................................................
Using The Undo Form Of A Command8................................................................................................................................................................
Entering System View From User View9................................................................................................................................................................
Accessing The Cli Online Help10................................................................................................................................................................
Entering A Command11................................................................................................................................................................
Configuring And Using Hotkeys12................................................................................................................................................................
Enabling Redisplaying Entered-but-not-submitted Commands13................................................................................................................................................................
Understanding Command-line Error Messages14................................................................................................................................................................
Viewing History Commands15................................................................................................................................................................
Filtering The Output From A Display Command16................................................................................................................................................................
Configuring User Privilege And Command Levels19................................................................................................................................................................
Switching The User Privilege Level22................................................................................................................................................................
Changing The Level Of A Command25................................................................................................................................................................
Displaying And Maintaining Cli26................................................................................................................................................................
Login Overview27................................................................................................................................................................
User Interface Assignment28................................................................................................................................................................
Logging In To The Cli29................................................................................................................................................................
Configuring Console Login Control Settings31................................................................................................................................................................
Disabling Authentication For Console Login32................................................................................................................................................................
Configuring Scheme Authentication For Console Login33................................................................................................................................................................
Configuring Common Console User Interface Settings (optional)34................................................................................................................................................................
Logging In Through Telnet36................................................................................................................................................................
Disabling Authentication For Telnet Login37................................................................................................................................................................
Configuring Password Authentication For Telnet Login38................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login39................................................................................................................................................................
Configuring Common Vty User Interface Settings (optional)41................................................................................................................................................................
Using The Device To Log In To A Telnet Server42................................................................................................................................................................
Logging In Through Ssh43................................................................................................................................................................
Configuring The Ssh Server On The Device44................................................................................................................................................................
Using The Device To Log In To An Ssh Server45................................................................................................................................................................
Displaying And Maintaining Cli Login46................................................................................................................................................................
Logging In To The Web Interface48................................................................................................................................................................
Configuring Https Login49................................................................................................................................................................
Displaying And Maintaining Web Login51................................................................................................................................................................
Http Login Configuration Example52................................................................................................................................................................
Https Login Configuration Example53................................................................................................................................................................
Logging In Through Snmp56................................................................................................................................................................
Configuring Snmpv1 Or Snmpv2c Settings57................................................................................................................................................................
Nms Login Example58................................................................................................................................................................
Controlling User Logins59................................................................................................................................................................
Configuring Source/destination Ip-based Telnet Login Control60................................................................................................................................................................
Telnet Login Control Configuration Example61................................................................................................................................................................
Configuring Source Ip-based Snmp Login Control62................................................................................................................................................................
Snmp Login Control Configuration Example63................................................................................................................................................................
Configuring Source Ip-based Web Login Control64................................................................................................................................................................
Configuring Ftp66................................................................................................................................................................
Managing Directories On The Ftp Server67................................................................................................................................................................
Working With The Files On The Ftp Server68................................................................................................................................................................
Switching To Another User Account69................................................................................................................................................................
Using The Device As An Ftp Server71................................................................................................................................................................
Configuring Authentication And Authorization72................................................................................................................................................................
Ftp Server Configuration Example73................................................................................................................................................................
Displaying And Maintaining Ftp75................................................................................................................................................................
Configuring Tftp76................................................................................................................................................................
Displaying And Maintaining The Tftp Client77................................................................................................................................................................
Managing The File System79................................................................................................................................................................
Displaying File Information80................................................................................................................................................................
Deleting/restoring A File81................................................................................................................................................................
Displaying The Current Working Directory82................................................................................................................................................................
Managing Storage Media83................................................................................................................................................................
File System Management Examples84................................................................................................................................................................
Managing Configuration Files85................................................................................................................................................................
Configuration File Content Organization And Format86................................................................................................................................................................
Saving Configuration By Using Different Methods87................................................................................................................................................................
Using Automatic Configuration Backup After A Software Upgrade88................................................................................................................................................................
Restoring The Next-startup Configuration File From A Tftp Server89................................................................................................................................................................
Displaying And Maintaining Configuration Files90................................................................................................................................................................
Upgrading Software91................................................................................................................................................................
Upgrading Bootware92................................................................................................................................................................
Basic Concepts93................................................................................................................................................................
Patch Installation Task List96................................................................................................................................................................
Installing A Patch Step By Step97................................................................................................................................................................
Uninstalling A Patch Step By Step98................................................................................................................................................................
Displaying And Maintaining Software Upgrade99................................................................................................................................................................
Upgrading The System Software100................................................................................................................................................................
Installing Patches101................................................................................................................................................................
Dealing With Password Loss103................................................................................................................................................................
Examining The State Of Password Recovery Capability104................................................................................................................................................................
Dealing With Console Login Password Loss When Password Recovery Capability Is Enabled105................................................................................................................................................................
Dealing With User Privilege Level Password Loss When Password Recovery Capability Is Enabled106................................................................................................................................................................
Dealing With Password Loss When Password Recovery Capability Is Disabled107................................................................................................................................................................
Managing Licenses109................................................................................................................................................................
Managing The Device110................................................................................................................................................................
Changing The System Time111................................................................................................................................................................
Configuration Example112................................................................................................................................................................
Configuration Procedure113................................................................................................................................................................
Enabling Displaying The Copyright Statement114................................................................................................................................................................
Banner Input Methods115................................................................................................................................................................
Configuring The Maximum Number Of Concurrent Users116................................................................................................................................................................
Rebooting The Device117................................................................................................................................................................
Scheduling Jobs118................................................................................................................................................................
Scheduling A Job In The Non-modular Approach119................................................................................................................................................................
Setting The Port Status Detection Timer120................................................................................................................................................................
Configuring The Alarm Resend Function121................................................................................................................................................................
Clearing Unused 16-bit Interface Indexes122................................................................................................................................................................
Displaying And Maintaining Device Management123................................................................................................................................................................
Support And Other Resources125................................................................................................................................................................
Conventions126................................................................................................................................................................
Index128................................................................................................................................................................
HP 10500 series Configuration Manual

HP 10500 series Configuration Manual (57 pages)

Brand: HP | Category: Switch | Size: 0.84 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Irf Overview5................................................................................................................................................................
Network Topologies6................................................................................................................................................................
Operating Mode7................................................................................................................................................................
Irf Member Id8................................................................................................................................................................
Irf Physical Port9................................................................................................................................................................
Irf Merge10................................................................................................................................................................
Irf Multi-active Detection11................................................................................................................................................................
Lacp Mad12................................................................................................................................................................
Configuring Irf15................................................................................................................................................................
Irf Link And Mpu Redundancy16................................................................................................................................................................
Multichassis Link Aggregation17................................................................................................................................................................
Setup And Configuration Task List18................................................................................................................................................................
Preconfiguring Irf Member Devices In Standalone Mode19................................................................................................................................................................
Binding Physical Ports To Irf Ports20................................................................................................................................................................
Connecting Physical Irf Ports21................................................................................................................................................................
Accessing The Irf Fabric22................................................................................................................................................................
Changing The Member Id Of A Device24................................................................................................................................................................
Adding Physical Ports To An Irf Port25................................................................................................................................................................
Enabling Irf Auto Merge26................................................................................................................................................................
Configuring Irf Link Load Sharing Mode27................................................................................................................................................................
Configuring Irf Bridge Mac Persistence28................................................................................................................................................................
Enabling Software Auto-update For System Software Image Synchronization29................................................................................................................................................................
Setting The Irf Link Down Report Delay30................................................................................................................................................................
Displaying And Maintaining An Irf Fabric36................................................................................................................................................................
Bfd Mad-enabled Irf Configuration Example For A Two-chassis Irf Fabric39................................................................................................................................................................
Configuration Example For Restoring Standalone Mode42................................................................................................................................................................
Four-chassis Irf Fabric Configuration Example44................................................................................................................................................................
Support And Other Resources49................................................................................................................................................................
Conventions50................................................................................................................................................................
Index52................................................................................................................................................................
HP 10500 series Specifications

HP 10500 series Specifications (42 pages)

Brand: HP | Category: Switch | Size: 6.65 MB
Table of contents
Product Overview1................................................................................................................................................................
Key Features2................................................................................................................................................................
Features And Benefits2................................................................................................................................................................
Technical Specifications23................................................................................................................................................................
HP 10500 series Datasheet

HP 10500 series Datasheet (20 pages)

Brand: HP | Category: Switch | Size: 1.93 MB
Table of contents
Product Overview1................................................................................................................................................................
Features And Benefits2................................................................................................................................................................
Specifications12................................................................................................................................................................
HP 10500 series Specifications

HP 10500 series Specifications (20 pages)

Brand: HP | Category: Switch | Size: 0.86 MB
Table of contents
Key Features1................................................................................................................................................................
Product Overview1................................................................................................................................................................
Features And Benefits2................................................................................................................................................................
Specifications11................................................................................................................................................................
HP 10500 series Datasheet

HP 10500 series Datasheet (8 pages)

HP 10500/11900/7500 20Gbps VPN irewall Module  
Brand: HP | Category: Firewall | Size: 0.38 MB
Table of contents
Key Features1................................................................................................................................................................
Product Overview1................................................................................................................................................................
Features And Benefits2................................................................................................................................................................
Specifications4................................................................................................................................................................

Share and save

Advertisement