HP 5120 EI Series Manuals

Manuals and User Guides for HP 5120 EI Series. We have 4 HP 5120 EI Series manuals available for free PDF download: Configuration Manual, Lan Switching Configuration Manual, Specification, Datasheet

HP 5120 EI Series Configuration Manual

HP 5120 EI Series Configuration Manual (304 pages)

Brand: HP | Category: Switch | Size: 2.56 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Aaa Configuration11................................................................................................................................................................
Radius12................................................................................................................................................................
Hwtacacs17................................................................................................................................................................
Domain-based User Management19................................................................................................................................................................
Radius Server Feature Of The Device20................................................................................................................................................................
Protocols And Standards21................................................................................................................................................................
Aaa Configuration Considerations And Task List24................................................................................................................................................................
Configuring Aaa Schemes26................................................................................................................................................................
Configuring User Group Attributes29................................................................................................................................................................
Configuring Radius Schemes30................................................................................................................................................................
Configuring Hwtacacs Schemes40................................................................................................................................................................
Configuring Aaa Methods For Isp Domains46................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain47................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain49................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain50................................................................................................................................................................
Tearing Down User Connections Forcibly52................................................................................................................................................................
Specifying A Radius Client53................................................................................................................................................................
Displaying And Maintaining Aaa54................................................................................................................................................................
Aaa For Telnet Users By Separate Servers55................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server57................................................................................................................................................................
Aaa For 802.1x Users By A Radius Server60................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server66................................................................................................................................................................
Radius Authentication And Authorization For Telnet Users By A Network Device69................................................................................................................................................................
Troubleshooting Aaa71................................................................................................................................................................
Troubleshooting Hwtacacs72................................................................................................................................................................
X Fundamentals73................................................................................................................................................................
X-related Protocols74................................................................................................................................................................
Eap Over Radius76................................................................................................................................................................
X Authentication Procedures77................................................................................................................................................................
Eap Relay78................................................................................................................................................................
Eap Termination79................................................................................................................................................................
X Configuration81................................................................................................................................................................
Configuring 802.1x84................................................................................................................................................................
Enabling 802.1x85................................................................................................................................................................
Setting The Port Authorization State86................................................................................................................................................................
Specifying An Access Control Method87................................................................................................................................................................
Setting The Maximum Number Of Authentication Request Attempts88................................................................................................................................................................
Configuring The Authentication Trigger Function89................................................................................................................................................................
Specifying A Mandatory Authentication Domain On A Port90................................................................................................................................................................
Enabling The Quiet Timer91................................................................................................................................................................
Configuring An 802.1x Guest Vlan92................................................................................................................................................................
Configuring An Auth-fail Vlan93................................................................................................................................................................
Displaying And Maintaining 802.1x94................................................................................................................................................................
X With Guest Vlan And Vlan Assignment Configuration Example96................................................................................................................................................................
X With Acl Assignment Configuration Example99................................................................................................................................................................
Ead Fast Deployment Configuration101................................................................................................................................................................
Displaying And Maintaining Ead Fast Deployment102................................................................................................................................................................
Ead Fast Deployment Configuration Example103................................................................................................................................................................
Troubleshooting Ead Fast Deployment105................................................................................................................................................................
Mac Authentication Configuration106................................................................................................................................................................
Mac Authentication Timers107................................................................................................................................................................
Mac Authentication Configuration Task List108................................................................................................................................................................
Specifying An Authentication Domain For Mac Authentication Users109................................................................................................................................................................
Configuring A Mac Authentication Guest Vlan110................................................................................................................................................................
Displaying And Maintaining Mac Authentication111................................................................................................................................................................
Radius-based Mac Authentication Configuration Example113................................................................................................................................................................
Acl Assignment Configuration Example115................................................................................................................................................................
Portal Configuration118................................................................................................................................................................
Portal System Using The Local Portal Server120................................................................................................................................................................
Portal Authentication Modes121................................................................................................................................................................
Portal Configuration Task List122................................................................................................................................................................
Configuration Prerequisites123................................................................................................................................................................
Specifying The Local Portal Server For Layer 2 Portal Authentication124................................................................................................................................................................
Configuring The Local Portal Server127................................................................................................................................................................
Enabling Layer 2 Portal Authentication128................................................................................................................................................................
Controlling Access Of Portal Users129................................................................................................................................................................
Specifying An Authentication Domain For Portal Users130................................................................................................................................................................
Enabling Support For Portal User Moving131................................................................................................................................................................
Specifying The Auth-fail Vlan For Portal Authentication132................................................................................................................................................................
Configuring Portal Detection Functions133................................................................................................................................................................
Portal Configuration Examples134................................................................................................................................................................
Configuration Procedures135................................................................................................................................................................
Troubleshooting Portal138................................................................................................................................................................
Triple Authentication Configuration140................................................................................................................................................................
Using Triple Authentication With Other Features141................................................................................................................................................................
Triple Authentication Configuration Examples142................................................................................................................................................................
Triple Authentication Supporting Vlan Assignment And Auth-fail Vlan Configuration Example145................................................................................................................................................................
Port Security Configuration150................................................................................................................................................................
Support For Guest Vlan And Auth-fail Vlan153................................................................................................................................................................
Enabling Port Security154................................................................................................................................................................
Setting The Port Security Mode155................................................................................................................................................................
Configuring Port Security Features156................................................................................................................................................................
Configuring Intrusion Protection157................................................................................................................................................................
Configuring Secure Mac Addresses158................................................................................................................................................................
Ignoring Authorization Information From The Server159................................................................................................................................................................
Port Security Configuration Examples160................................................................................................................................................................
Configuring The Userloginwithoui Mode162................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode166................................................................................................................................................................
Troubleshooting Port Security169................................................................................................................................................................
Cannot Configure Secure Mac Addresses170................................................................................................................................................................
User Profile Configuration171................................................................................................................................................................
Configuring A User Profile172................................................................................................................................................................
Displaying And Maintaining User Profile173................................................................................................................................................................
Password Control Configuration174................................................................................................................................................................
Password Control Configuration Task List176................................................................................................................................................................
Configuring Password Control177................................................................................................................................................................
Setting User Group Password Control Parameters178................................................................................................................................................................
Setting Local User Password Control Parameters179................................................................................................................................................................
Setting Super Password Control Parameters180................................................................................................................................................................
Password Control Configuration Example181................................................................................................................................................................
Habp Configuration184................................................................................................................................................................
Configuring Habp185................................................................................................................................................................
Displaying And Maintaining Habp186................................................................................................................................................................
Configuration Procedure187................................................................................................................................................................
Public Key Configuration189................................................................................................................................................................
Configuring The Local Asymmetric Key Pair190................................................................................................................................................................
Destroying An Asymmetric Key Pair191................................................................................................................................................................
Displaying And Maintaining Public Keys192................................................................................................................................................................
Importing A Peer Public Key From A Public Key File194................................................................................................................................................................
Pki Configuration197................................................................................................................................................................
Pki Architecture198................................................................................................................................................................
How Does Pki Work199................................................................................................................................................................
Configuring An Entity Dn200................................................................................................................................................................
Configuring A Pki Domain201................................................................................................................................................................
Submitting A Pki Certificate Request202................................................................................................................................................................
Submitting A Certificate Request In Auto Mode203................................................................................................................................................................
Retrieving A Certificate Manually204................................................................................................................................................................
Configuring Pki Certificate Verification205................................................................................................................................................................
Destroying A Local Rsa Key Pair206................................................................................................................................................................
Configuring An Access Control Policy207................................................................................................................................................................
Pki Configuration Examples208................................................................................................................................................................
Requesting A Certificate From A Ca Running Windows 2003 Server211................................................................................................................................................................
Configuring A Certificate Attribute-based Access Control Policy214................................................................................................................................................................
Troubleshooting Pki216................................................................................................................................................................
Failed To Retrieve Crls217................................................................................................................................................................
Ssh2.0 Configuration218................................................................................................................................................................
Configuring The Device As An Ssh Server220................................................................................................................................................................
Generating A Dsa Or Rsa Key Pair221................................................................................................................................................................
Configuring The User Interfaces For Ssh Clients222................................................................................................................................................................
Configuring An Ssh User223................................................................................................................................................................
Setting The Ssh Management Parameters224................................................................................................................................................................
Configuring The Device As An Ssh Client225................................................................................................................................................................
Configuring Whether First-time Authentication Is Supported226................................................................................................................................................................
Establishing A Connection Between The Ssh Client And Server227................................................................................................................................................................
Ssh Server Configuration Examples228................................................................................................................................................................
When Switch Acts As Server For Publickey Authentication230................................................................................................................................................................
Ssh Client Configuration Examples235................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication238................................................................................................................................................................
Sftp Configuration241................................................................................................................................................................
Configuring The Device An Sftp Client242................................................................................................................................................................
Working With Sftp Directories243................................................................................................................................................................
Displaying Help Information244................................................................................................................................................................
Sftp Client Configuration Example245................................................................................................................................................................
Sftp Server Configuration Example248................................................................................................................................................................
Ssl Configuration251................................................................................................................................................................
Ssl Protocol Stack252................................................................................................................................................................
Configuring An Ssl Client Policy255................................................................................................................................................................
Displaying And Maintaining Ssl256................................................................................................................................................................
Tcp Attack Protection Configuration258................................................................................................................................................................
Ip Source Guard Configuration259................................................................................................................................................................
Configuring Ipv4 Source Guard Binding261................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Binding Entry262................................................................................................................................................................
Configuring Ipv6 Source Guard Binding263................................................................................................................................................................
Configuring The Dynamic Ipv6 Source Guard Binding Function264................................................................................................................................................................
Displaying And Maintaining Ip Source Guard265................................................................................................................................................................
Ip Source Guard Configuration Examples266................................................................................................................................................................
Global Static Binding Excluded Port Configuration Example267................................................................................................................................................................
Dynamic Ipv4 Source Guard Binding By Dhcp Snooping Configuration Example269................................................................................................................................................................
Dynamic Ipv4 Source Guard Binding By Dhcp Relay Configuration Example270................................................................................................................................................................
Static Ipv6 Source Guard Binding Entry Configuration Example271................................................................................................................................................................
Dynamic Ipv6 Source Guard Binding By Dhcpv6 Snooping Configuration Example272................................................................................................................................................................
Dynamic Ipv6 Source Guard Binding By Nd Snooping Configuration Example273................................................................................................................................................................
Troubleshooting Ip Source Guard274................................................................................................................................................................
Arp Attack Protection Configuration275................................................................................................................................................................
Configuring Arp Defense Against Ip Packet Attacks276................................................................................................................................................................
Enabling Arp Black Hole Routing277................................................................................................................................................................
Configuring Source Mac Address Based Arp Attack Detection278................................................................................................................................................................
Displaying And Maintaining Source Mac Address Based Arp Attack Detection279................................................................................................................................................................
Configuring Arp Active Acknowledgement280................................................................................................................................................................
Security Entries/oui Mac Addresses281................................................................................................................................................................
Configuring Arp Detection Based On Specified Objects282................................................................................................................................................................
Configuring Arp Restricted Forwarding283................................................................................................................................................................
Arp Detection Configuration Example Ii285................................................................................................................................................................
Arp Restricted Forwarding Configuration Example286................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp288................................................................................................................................................................
Configuring Arp Gateway Protection289................................................................................................................................................................
Arp Gateway Protection Configuration Example290................................................................................................................................................................
Nd Attack Defense Configuration293................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets294................................................................................................................................................................
Configuring Nd Detection295................................................................................................................................................................
Nd Detection Configuration Example296................................................................................................................................................................
Support And Other Resources298................................................................................................................................................................
Conventions299................................................................................................................................................................
Index301................................................................................................................................................................

Advertising

HP 5120 EI Series Lan Switching Configuration Manual

HP 5120 EI Series Lan Switching Configuration Manual (235 pages)

Brand: HP | Category: Network Router | Size: 2.45 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Ethernet Interfaces10................................................................................................................................................................
Configuring Basic Settings Of An Ethernet Interface11................................................................................................................................................................
Shutting Down An Ethernet Interface12................................................................................................................................................................
Configuring Flow Control On An Ethernet Interface13................................................................................................................................................................
Configuring Link Change Suppression On An Ethernet Interface14................................................................................................................................................................
Configuring Link-down Event Suppression15................................................................................................................................................................
Configuration Restrictions And Guidelines16................................................................................................................................................................
Configuring A Port Group17................................................................................................................................................................
Configuring Storm Suppression18................................................................................................................................................................
Setting The Statistics Polling Interval19................................................................................................................................................................
Configuration Procedure21................................................................................................................................................................
Enabling Bridging On An Ethernet Interface22................................................................................................................................................................
Testing The Cable Connection Of An Ethernet Interface23................................................................................................................................................................
Displaying And Maintaining An Ethernet Interface25................................................................................................................................................................
Configuring Loopback And Null Interfaces26................................................................................................................................................................
Configuring A Null Interface27................................................................................................................................................................
Bulk Configuring Interfaces29................................................................................................................................................................
Configuring The Mac Address Table30................................................................................................................................................................
Types Of Mac Address Table Entries31................................................................................................................................................................
Configuring A Static Or Dynamic Mac Address Table Entry In System View32................................................................................................................................................................
Disabling Global Mac Address Learning33................................................................................................................................................................
Disabling Mac Entry Aging Timer Refresh Based On Destination Mac Address34................................................................................................................................................................
Configuring The Mac Learning Limit On Ports35................................................................................................................................................................
Enabling Mac Address Roaming36................................................................................................................................................................
Enabling Mac Address Migration Log Notifying37................................................................................................................................................................
Displaying And Maintaining Mac Address Tables38................................................................................................................................................................
Configuring Mac Information40................................................................................................................................................................
Configuring Mac Information Mode41................................................................................................................................................................
Mac Information Configuration Example42................................................................................................................................................................
Configuring Ethernet Link Aggregation43................................................................................................................................................................
Operational Key44................................................................................................................................................................
Aggregating Links In Static Mode46................................................................................................................................................................
Aggregating Links In Dynamic Mode47................................................................................................................................................................
Load-sharing Criteria For Link Aggregation Groups49................................................................................................................................................................
Configuring An Aggregation Group50................................................................................................................................................................
Configuring A Dynamic Aggregation Group51................................................................................................................................................................
Configuring An Aggregate Interface52................................................................................................................................................................
Limiting The Number Of Selected Ports For An Aggregation Group53................................................................................................................................................................
Shutting Down An Aggregate Interface54................................................................................................................................................................
Configuring Load Sharing For Link Aggregation Groups55................................................................................................................................................................
Enabling Local-first Load Sharing For Link Aggregation56................................................................................................................................................................
Enabling Link-aggregation Traffic Redirection57................................................................................................................................................................
Displaying And Maintaining Ethernet Link Aggregation58................................................................................................................................................................
Ethernet Link Aggregation Configuration Examples59................................................................................................................................................................
Layer 2 Dynamic Aggregation Configuration Example61................................................................................................................................................................
Configuring Port Isolation64................................................................................................................................................................
Port Isolation Configuration Example65................................................................................................................................................................
Configuring Spanning Tree Protocols66................................................................................................................................................................
Basic Concepts In Stp67................................................................................................................................................................
Calculation Process Of The Stp Algorithm68................................................................................................................................................................
Rstp73................................................................................................................................................................
Mstp Basic Concepts74................................................................................................................................................................
How Mstp Works78................................................................................................................................................................
Spanning Tree Configuration Task List79................................................................................................................................................................
Rstp Configuration Task List80................................................................................................................................................................
Pvst Configuration Task List81................................................................................................................................................................
Mstp Configuration Task List82................................................................................................................................................................
Setting The Spanning Tree Mode83................................................................................................................................................................
Configuring An Mst Region84................................................................................................................................................................
Configuring The Root Bridge Or A Secondary Root Bridge85................................................................................................................................................................
Configuring The Current Device As A Secondary Root Bridge Of A Specific Spanning Tree86................................................................................................................................................................
Configuring The Network Diameter Of A Switched Network87................................................................................................................................................................
Configuring The Timeout Factor89................................................................................................................................................................
Configuring Edge Ports90................................................................................................................................................................
Specifying A Standard For The Device To Use When It Calculates The Default Path Cost91................................................................................................................................................................
Configuring Path Costs Of Ports92................................................................................................................................................................
Configuration Example93................................................................................................................................................................
Configuring The Port Link Type94................................................................................................................................................................
Enabling Outputting Port State Transition Information95................................................................................................................................................................
Enabling The Spanning Tree Feature96................................................................................................................................................................
Performing Mcheck97................................................................................................................................................................
Configuring Digest Snooping98................................................................................................................................................................
Digest Snooping Configuration Example99................................................................................................................................................................
Configuring No Agreement Check100................................................................................................................................................................
Configuration Prerequisites101................................................................................................................................................................
No Agreement Check Configuration Example102................................................................................................................................................................
Enabling Root Guard104................................................................................................................................................................
Enabling Loop Guard105................................................................................................................................................................
Enabling Tc-bpdu Guard106................................................................................................................................................................
Displaying And Maintaining The Spanning Tree107................................................................................................................................................................
Pvst Configuration Example111................................................................................................................................................................
Configuring Bpdu Tunneling115................................................................................................................................................................
Bpdu Tunneling Implementation116................................................................................................................................................................
Enabling Bpdu Tunneling117................................................................................................................................................................
Bpdu Tunneling Configuration Examples119................................................................................................................................................................
Bpdu Tunneling For Pvst Configuration Example120................................................................................................................................................................
Configuring Vlans122................................................................................................................................................................
Vlan Types123................................................................................................................................................................
Protocols And Standards124................................................................................................................................................................
Configuring Basic Settings Of A Vlan Interface125................................................................................................................................................................
Configuring Port-based Vlans127................................................................................................................................................................
Assigning An Access Port To A Vlan128................................................................................................................................................................
Assigning A Trunk Port To A Vlan129................................................................................................................................................................
Assigning A Hybrid Port To A Vlan130................................................................................................................................................................
Port-based Vlan Configuration Example131................................................................................................................................................................
Configuring Mac-based Vlans133................................................................................................................................................................
Mac-based Vlan Configuration Example138................................................................................................................................................................
Configuring Protocol-based Vlans140................................................................................................................................................................
Protocol-based Vlan Configuration Example142................................................................................................................................................................
Configuring Ip Subnet-based Vlans144................................................................................................................................................................
Ip Subnet-based Vlan Configuration Example145................................................................................................................................................................
Displaying And Maintaining Vlan147................................................................................................................................................................
Configuring An Isolate-user-vlan149................................................................................................................................................................
Displaying And Maintaining Isolate-user-vlan151................................................................................................................................................................
Isolate-user-vlan Configuration Example152................................................................................................................................................................
Verifying The Configuration153................................................................................................................................................................
Configuring A Voice Vlan155................................................................................................................................................................
Automatically Identifying Ip Phones Through Lldp156................................................................................................................................................................
Ip Phone Access Methods157................................................................................................................................................................
Security Mode And Normal Mode Of Voice Vlans159................................................................................................................................................................
Configuring A Port To Operate In Automatic Voice Vlan Assignment Mode161................................................................................................................................................................
Configuring A Port To Operate In Manual Voice Vlan Assignment Mode162................................................................................................................................................................
Enabling Lldp To Automatically Discover Ip Phones163................................................................................................................................................................
Dynamically Advertising Server-assigned Vlans Through Lldp166................................................................................................................................................................
Voice Vlan Configuration Examples167................................................................................................................................................................
Manual Voice Vlan Assignment Mode Configuration Example169................................................................................................................................................................
Configuring Gvrp171................................................................................................................................................................
Gvrp174................................................................................................................................................................
Configuring Gvrp Functions175................................................................................................................................................................
Configuring The Garp Timers176................................................................................................................................................................
Displaying And Maintaining Gvrp177................................................................................................................................................................
Gvrp Fixed Registration Mode Configuration Example179................................................................................................................................................................
Gvrp Forbidden Registration Mode Configuration Example180................................................................................................................................................................
Configuring Qinq183................................................................................................................................................................
Qinq Frame Structure184................................................................................................................................................................
Implementations Of Qinq185................................................................................................................................................................
Configuring Basic Qinq187................................................................................................................................................................
Configuring Selective Qinq188................................................................................................................................................................
Configuring An Inner-outer Vlan 802.1p Priority Mapping189................................................................................................................................................................
Configuring The Tpid Value In Vlan Tags190................................................................................................................................................................
Selective Qinq Configuration Example193................................................................................................................................................................
Configuring Lldp196................................................................................................................................................................
How Lldp Works200................................................................................................................................................................
Setting The Lldp Operating Mode202................................................................................................................................................................
Configuring The Advertisable Tlvs203................................................................................................................................................................
Setting Other Lldp Parameters204................................................................................................................................................................
Setting An Encapsulation Format For Lldpdus205................................................................................................................................................................
Configuring Lldp Trapping207................................................................................................................................................................
Displaying And Maintaining Lldp208................................................................................................................................................................
Verify The Configuration209................................................................................................................................................................
Cdp-compatible Lldp Configuration Example211................................................................................................................................................................
Configuring Mvrp213................................................................................................................................................................
Mvrp Registration Modes215................................................................................................................................................................
Configuring Mrp Timers218................................................................................................................................................................
Enabling Gvrp Compatibility219................................................................................................................................................................
Configuration Example For Mvrp In Normal Registration Mode220................................................................................................................................................................
Support And Other Resources230................................................................................................................................................................
Conventions231................................................................................................................................................................
Index233................................................................................................................................................................
HP 5120 EI Series Specification

HP 5120 EI Series Specification (51 pages)

HP 5120 EI Switch Series  
Brand: HP | Category: Switch | Size: 1.55 MB

Advertising

HP 5120 EI Series Datasheet

HP 5120 EI Series Datasheet (16 pages)

Brand: HP | Category: Switch | Size: 0.45 MB
Table of contents
Product Overview1................................................................................................................................................................
Features And Benefits2................................................................................................................................................................
Specifications7................................................................................................................................................................

Share and save

Advertising