HP 5500 HI Series Manuals

Manuals and User Guides for HP 5500 HI Series. We have 4 HP 5500 HI Series manuals available for free PDF download: Configuration Manual, Installation Manual, Quickspecs

HP 5500 HI Series Configuration Manual

HP 5500 HI Series Configuration Manual (444 pages)

Security  
Brand: HP | Category: Switch | Size: 4.07 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Configuring Aaa14................................................................................................................................................................
Radius15................................................................................................................................................................
Hwtacacs20................................................................................................................................................................
Domain-based User Management22................................................................................................................................................................
Radius Server Feature Of The Switch23................................................................................................................................................................
Aaa For Mpls L3vpns24................................................................................................................................................................
Radius Attributes25................................................................................................................................................................
Fips Compliance28................................................................................................................................................................
Configuring Aaa Schemes29................................................................................................................................................................
Configuring Radius Schemes34................................................................................................................................................................
Configuring Hwtacacs Schemes47................................................................................................................................................................
Configuring Aaa Methods For Isp Domains54................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain56................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain57................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain59................................................................................................................................................................
Tearing Down User Connections60................................................................................................................................................................
Specifying The Device Id Used In Stateful Failover Mode61................................................................................................................................................................
Specifying A Radius Client62................................................................................................................................................................
Displaying And Maintaining Aaa63................................................................................................................................................................
Aaa For Telnet Users By Separate Servers64................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server66................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server69................................................................................................................................................................
Radius Authentication And Authorization For Telnet Users By A Switch73................................................................................................................................................................
Troubleshooting Aaa75................................................................................................................................................................
Troubleshooting Hwtacacs76................................................................................................................................................................
X Overview77................................................................................................................................................................
X-related Protocols78................................................................................................................................................................
Eap Over Radius80................................................................................................................................................................
X Authentication Procedures81................................................................................................................................................................
Eap Relay82................................................................................................................................................................
Eap Termination83................................................................................................................................................................
Configuring 802.1x85................................................................................................................................................................
Configuration Prerequisites90................................................................................................................................................................
X Configuration Task List91................................................................................................................................................................
Configuration Procedure92................................................................................................................................................................
Setting The Port Authorization State93................................................................................................................................................................
Setting The Maximum Number Of Concurrent 802.1x Users On A Port94................................................................................................................................................................
Setting The 802.1x Authentication Timeout Timers95................................................................................................................................................................
Enabling The Periodic Online User Re-authentication Function98................................................................................................................................................................
Configuring A Port To Send Eapol Frames Untagged99................................................................................................................................................................
Configuring An 802.1x Guest Vlan100................................................................................................................................................................
Displaying And Maintaining 802.1x104................................................................................................................................................................
Verifying The Configuration106................................................................................................................................................................
X With Guest Vlan And Vlan Assignment Configuration Example107................................................................................................................................................................
Configuring Ead Fast Deployment112................................................................................................................................................................
Configuring The Redirect Url113................................................................................................................................................................
Ead Fast Deployment Configuration Example114................................................................................................................................................................
Troubleshooting Ead Fast Deployment116................................................................................................................................................................
Configuring Mac Authentication117................................................................................................................................................................
Mac Authentication Timers118................................................................................................................................................................
Critical Vlan119................................................................................................................................................................
Configuring Mac Authentication Globally120................................................................................................................................................................
Specifying A Mac Authentication Domain121................................................................................................................................................................
Configuring A Mac Authentication Critical Vlan122................................................................................................................................................................
Configuring Mac Authentication Delay123................................................................................................................................................................
Displaying And Maintaining Mac Authentication124................................................................................................................................................................
Radius-based Mac Authentication Configuration Example126................................................................................................................................................................
Acl Assignment Configuration Example128................................................................................................................................................................
Configuring Portal Authentication131................................................................................................................................................................
Portal System Using The Local Portal Server133................................................................................................................................................................
Portal Authentication Modes134................................................................................................................................................................
Portal Support For Eap135................................................................................................................................................................
Layer 2 Portal Authentication Process136................................................................................................................................................................
Layer 3 Portal Authentication Process137................................................................................................................................................................
Portal Stateful Failover140................................................................................................................................................................
Portal Authentication Across Vpns142................................................................................................................................................................
Specifying The Portal Server144................................................................................................................................................................
Specifying A Portal Server For Layer 3 Portal Authentication145................................................................................................................................................................
Configuring The Local Portal Server148................................................................................................................................................................
Enabling Portal Authentication149................................................................................................................................................................
Controlling Access Of Portal Users150................................................................................................................................................................
Configuring An Authentication Source Subnet151................................................................................................................................................................
Setting The Maximum Number Of Online Portal Users152................................................................................................................................................................
Configuring Layer 2 Portal Authentication To Support Web Proxy153................................................................................................................................................................
Specifying An Auth-fail Vlan For Portal Authentication154................................................................................................................................................................
Configuring Radius Related Attributes155................................................................................................................................................................
Specifying A Source Ip Address For Outgoing Portal Packets156................................................................................................................................................................
Specifying An Auto Redirection Url For Authenticated Portal Users158................................................................................................................................................................
Configuring Portal Detection Functions159................................................................................................................................................................
Configuring Portal User Information Synchronization161................................................................................................................................................................
Displaying And Maintaining Portal162................................................................................................................................................................
Portal Configuration Examples163................................................................................................................................................................
Configuring Re-dhcp Portal Authentication167................................................................................................................................................................
Configuring Cross-subnet Portal Authentication169................................................................................................................................................................
Configuring Direct Portal Authentication With Extended Functions171................................................................................................................................................................
Configuring Re-dhcp Portal Authentication With Extended Functions173................................................................................................................................................................
Configuring Cross-subnet Portal Authentication With Extended Functions175................................................................................................................................................................
Configuring Portal Stateful Failover177................................................................................................................................................................
Configuring Portal Server Detection And Portal User Information Synchronization185................................................................................................................................................................
Cross-subnet Portal Authentication Across Vpns190................................................................................................................................................................
Configuring Layer 2 Portal Authentication192................................................................................................................................................................
Troubleshooting Portal196................................................................................................................................................................
Configuring Triple Authentication198................................................................................................................................................................
Using Triple Authentication With Other Features199................................................................................................................................................................
Triple Authentication Configuration Examples200................................................................................................................................................................
Triple Authentication Supporting Vlan Assignment And Auth-fail Vlan Configuration Example202................................................................................................................................................................
Configuring Port Security208................................................................................................................................................................
Working With Guest Vlan And Auth-fail Vlan211................................................................................................................................................................
Enabling Port Security212................................................................................................................................................................
Setting The Port Security Mode213................................................................................................................................................................
Configuring Port Security Features214................................................................................................................................................................
Enabling Port Security Traps215................................................................................................................................................................
Ignoring Authorization Information217................................................................................................................................................................
Port Security Configuration Examples218................................................................................................................................................................
Configuring The Userloginwithoui Mode220................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode225................................................................................................................................................................
Troubleshooting Port Security227................................................................................................................................................................
Cannot Configure Secure Mac Addresses228................................................................................................................................................................
Configuring A User Profile230................................................................................................................................................................
Applying A Qos Policy231................................................................................................................................................................
Displaying And Maintaining User Profiles232................................................................................................................................................................
Configuring Password Control233................................................................................................................................................................
Password Control Configuration Task List236................................................................................................................................................................
Setting Global Password Control Parameters237................................................................................................................................................................
Setting User Group Password Control Parameters238................................................................................................................................................................
Setting Local User Password Control Parameters239................................................................................................................................................................
Setting Super Password Control Parameters240................................................................................................................................................................
Password Control Configuration Example241................................................................................................................................................................
Configuring Habp244................................................................................................................................................................
Displaying And Maintaining Habp246................................................................................................................................................................
Managing Public Keys249................................................................................................................................................................
Configuration Task List250................................................................................................................................................................
Displaying Or Exporting The Local Host Public Key251................................................................................................................................................................
Destroying A Local Asymmetric Key Pair252................................................................................................................................................................
Displaying And Maintaining Public Keys253................................................................................................................................................................
Public Key Configuration Examples254................................................................................................................................................................
Importing A Peer Public Key From A Public Key File256................................................................................................................................................................
Configuring Pki259................................................................................................................................................................
Pki Architecture260................................................................................................................................................................
Pki Applications261................................................................................................................................................................
Configuring An Entity Dn262................................................................................................................................................................
Configuring A Pki Domain263................................................................................................................................................................
Configuration Guidelines264................................................................................................................................................................
Submitting A Certificate Request In Auto Mode265................................................................................................................................................................
Retrieving A Certificate Manually266................................................................................................................................................................
Configuring Crl-checking-disabled Pki Certificate Verification268................................................................................................................................................................
Deleting A Certificate269................................................................................................................................................................
Pki Configuration Examples270................................................................................................................................................................
Certificate Request From A Windows 2003 Ca Server273................................................................................................................................................................
Certificate Attribute Access Control Policy Configuration Example276................................................................................................................................................................
Troubleshooting Pki278................................................................................................................................................................
Failed To Retrieve Crls279................................................................................................................................................................
Configuring Ipsec280................................................................................................................................................................
Ipsec For Ipv6 Routing Protocols283................................................................................................................................................................
Acl-based Ipsec Configuration Task List284................................................................................................................................................................
Configuring An Ipsec Proposal286................................................................................................................................................................
Configuring An Ipsec Policy287................................................................................................................................................................
Applying An Ipsec Policy Group To An Interface291................................................................................................................................................................
Enabling Acl Checking Of De-encapsulated Ipsec Packets292................................................................................................................................................................
Configuring Packet Information Pre-extraction293................................................................................................................................................................
Displaying And Maintaining Ipsec294................................................................................................................................................................
Ipsec For Ripng Configuration Example297................................................................................................................................................................
Configuring Ike301................................................................................................................................................................
Ike Operation302................................................................................................................................................................
Relationship Between Ike And Ipsec303................................................................................................................................................................
Configuring A Name For The Local Security Gateway304................................................................................................................................................................
Configuring An Ike Peer305................................................................................................................................................................
Setting Keepalive Timers307................................................................................................................................................................
Configuring A Dpd Detector308................................................................................................................................................................
Displaying And Maintaining Ike309................................................................................................................................................................
Troubleshooting Ike312................................................................................................................................................................
Failing To Establish An Ipsec Tunnel313................................................................................................................................................................
Configuring Ssh2.0314................................................................................................................................................................
Ssh Connection Across Vpns316................................................................................................................................................................
Enabling The Ssh Server Function318................................................................................................................................................................
Configuring A Client Public Key319................................................................................................................................................................
Configuring An Ssh User320................................................................................................................................................................
Setting The Ssh Management Parameters321................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Ssh Server322................................................................................................................................................................
Specifying A Source Ip Address/interface For The Ssh Client323................................................................................................................................................................
Establishing A Connection Between The Ssh Client And Server324................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Ssh Client325................................................................................................................................................................
Ssh Server Configuration Examples326................................................................................................................................................................
When The Switch Acts As A Server For Publickey Authentication328................................................................................................................................................................
Ssh Client Configuration Examples333................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication336................................................................................................................................................................
Configuring Sftp339................................................................................................................................................................
Configuring The Sftp Connection Idle Timeout Period340................................................................................................................................................................
Working With Sftp Directories341................................................................................................................................................................
Working With Sftp Files342................................................................................................................................................................
Displaying Help Information343................................................................................................................................................................
Sftp Client Configuration Example344................................................................................................................................................................
Sftp Server Configuration Example347................................................................................................................................................................
Configuring Scp350................................................................................................................................................................
Configuring The Switch As The Scp Client351................................................................................................................................................................
Scp Client Configuration Example352................................................................................................................................................................
Scp Server Configuration Example353................................................................................................................................................................
Configuring Ssl355................................................................................................................................................................
Ssl Server Policy Configuration Example358................................................................................................................................................................
Configuring An Ssl Client Policy360................................................................................................................................................................
Troubleshooting Ssl361................................................................................................................................................................
Configuring Tcp Attack Protection362................................................................................................................................................................
Configuring Ip Source Guard364................................................................................................................................................................
Dynamic Ip Source Guard Binding Entries365................................................................................................................................................................
Configuring The Ipv4 Source Guard Function366................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Entry367................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Binding Entries368................................................................................................................................................................
Configuring The Ipv6 Source Guard Function369................................................................................................................................................................
Configuring A Static Ipv6 Source Guard Entry370................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Source Guard Entries371................................................................................................................................................................
Ip Source Guard Configuration Examples372................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Snooping Configuration Example374................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Relay Configuration Example375................................................................................................................................................................
Static Ipv6 Source Guard Configuration Example376................................................................................................................................................................
Dynamic Ipv6 Source Guard Using Dhcpv6 Snooping Configuration Example377................................................................................................................................................................
Dynamic Ipv6 Source Guard Using Nd Snooping Configuration Example378................................................................................................................................................................
Global Static Ip Source Guard Configuration Example379................................................................................................................................................................
Troubleshooting Ip Source Guard381................................................................................................................................................................
Configuring Arp Attack Protection382................................................................................................................................................................
Configuring Arp Defense Against Ip Packet Attacks383................................................................................................................................................................
Enabling Arp Black Hole Routing384................................................................................................................................................................
Configuring Arp Packet Rate Limit385................................................................................................................................................................
Configuring Source Mac Address Based Arp Attack Detection386................................................................................................................................................................
Displaying And Maintaining Source Mac Address Based Arp Attack Detection387................................................................................................................................................................
Configuring Arp Packet Source Mac Address Consistency Check389................................................................................................................................................................
Configuring Arp Detection390................................................................................................................................................................
Configuring Arp Packet Validity Check391................................................................................................................................................................
Configuring Arp Restricted Forwarding392................................................................................................................................................................
Displaying And Maintaining Arp Detection393................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example394................................................................................................................................................................
Arp Restricted Forwarding Configuration Example396................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp397................................................................................................................................................................
Configuring Arp Filtering400................................................................................................................................................................
Configuring Nd Attack Defense402................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets403................................................................................................................................................................
Nd Detection Configuration Example405................................................................................................................................................................
Configuring Urpf407................................................................................................................................................................
Network Application410................................................................................................................................................................
Configuring Mff412................................................................................................................................................................
Basic Concepts413................................................................................................................................................................
Working Mechanism414................................................................................................................................................................
Enabling Mff415................................................................................................................................................................
Displaying And Maintaining Mff416................................................................................................................................................................
Auto-mode Mff Configuration Example In A Ring Network418................................................................................................................................................................
Manual-mode Mff Configuration Example In A Tree Network420................................................................................................................................................................
Manual-mode Mff Configuration Example In A Ring Network421................................................................................................................................................................
Configuring Savi423................................................................................................................................................................
Savi Configuration In Dhcpv6-only Address Assignment Scenario424................................................................................................................................................................
Packet Check Principles425................................................................................................................................................................
Savi Configuration In Slaac-only Address Assignment Scenario426................................................................................................................................................................
Savi Configuration In Dhcpv6+slaac Address Assignment Scenario428................................................................................................................................................................
Configuring Blacklist431................................................................................................................................................................
Blacklist Configuration Example432................................................................................................................................................................
Configuring Fips434................................................................................................................................................................
Triggering A Self-test436................................................................................................................................................................
Support And Other Resources439................................................................................................................................................................
Conventions440................................................................................................................................................................
Index442................................................................................................................................................................

Advertising

HP 5500 HI Series Configuration Manual

HP 5500 HI Series Configuration Manual (135 pages)

HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration Guide-R2103  
Brand: HP | Category: Server | Size: 1.56 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Using The Cli7................................................................................................................................................................
Logging In To The Cli7................................................................................................................................................................
Command Conventions7................................................................................................................................................................
Using The Undo Form Of A Command8................................................................................................................................................................
Cli Views8................................................................................................................................................................
Entering System View From User View9................................................................................................................................................................
Returning To The Upper-level View From Any View9................................................................................................................................................................
Returning To User View From Any Other View9................................................................................................................................................................
Accessing The Cli Online Help10................................................................................................................................................................
Entering A Command11................................................................................................................................................................
Editing A Command Line11................................................................................................................................................................
Entering A String Type Value For An Argument11................................................................................................................................................................
Abbreviating Commands11................................................................................................................................................................
Configuring And Using Command Keyword Aliases12................................................................................................................................................................
Configuring And Using Hotkeys12................................................................................................................................................................
Enabling Redisplaying Entered-but-not-submitted Commands14................................................................................................................................................................
Understanding Command-line Error Messages14................................................................................................................................................................
Using The Command History Function15................................................................................................................................................................
Viewing History Commands15................................................................................................................................................................
Setting The Command History Buffer Size For User Interfaces15................................................................................................................................................................
Controlling The Cli Output16................................................................................................................................................................
Pausing Between Screens Of Output16................................................................................................................................................................
Filtering The Output From A Display Command16................................................................................................................................................................
Configuring User Privilege And Command Levels19................................................................................................................................................................
Configuring A User Privilege Level19................................................................................................................................................................
Switching The User Privilege Level23................................................................................................................................................................
Changing The Level Of A Command25................................................................................................................................................................
Saving The Running Configuration25................................................................................................................................................................
Displaying And Maintaining Cli26................................................................................................................................................................
Login Overview27................................................................................................................................................................
Login Methods At A Glance27................................................................................................................................................................
User Interfaces28................................................................................................................................................................
User Interface Assignment28................................................................................................................................................................
User Interface Identification28................................................................................................................................................................
Logging In Through The Console Port For The First Time29................................................................................................................................................................
Configuring Console Login Control Settings31................................................................................................................................................................
Configuring None Authentication For Console Login32................................................................................................................................................................
Configuring Password Authentication For Console Login33................................................................................................................................................................
Configuring Scheme Authentication For Console Login34................................................................................................................................................................
Configuring Common Console Login Settings (optional)36................................................................................................................................................................
Logging In Through Telnet38................................................................................................................................................................
Configuring None Authentication For Telnet Login39................................................................................................................................................................
Configuring Password Authentication For Telnet Login40................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login41................................................................................................................................................................
Configuring Common Settings For Vty User Interfaces (optional)43................................................................................................................................................................
Using The Device To Log In To A Telnet Server45................................................................................................................................................................
Setting The Dscp Value For Ip To Use For Outgoing Telnet Packets46................................................................................................................................................................
Logging In Through Ssh46................................................................................................................................................................
Configuring The Ssh Server On The Device46................................................................................................................................................................
Using The Device As An Ssh Client To Log In To The Ssh Server49................................................................................................................................................................
Modem Dial-in Through The Console Port49................................................................................................................................................................
Setting Up The Configuration Environment50................................................................................................................................................................
Configuring None Authentication For Modem Dial-in53................................................................................................................................................................
Configuring Password Authentication For Modem Dial-in53................................................................................................................................................................
Configuring Scheme Authentication For Modem Dial-in54................................................................................................................................................................
Configuring Common Settings For Modem Dial-in (optional)57................................................................................................................................................................
Displaying And Maintaining Cli Login59................................................................................................................................................................
Logging In To The Web Interface60................................................................................................................................................................
Configuring Http Login60................................................................................................................................................................
Configuring Https Login61................................................................................................................................................................
Displaying And Maintaining Web Login63................................................................................................................................................................
Http Login Configuration Example63................................................................................................................................................................
Network Requirements63................................................................................................................................................................
Configuration Procedure64................................................................................................................................................................
Https Login Configuration Example65................................................................................................................................................................
Logging In Through Snmp68................................................................................................................................................................
Configuring Snmp Login68................................................................................................................................................................
Prerequisites68................................................................................................................................................................
Configuring Snmpv3 Settings68................................................................................................................................................................
Configuring Snmpv1 Or Snmpv2c Settings69................................................................................................................................................................
Nms Login Example70................................................................................................................................................................
Controlling User Logins71................................................................................................................................................................
Controlling Telnet Logins71................................................................................................................................................................
Configuring Source Ip-based Telnet Login Control71................................................................................................................................................................
Configuring Source/destination Ip-based Telnet Login Control71................................................................................................................................................................
Configuring Source Mac-based Telnet Login Control72................................................................................................................................................................
Telnet Login Control Configuration Example72................................................................................................................................................................
Configuring Source Ip-based Snmp Login Control73................................................................................................................................................................
Snmp Login Control Configuration Example74................................................................................................................................................................
Configuring Web Login Control75................................................................................................................................................................
Configuring Source Ip-based Web Login Control75................................................................................................................................................................
Logging Off Online Web Users75................................................................................................................................................................
Web Login Control Configuration Example76................................................................................................................................................................
Configuring Ftp77................................................................................................................................................................
Using The Device As An Ftp Client77................................................................................................................................................................
Establishing An Ftp Connection77................................................................................................................................................................
Setting The Dscp Value For Ip To Use For Outgoing Ftp Packets78................................................................................................................................................................
Managing Directories On The Ftp Server79................................................................................................................................................................
Working With The Files On The Ftp Server79................................................................................................................................................................
Switching To Another User Account80................................................................................................................................................................
Maintaining And Troubleshooting The Ftp Connection80................................................................................................................................................................
Terminating The Ftp Connection80................................................................................................................................................................
Ftp Client Configuration Example81................................................................................................................................................................
Using The Device As An Ftp Server82................................................................................................................................................................
Configuring Basic Parameters82................................................................................................................................................................
Configuring Authentication And Authorization83................................................................................................................................................................
Ftp Server Configuration Example84................................................................................................................................................................
Displaying And Maintaining Ftp86................................................................................................................................................................
Configuring Tftp87................................................................................................................................................................
Using The Device As A Tftp Client87................................................................................................................................................................
Displaying And Maintaining The Tftp Client88................................................................................................................................................................
Tftp Client Configuration Example88................................................................................................................................................................
Managing The File System90................................................................................................................................................................
Storage Medium Naming Rules90................................................................................................................................................................
File Name Formats90................................................................................................................................................................
Managing Files91................................................................................................................................................................
Displaying File Information91................................................................................................................................................................
Displaying File Contents91................................................................................................................................................................
Renaming A File91................................................................................................................................................................
Copying A File91................................................................................................................................................................
Moving A File91................................................................................................................................................................
Deleting/restoring A File92................................................................................................................................................................
Emptying The Recycle Bin92................................................................................................................................................................
Managing Directories92................................................................................................................................................................
Displaying Directory Information92................................................................................................................................................................
Displaying The Current Working Directory92................................................................................................................................................................
Changing The Current Working Directory93................................................................................................................................................................
Creating A Directory93................................................................................................................................................................
Removing A Directory93................................................................................................................................................................
Managing Storage Medium Space93................................................................................................................................................................
Displaying And Maintaining The Nand Flash Memory94................................................................................................................................................................
Performing Batch Operations94................................................................................................................................................................
Setting The File System Operation Mode95................................................................................................................................................................
File System Management Examples95................................................................................................................................................................
Managing Configuration Files96................................................................................................................................................................
Overview96................................................................................................................................................................
Configuration Types96................................................................................................................................................................
Configuration File Format And Content97................................................................................................................................................................
Next-startup Configuration File Redundancy97................................................................................................................................................................
Startup With A Configuration File97................................................................................................................................................................
Enabling Configuration File Auto-update98................................................................................................................................................................
Saving Configuration In Different Approaches98................................................................................................................................................................
Configuring Configuration Rollback99................................................................................................................................................................
Configuration Task List99................................................................................................................................................................
Configuring Configuration Archive Parameters100................................................................................................................................................................
Enabling Automatic Configuration Archiving101................................................................................................................................................................
Manually Archiving Running Configuration102................................................................................................................................................................
Performing Configuration Rollback102................................................................................................................................................................
Specifying A Configuration File For The Next Startup103................................................................................................................................................................
Backing Up The Next-startup Configuration File To A Tftp Server103................................................................................................................................................................
Deleting The Next-startup Configuration File103................................................................................................................................................................
Restoring The Next-startup Configuration File From A Tftp Server104................................................................................................................................................................
Displaying And Maintaining A Configuration File104................................................................................................................................................................
Upgrading Software106................................................................................................................................................................
Software Upgrade Methods106................................................................................................................................................................
Upgrading Bootware107................................................................................................................................................................
Upgrading The Entire System Software107................................................................................................................................................................
Installing Patches108................................................................................................................................................................
Displaying And Maintaining Software Upgrade109................................................................................................................................................................
Software Upgrade Examples109................................................................................................................................................................
Managing The Device112................................................................................................................................................................
Configuring The Device Name112................................................................................................................................................................
Changing The System Time112................................................................................................................................................................
Configuration Guidelines112................................................................................................................................................................
Enabling Displaying The Copyright Statement115................................................................................................................................................................
Configuring Banners116................................................................................................................................................................
Banner Message Input Modes116................................................................................................................................................................
Configuring The Exception Handling Method117................................................................................................................................................................
Rebooting The Device117................................................................................................................................................................
Rebooting Devices Immediately At The Cli118................................................................................................................................................................
Scheduling A Device Reboot118................................................................................................................................................................
Scheduling Jobs119................................................................................................................................................................
Job Configuration Approaches119................................................................................................................................................................
Scheduling A Job In The Non-modular Approach120................................................................................................................................................................
Scheduling A Job In The Modular Approach120................................................................................................................................................................
Configuring The Port Status Detection Timer121................................................................................................................................................................
Clearing Unused 16-bit Interface Indexes121................................................................................................................................................................
Verifying And Diagnosing Transceiver Modules122................................................................................................................................................................
Verifying Transceiver Modules122................................................................................................................................................................
Diagnosing Transceiver Modules122................................................................................................................................................................
Displaying And Maintaining Device Management122................................................................................................................................................................
Automatic Configuration125................................................................................................................................................................
Typical Application Scenario125................................................................................................................................................................
How Automatic Configuration Works126................................................................................................................................................................
Automatic Configuration Work Flow126................................................................................................................................................................
Using Dhcp To Obtain An Ip Address And Other Configuration Information127................................................................................................................................................................
Obtaining The Configuration File From The Tftp Server128................................................................................................................................................................
Executing The Configuration File130................................................................................................................................................................
Support And Other Resources131................................................................................................................................................................
Contacting Hp131................................................................................................................................................................
Subscription Service131................................................................................................................................................................
Related Information131................................................................................................................................................................
Documents131................................................................................................................................................................
Websites131................................................................................................................................................................
Conventions132................................................................................................................................................................
Index134................................................................................................................................................................
HP 5500 HI Series Installation Manual

HP 5500 HI Series Installation Manual (72 pages)

Brand: HP | Category: Network Router | Size: 3.44 MB
Table of contents
Installation Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Product Overview6................................................................................................................................................................
G-4sfp Hi (2 Slots) Panel Views7................................................................................................................................................................
G-sfp Hi (2 Slots)/5500-24g-sfp Hi Taa (2 Slots) Panel Views9................................................................................................................................................................
G-poe+-4sfp Hi (2 Slots)/ 5500-24g-poe+-4sfp Hi Taa (2 Slots) Panel Views10................................................................................................................................................................
G-poe+-4sfp Hi (2 Slots)/ 5500-48g-poe+-4sfp Hi Taa (2 Slots) Panel Views11................................................................................................................................................................
Preparing For Installation12................................................................................................................................................................
Cleanness13................................................................................................................................................................
Installing The Switch15................................................................................................................................................................
Installing The Switch In A 19-inch Rack16................................................................................................................................................................
Rack-mounting By Using Front Mounting Brackets18................................................................................................................................................................
Rack-mounting By Using Front And Rear Mounting Brackets19................................................................................................................................................................
Mounting The Switch On A Workbench21................................................................................................................................................................
Grounding The Switch22................................................................................................................................................................
Grounding The Switch With A Grounding Conductor Buried In The Earth Ground24................................................................................................................................................................
Installing/removing A Power Supply25................................................................................................................................................................
Removing A Psr150 Series Power Supply27................................................................................................................................................................
Removing A Psr720-56a/psr1110-56a Power Supply28................................................................................................................................................................
Connecting The Power Cord30................................................................................................................................................................
Connecting The Psr150-a/psr150-a131................................................................................................................................................................
Connecting The Psr720-56a/psr1110-56a32................................................................................................................................................................
Installing/removing An Interface Card33................................................................................................................................................................
Removing An Interface Card35................................................................................................................................................................
Verifying The Installation36................................................................................................................................................................
Accessing The Switch For The First Time37................................................................................................................................................................
Setting Terminal Parameters38................................................................................................................................................................
Powering On The Switch41................................................................................................................................................................
Setting Up An Irf Fabric42................................................................................................................................................................
Planning Irf Fabric Setup43................................................................................................................................................................
Identifying The Master Switch And Planning Irf Member Ids44................................................................................................................................................................
Identifying Physical Irf Ports On The Member Switches45................................................................................................................................................................
Planning The Cabling Scheme46................................................................................................................................................................
Configuring Basic Irf Settings48................................................................................................................................................................
Maintenance And Troubleshooting50................................................................................................................................................................
Appendix A Technical Specifications52................................................................................................................................................................
Cooling System54................................................................................................................................................................
Appendix B Frus And Compatibility Matrixes55................................................................................................................................................................
Hot Swappable Power Supplies56................................................................................................................................................................
Sfp/sfp+/xfp Transceiver Modules And Sfp+/cx4 Cables57................................................................................................................................................................
Mbps Sfp Transceiver Modules58................................................................................................................................................................
Gbps Sfp+ Transceiver Modules/sfp+ Cables59................................................................................................................................................................
Gbps Xfp Transceiver Modules60................................................................................................................................................................
Cx4 Cables61................................................................................................................................................................
Appendix C Ports And Leds62................................................................................................................................................................
Base-x Sfp Port63................................................................................................................................................................
Port Mode Led64................................................................................................................................................................
Management Ethernet Port Led65................................................................................................................................................................
Base-t Ethernet Port Led66................................................................................................................................................................
Base-x Sfp Port Led67................................................................................................................................................................
Port Led On The Interface Card68................................................................................................................................................................
Support And Other Resources69................................................................................................................................................................
Conventions70................................................................................................................................................................

Advertising

HP 5500 HI Series Quickspecs

HP 5500 HI Series Quickspecs (35 pages)

HP 5500 HI Switch Series  
Brand: HP | Category: Switch | Size: 1.15 MB

Share and save

Advertising