HP 5500 HI Series Manuals

Manuals and User Guides for HP 5500 HI Series. We have 5 HP 5500 HI Series manuals available for free PDF download: Configuration Manual, Command Reference Manual, Installation Manual, Quickspecs

HP 5500 HI Series Configuration Manual

HP 5500 HI Series Configuration Manual (444 pages)

Security  
Brand: HP | Category: Switch | Size: 4.07 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Aaa14................................................................................................................................................................
Radius15................................................................................................................................................................
Hwtacacs20................................................................................................................................................................
Domain-based User Management22................................................................................................................................................................
Radius Server Feature Of The Switch23................................................................................................................................................................
Aaa For Mpls L3vpns24................................................................................................................................................................
Radius Attributes25................................................................................................................................................................
Fips Compliance28................................................................................................................................................................
Configuring Aaa Schemes29................................................................................................................................................................
Configuring Radius Schemes34................................................................................................................................................................
Configuring Hwtacacs Schemes47................................................................................................................................................................
Configuring Aaa Methods For Isp Domains54................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain56................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain57................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain59................................................................................................................................................................
Tearing Down User Connections60................................................................................................................................................................
Specifying The Device Id Used In Stateful Failover Mode61................................................................................................................................................................
Specifying A Radius Client62................................................................................................................................................................
Displaying And Maintaining Aaa63................................................................................................................................................................
Aaa For Telnet Users By Separate Servers64................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server66................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server69................................................................................................................................................................
Radius Authentication And Authorization For Telnet Users By A Switch73................................................................................................................................................................
Troubleshooting Aaa75................................................................................................................................................................
Troubleshooting Hwtacacs76................................................................................................................................................................
X Overview77................................................................................................................................................................
X-related Protocols78................................................................................................................................................................
Eap Over Radius80................................................................................................................................................................
X Authentication Procedures81................................................................................................................................................................
Eap Relay82................................................................................................................................................................
Eap Termination83................................................................................................................................................................
Configuring 802.1x85................................................................................................................................................................
Configuration Prerequisites90................................................................................................................................................................
X Configuration Task List91................................................................................................................................................................
Configuration Procedure92................................................................................................................................................................
Setting The Port Authorization State93................................................................................................................................................................
Setting The Maximum Number Of Concurrent 802.1x Users On A Port94................................................................................................................................................................
Setting The 802.1x Authentication Timeout Timers95................................................................................................................................................................
Enabling The Periodic Online User Re-authentication Function98................................................................................................................................................................
Configuring A Port To Send Eapol Frames Untagged99................................................................................................................................................................
Configuring An 802.1x Guest Vlan100................................................................................................................................................................
Displaying And Maintaining 802.1x104................................................................................................................................................................
Verifying The Configuration106................................................................................................................................................................
X With Guest Vlan And Vlan Assignment Configuration Example107................................................................................................................................................................
Configuring Ead Fast Deployment112................................................................................................................................................................
Configuring The Redirect Url113................................................................................................................................................................
Ead Fast Deployment Configuration Example114................................................................................................................................................................
Troubleshooting Ead Fast Deployment116................................................................................................................................................................
Configuring Mac Authentication117................................................................................................................................................................
Mac Authentication Timers118................................................................................................................................................................
Critical Vlan119................................................................................................................................................................
Configuring Mac Authentication Globally120................................................................................................................................................................
Specifying A Mac Authentication Domain121................................................................................................................................................................
Configuring A Mac Authentication Critical Vlan122................................................................................................................................................................
Configuring Mac Authentication Delay123................................................................................................................................................................
Displaying And Maintaining Mac Authentication124................................................................................................................................................................
Radius-based Mac Authentication Configuration Example126................................................................................................................................................................
Acl Assignment Configuration Example128................................................................................................................................................................
Configuring Portal Authentication131................................................................................................................................................................
Portal System Using The Local Portal Server133................................................................................................................................................................
Portal Authentication Modes134................................................................................................................................................................
Portal Support For Eap135................................................................................................................................................................
Layer 2 Portal Authentication Process136................................................................................................................................................................
Layer 3 Portal Authentication Process137................................................................................................................................................................
Portal Stateful Failover140................................................................................................................................................................
Portal Authentication Across Vpns142................................................................................................................................................................
Specifying The Portal Server144................................................................................................................................................................
Specifying A Portal Server For Layer 3 Portal Authentication145................................................................................................................................................................
Configuring The Local Portal Server148................................................................................................................................................................
Enabling Portal Authentication149................................................................................................................................................................
Controlling Access Of Portal Users150................................................................................................................................................................
Configuring An Authentication Source Subnet151................................................................................................................................................................
Setting The Maximum Number Of Online Portal Users152................................................................................................................................................................
Configuring Layer 2 Portal Authentication To Support Web Proxy153................................................................................................................................................................
Specifying An Auth-fail Vlan For Portal Authentication154................................................................................................................................................................
Configuring Radius Related Attributes155................................................................................................................................................................
Specifying A Source Ip Address For Outgoing Portal Packets156................................................................................................................................................................
Specifying An Auto Redirection Url For Authenticated Portal Users158................................................................................................................................................................
Configuring Portal Detection Functions159................................................................................................................................................................
Configuring Portal User Information Synchronization161................................................................................................................................................................
Displaying And Maintaining Portal162................................................................................................................................................................
Portal Configuration Examples163................................................................................................................................................................
Configuring Re-dhcp Portal Authentication167................................................................................................................................................................
Configuring Cross-subnet Portal Authentication169................................................................................................................................................................
Configuring Direct Portal Authentication With Extended Functions171................................................................................................................................................................
Configuring Re-dhcp Portal Authentication With Extended Functions173................................................................................................................................................................
Configuring Cross-subnet Portal Authentication With Extended Functions175................................................................................................................................................................
Configuring Portal Stateful Failover177................................................................................................................................................................
Configuring Switch A181................................................................................................................................................................
Configuring Switch B183................................................................................................................................................................
Configuring Portal Server Detection And Portal User Information Synchronization185................................................................................................................................................................
Cross-subnet Portal Authentication Across Vpns190................................................................................................................................................................
Configuring Layer 2 Portal Authentication192................................................................................................................................................................
Troubleshooting Portal196................................................................................................................................................................
Configuring Triple Authentication198................................................................................................................................................................
Using Triple Authentication With Other Features199................................................................................................................................................................
Triple Authentication Configuration Examples200................................................................................................................................................................
Triple Authentication Supporting Vlan Assignment And Auth-fail Vlan Configuration Example202................................................................................................................................................................
Configuring Port Security208................................................................................................................................................................
Working With Guest Vlan And Auth-fail Vlan211................................................................................................................................................................
Enabling Port Security212................................................................................................................................................................
Setting The Port Security Mode213................................................................................................................................................................
Configuring Port Security Features214................................................................................................................................................................
Enabling Port Security Traps215................................................................................................................................................................
Ignoring Authorization Information217................................................................................................................................................................
Port Security Configuration Examples218................................................................................................................................................................
Configuring The Userloginwithoui Mode220................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode225................................................................................................................................................................
Troubleshooting Port Security227................................................................................................................................................................
Cannot Configure Secure Mac Addresses228................................................................................................................................................................
Configuring A User Profile230................................................................................................................................................................
Applying A Qos Policy231................................................................................................................................................................
Displaying And Maintaining User Profiles232................................................................................................................................................................
Configuring Password Control233................................................................................................................................................................
Password Control Configuration Task List236................................................................................................................................................................
Setting Global Password Control Parameters237................................................................................................................................................................
Setting User Group Password Control Parameters238................................................................................................................................................................
Setting Local User Password Control Parameters239................................................................................................................................................................
Setting Super Password Control Parameters240................................................................................................................................................................
Password Control Configuration Example241................................................................................................................................................................
Configuring Habp244................................................................................................................................................................
Displaying And Maintaining Habp246................................................................................................................................................................
Managing Public Keys249................................................................................................................................................................
Configuration Task List250................................................................................................................................................................
Displaying Or Exporting The Local Host Public Key251................................................................................................................................................................
Destroying A Local Asymmetric Key Pair252................................................................................................................................................................
Displaying And Maintaining Public Keys253................................................................................................................................................................
Public Key Configuration Examples254................................................................................................................................................................
Importing A Peer Public Key From A Public Key File256................................................................................................................................................................
Configuring Pki259................................................................................................................................................................
Pki Architecture260................................................................................................................................................................
Pki Applications261................................................................................................................................................................
Configuring An Entity Dn262................................................................................................................................................................
Configuring A Pki Domain263................................................................................................................................................................
Configuration Guidelines264................................................................................................................................................................
Submitting A Certificate Request In Auto Mode265................................................................................................................................................................
Retrieving A Certificate Manually266................................................................................................................................................................
Configuring Crl-checking-disabled Pki Certificate Verification268................................................................................................................................................................
Deleting A Certificate269................................................................................................................................................................
Pki Configuration Examples270................................................................................................................................................................
Certificate Request From A Windows 2003 Ca Server273................................................................................................................................................................
Certificate Attribute Access Control Policy Configuration Example276................................................................................................................................................................
Troubleshooting Pki278................................................................................................................................................................
Failed To Retrieve Crls279................................................................................................................................................................
Configuring Ipsec280................................................................................................................................................................
Ipsec For Ipv6 Routing Protocols283................................................................................................................................................................
Acl-based Ipsec Configuration Task List284................................................................................................................................................................
Configuring An Ipsec Proposal286................................................................................................................................................................
Configuring An Ipsec Policy287................................................................................................................................................................
Applying An Ipsec Policy Group To An Interface291................................................................................................................................................................
Enabling Acl Checking Of De-encapsulated Ipsec Packets292................................................................................................................................................................
Configuring Packet Information Pre-extraction293................................................................................................................................................................
Displaying And Maintaining Ipsec294................................................................................................................................................................
Ipsec For Ripng Configuration Example297................................................................................................................................................................
Configuring Ike301................................................................................................................................................................
Ike Operation302................................................................................................................................................................
Relationship Between Ike And Ipsec303................................................................................................................................................................
Configuring A Name For The Local Security Gateway304................................................................................................................................................................
Configuring An Ike Peer305................................................................................................................................................................
Setting Keepalive Timers307................................................................................................................................................................
Configuring A Dpd Detector308................................................................................................................................................................
Displaying And Maintaining Ike309................................................................................................................................................................
Troubleshooting Ike312................................................................................................................................................................
Failing To Establish An Ipsec Tunnel313................................................................................................................................................................
Configuring Ssh2.0314................................................................................................................................................................
Ssh Connection Across Vpns316................................................................................................................................................................
Enabling The Ssh Server Function318................................................................................................................................................................
Configuring A Client Public Key319................................................................................................................................................................
Configuring An Ssh User320................................................................................................................................................................
Setting The Ssh Management Parameters321................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Ssh Server322................................................................................................................................................................
Specifying A Source Ip Address/interface For The Ssh Client323................................................................................................................................................................
Establishing A Connection Between The Ssh Client And Server324................................................................................................................................................................
Setting The Dscp Value For Packets Sent By The Ssh Client325................................................................................................................................................................
Ssh Server Configuration Examples326................................................................................................................................................................
When The Switch Acts As A Server For Publickey Authentication328................................................................................................................................................................
Ssh Client Configuration Examples333................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication336................................................................................................................................................................
Configuring Sftp339................................................................................................................................................................
Configuring The Sftp Connection Idle Timeout Period340................................................................................................................................................................
Working With Sftp Directories341................................................................................................................................................................
Working With Sftp Files342................................................................................................................................................................
Displaying Help Information343................................................................................................................................................................
Sftp Client Configuration Example344................................................................................................................................................................
Sftp Server Configuration Example347................................................................................................................................................................
Configuring Scp350................................................................................................................................................................
Configuring The Switch As The Scp Client351................................................................................................................................................................
Scp Client Configuration Example352................................................................................................................................................................
Scp Server Configuration Example353................................................................................................................................................................
Configuring Ssl355................................................................................................................................................................
Ssl Server Policy Configuration Example358................................................................................................................................................................
Configuring An Ssl Client Policy360................................................................................................................................................................
Troubleshooting Ssl361................................................................................................................................................................
Configuring Tcp Attack Protection362................................................................................................................................................................
Configuring Ip Source Guard364................................................................................................................................................................
Dynamic Ip Source Guard Binding Entries365................................................................................................................................................................
Configuring The Ipv4 Source Guard Function366................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Entry367................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Binding Entries368................................................................................................................................................................
Configuring The Ipv6 Source Guard Function369................................................................................................................................................................
Configuring A Static Ipv6 Source Guard Entry370................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Source Guard Entries371................................................................................................................................................................
Ip Source Guard Configuration Examples372................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Snooping Configuration Example374................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Relay Configuration Example375................................................................................................................................................................
Static Ipv6 Source Guard Configuration Example376................................................................................................................................................................
Dynamic Ipv6 Source Guard Using Dhcpv6 Snooping Configuration Example377................................................................................................................................................................
Dynamic Ipv6 Source Guard Using Nd Snooping Configuration Example378................................................................................................................................................................
Global Static Ip Source Guard Configuration Example379................................................................................................................................................................
Troubleshooting Ip Source Guard381................................................................................................................................................................
Configuring Arp Attack Protection382................................................................................................................................................................
Configuring Arp Defense Against Ip Packet Attacks383................................................................................................................................................................
Enabling Arp Black Hole Routing384................................................................................................................................................................
Configuring Arp Packet Rate Limit385................................................................................................................................................................
Configuring Source Mac Address Based Arp Attack Detection386................................................................................................................................................................
Displaying And Maintaining Source Mac Address Based Arp Attack Detection387................................................................................................................................................................
Configuration Considerations388................................................................................................................................................................
Configuring Arp Packet Source Mac Address Consistency Check389................................................................................................................................................................
Configuring Arp Detection390................................................................................................................................................................
Configuring Arp Packet Validity Check391................................................................................................................................................................
Configuring Arp Restricted Forwarding392................................................................................................................................................................
Displaying And Maintaining Arp Detection393................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example394................................................................................................................................................................
Arp Restricted Forwarding Configuration Example396................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp397................................................................................................................................................................
Configuring Arp Filtering400................................................................................................................................................................
Configuring Nd Attack Defense402................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets403................................................................................................................................................................
Nd Detection Configuration Example405................................................................................................................................................................
Configuring Urpf407................................................................................................................................................................
Network Application410................................................................................................................................................................
Configuring Mff412................................................................................................................................................................
Basic Concepts413................................................................................................................................................................
Working Mechanism414................................................................................................................................................................
Enabling Mff415................................................................................................................................................................
Displaying And Maintaining Mff416................................................................................................................................................................
Auto-mode Mff Configuration Example In A Ring Network418................................................................................................................................................................
Manual-mode Mff Configuration Example In A Tree Network420................................................................................................................................................................
Manual-mode Mff Configuration Example In A Ring Network421................................................................................................................................................................
Configuring Savi423................................................................................................................................................................
Savi Configuration In Dhcpv6-only Address Assignment Scenario424................................................................................................................................................................
Packet Check Principles425................................................................................................................................................................
Savi Configuration In Slaac-only Address Assignment Scenario426................................................................................................................................................................
Savi Configuration In Dhcpv6+slaac Address Assignment Scenario428................................................................................................................................................................
Configuring Blacklist431................................................................................................................................................................
Blacklist Configuration Example432................................................................................................................................................................
Configuring Fips434................................................................................................................................................................
Triggering A Self-test436................................................................................................................................................................
Support And Other Resources439................................................................................................................................................................
Conventions440................................................................................................................................................................
Index442................................................................................................................................................................

Advertisement

HP 5500 HI Series Command Reference Manual

HP 5500 HI Series Command Reference Manual (292 pages)

Brand: HP | Category: Switch | Size: 1.39 MB
Table of contents
Command Reference1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Ethernet Interface Configuration Commands9................................................................................................................................................................
Description10................................................................................................................................................................
Display Counters11................................................................................................................................................................
Display Counters Rate12................................................................................................................................................................
Display Interface14................................................................................................................................................................
Display Packet-drop Interface23................................................................................................................................................................
Display Packet-drop Summary24................................................................................................................................................................
Duplex25................................................................................................................................................................
Flow-control Receive Enable26................................................................................................................................................................
Flow-interval27................................................................................................................................................................
Jumboframe Enable28................................................................................................................................................................
Link-delay Mode Up29................................................................................................................................................................
Loopback30................................................................................................................................................................
Port Link-mode Interface-list31................................................................................................................................................................
Reset Counters Interface32................................................................................................................................................................
Reset Packet-drop Interface33................................................................................................................................................................
Speed34................................................................................................................................................................
Layer 2 Ethernet Interface Configuration Commands35................................................................................................................................................................
Display Loopback-detection36................................................................................................................................................................
Display Port-group Manual37................................................................................................................................................................
Display Storm-constrain38................................................................................................................................................................
Group-member40................................................................................................................................................................
Loopback-detection Control Enable41................................................................................................................................................................
Loopback-detection Enable42................................................................................................................................................................
Loopback-detection Interval-time43................................................................................................................................................................
Loopback-detection Multi-port-mode Enable44................................................................................................................................................................
Loopback-detection Per-vlan Enable45................................................................................................................................................................
Multicast-suppression46................................................................................................................................................................
Port Auto-power-down47................................................................................................................................................................
Port Bridge Enable48................................................................................................................................................................
Speed Auto49................................................................................................................................................................
Storm-constrain50................................................................................................................................................................
Storm-constrain Control51................................................................................................................................................................
Storm-constrain Enable Log52................................................................................................................................................................
Storm-constrain Interval53................................................................................................................................................................
Unicast-suppression54................................................................................................................................................................
Virtual-cable-test55................................................................................................................................................................
Layer 3 Ethernet Interface Configuration Commands56................................................................................................................................................................
Loopback And Null Interface Configuration Commands57................................................................................................................................................................
Display Interface Loopback58................................................................................................................................................................
Display Interface Null61................................................................................................................................................................
Interface Loopback62................................................................................................................................................................
Interface Null63................................................................................................................................................................
Reset Counters Interface Null64................................................................................................................................................................
Shutdown65................................................................................................................................................................
Bulk Interface Configuration Commands66................................................................................................................................................................
Mac Address Table Configuration Commands69................................................................................................................................................................
Display Mac-address Aging-time70................................................................................................................................................................
Display Mac-address Mac-learning71................................................................................................................................................................
Display Mac-address Statistics72................................................................................................................................................................
Mac-address (interface View)73................................................................................................................................................................
Mac-address (system View)74................................................................................................................................................................
Mac-address Destination-hit Disable75................................................................................................................................................................
Mac-address Mac-learning Disable76................................................................................................................................................................
Mac-address Max-mac-count77................................................................................................................................................................
Mac-flapping Notification Enable78................................................................................................................................................................
Mac Information Configuration Commands80................................................................................................................................................................
Mac-address Information Interval81................................................................................................................................................................
Mac-address Information Queue-length82................................................................................................................................................................
Ethernet Link Aggregation Configuration Commands83................................................................................................................................................................
Display Lacp System-id88................................................................................................................................................................
Display Link-aggregation Load-sharing Mode89................................................................................................................................................................
Display Link-aggregation Member-port90................................................................................................................................................................
Display Link-aggregation Summary92................................................................................................................................................................
Display Link-aggregation Verbose94................................................................................................................................................................
Enable Snmp Trap Updown96................................................................................................................................................................
Interface Bridge-aggregation97................................................................................................................................................................
Interface Route-aggregation98................................................................................................................................................................
Lacp System-priority99................................................................................................................................................................
Link-aggregation Load-sharing Mode100................................................................................................................................................................
Link-aggregation Load-sharing Mode Local-first102................................................................................................................................................................
Link-aggregation Port-priority103................................................................................................................................................................
Link-aggregation Selected-port Minimum104................................................................................................................................................................
Port Link-aggregation Group105................................................................................................................................................................
Reset Lacp Statistics107................................................................................................................................................................
Port Isolation Configuration Commands109................................................................................................................................................................
Port-isolate Enable110................................................................................................................................................................
Spanning Tree Configuration Commands112................................................................................................................................................................
Check Region-configuration113................................................................................................................................................................
Display Stp114................................................................................................................................................................
Display Stp Abnormal-port120................................................................................................................................................................
Display Stp Bpdu-statistics122................................................................................................................................................................
Display Stp Down-port125................................................................................................................................................................
Display Stp History126................................................................................................................................................................
Display Stp Region-configuration127................................................................................................................................................................
Display Stp Root129................................................................................................................................................................
Display Stp Tc130................................................................................................................................................................
Instance131................................................................................................................................................................
Region-name132................................................................................................................................................................
Reset Stp133................................................................................................................................................................
Revision-level134................................................................................................................................................................
Stp Bridge-diameter135................................................................................................................................................................
Stp Compliance136................................................................................................................................................................
Stp Config-digest-snooping137................................................................................................................................................................
Stp Edged-port139................................................................................................................................................................
Stp Enable140................................................................................................................................................................
Stp Loop-protection141................................................................................................................................................................
Stp Max-hops142................................................................................................................................................................
Stp Mode143................................................................................................................................................................
Stp No-agreement-check144................................................................................................................................................................
Stp Point-to-point145................................................................................................................................................................
Stp Port Priority146................................................................................................................................................................
Stp Port-log147................................................................................................................................................................
Stp Priority148................................................................................................................................................................
Stp Region-configuration149................................................................................................................................................................
Stp Root Primary150................................................................................................................................................................
Stp Root-protection151................................................................................................................................................................
Stp Tc-protection152................................................................................................................................................................
Stp Tc-snooping153................................................................................................................................................................
Stp Timer Forward-delay154................................................................................................................................................................
Stp Timer Hello155................................................................................................................................................................
Stp Timer Max-age156................................................................................................................................................................
Stp Timer-factor157................................................................................................................................................................
Vlan-mapping Modulo158................................................................................................................................................................
Bpdu Tunneling Configuration Commands160................................................................................................................................................................
Bpdu-tunnel Tunnel-dmac161................................................................................................................................................................
Vlan Configuration Commands163................................................................................................................................................................
Display Interface Vlan-interface165................................................................................................................................................................
Display Vlan167................................................................................................................................................................
Interface Vlan-interface169................................................................................................................................................................
Ip Address170................................................................................................................................................................
Name171................................................................................................................................................................
Reset Counters Interface Vlan-interface172................................................................................................................................................................
Port-based Vlan Configuration Commands174................................................................................................................................................................
Port176................................................................................................................................................................
Port Hybrid Pvid177................................................................................................................................................................
Port Hybrid Vlan178................................................................................................................................................................
Port Link-type180................................................................................................................................................................
Port Trunk Permit Vlan181................................................................................................................................................................
Port Trunk Pvid182................................................................................................................................................................
Mac-based Vlan Configuration Commands183................................................................................................................................................................
Display Mac-vlan Interface185................................................................................................................................................................
Mac-vlan Enable186................................................................................................................................................................
Mac-vlan Trigger Enable187................................................................................................................................................................
Port Pvid Disable188................................................................................................................................................................
Protocol-based Vlan Configuration Commands189................................................................................................................................................................
Display Protocol-vlan Vlan190................................................................................................................................................................
Port Hybrid Protocol-vlan191................................................................................................................................................................
Protocol-vlan193................................................................................................................................................................
Ip Subnet-based Vlan Configuration Commands194................................................................................................................................................................
Display Ip-subnet-vlan Vlan195................................................................................................................................................................
Ip-subnet-vlan196................................................................................................................................................................
Port Hybrid Ip-subnet-vlan197................................................................................................................................................................
Super Vlan Configuration Commands199................................................................................................................................................................
Subvlan201................................................................................................................................................................
Supervlan202................................................................................................................................................................
Isolate-user-vlan Configuration Commands203................................................................................................................................................................
Isolate-user-vlan204................................................................................................................................................................
Isolate-user-vlan Enable205................................................................................................................................................................
Isolated-vlan Enable206................................................................................................................................................................
Port Isolate-user-vlan Promiscuous207................................................................................................................................................................
Port Isolate-user-vlan Host209................................................................................................................................................................
Voice Vlan Configuration Commands212................................................................................................................................................................
Display Voice Vlan State213................................................................................................................................................................
Lldp Voice-vlan214................................................................................................................................................................
Voice Vlan Aging215................................................................................................................................................................
Voice Vlan Mac-address216................................................................................................................................................................
Voice Vlan Mode Auto217................................................................................................................................................................
Voice Vlan Qos218................................................................................................................................................................
Voice Vlan Security Enable219................................................................................................................................................................
Voice Vlan Track Lldp220................................................................................................................................................................
Gvrp Configuration Commands221................................................................................................................................................................
Display Garp Timer222................................................................................................................................................................
Display Gvrp Local-vlan223................................................................................................................................................................
Display Gvrp Statistics225................................................................................................................................................................
Display Gvrp Status226................................................................................................................................................................
Display Gvrp Vlan-operation227................................................................................................................................................................
Garp Timer Join228................................................................................................................................................................
Garp Timer Leave229................................................................................................................................................................
Gvrp230................................................................................................................................................................
Gvrp Registration231................................................................................................................................................................
Qinq Configuration Commands233................................................................................................................................................................
Qinq Enable234................................................................................................................................................................
Qinq Ethernet-type Service-tag235................................................................................................................................................................
Qinq Transparent-vlan236................................................................................................................................................................
Vlan Mapping Configuration Commands238................................................................................................................................................................
Remark Customer-vlan-id239................................................................................................................................................................
Remark Service-vlan-id240................................................................................................................................................................
Lldp Configuration Commands241................................................................................................................................................................
Display Lldp Neighbor-information246................................................................................................................................................................
Display Lldp Statistics252................................................................................................................................................................
Display Lldp Status254................................................................................................................................................................
Display Lldp Tlv-config256................................................................................................................................................................
Lldp Admin-status257................................................................................................................................................................
Lldp Check-change-interval258................................................................................................................................................................
Lldp Compliance Admin-status Cdp259................................................................................................................................................................
Lldp Enable260................................................................................................................................................................
Lldp Fast-count261................................................................................................................................................................
Lldp Hold-multiplier262................................................................................................................................................................
Lldp Management-address-tlv263................................................................................................................................................................
Lldp Notification Remote-change Enable264................................................................................................................................................................
Lldp Timer Reinit-delay265................................................................................................................................................................
Lldp Timer Tx-interval266................................................................................................................................................................
Service Loopback Group Configuration Commands270................................................................................................................................................................
Port Service-loopback Group271................................................................................................................................................................
Mvrp Commands273................................................................................................................................................................
Display Mvrp State274................................................................................................................................................................
Display Mvrp Statistics276................................................................................................................................................................
Display Mvrp Vlan-operation278................................................................................................................................................................
Mrp Timer Join279................................................................................................................................................................
Mrp Timer Leave280................................................................................................................................................................
Mrp Timer Leaveall281................................................................................................................................................................
Mvrp Global Enable282................................................................................................................................................................
Mvrp Enable283................................................................................................................................................................
Mvrp Registration284................................................................................................................................................................
Support And Other Resources286................................................................................................................................................................
Conventions287................................................................................................................................................................
Index289................................................................................................................................................................
HP 5500 HI Series Configuration Manual

HP 5500 HI Series Configuration Manual (135 pages)

HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration Guide-R2103  
Brand: HP | Category: Server | Size: 1.56 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Using The Cli7................................................................................................................................................................
Logging In To The Cli7................................................................................................................................................................
Command Conventions7................................................................................................................................................................
Using The Undo Form Of A Command8................................................................................................................................................................
Cli Views8................................................................................................................................................................
Entering System View From User View9................................................................................................................................................................
Returning To The Upper-level View From Any View9................................................................................................................................................................
Returning To User View From Any Other View9................................................................................................................................................................
Accessing The Cli Online Help10................................................................................................................................................................
Entering A Command11................................................................................................................................................................
Editing A Command Line11................................................................................................................................................................
Entering A String Type Value For An Argument11................................................................................................................................................................
Abbreviating Commands11................................................................................................................................................................
Configuring And Using Command Keyword Aliases12................................................................................................................................................................
Configuring And Using Hotkeys12................................................................................................................................................................
Enabling Redisplaying Entered-but-not-submitted Commands14................................................................................................................................................................
Understanding Command-line Error Messages14................................................................................................................................................................
Using The Command History Function15................................................................................................................................................................
Viewing History Commands15................................................................................................................................................................
Setting The Command History Buffer Size For User Interfaces15................................................................................................................................................................
Controlling The Cli Output16................................................................................................................................................................
Pausing Between Screens Of Output16................................................................................................................................................................
Filtering The Output From A Display Command16................................................................................................................................................................
Configuring User Privilege And Command Levels19................................................................................................................................................................
Configuring A User Privilege Level19................................................................................................................................................................
Switching The User Privilege Level23................................................................................................................................................................
Changing The Level Of A Command25................................................................................................................................................................
Saving The Running Configuration25................................................................................................................................................................
Displaying And Maintaining Cli26................................................................................................................................................................
Login Overview27................................................................................................................................................................
Login Methods At A Glance27................................................................................................................................................................
User Interfaces28................................................................................................................................................................
User Interface Assignment28................................................................................................................................................................
User Interface Identification28................................................................................................................................................................
Logging In Through The Console Port For The First Time29................................................................................................................................................................
Configuring Console Login Control Settings31................................................................................................................................................................
Configuring None Authentication For Console Login32................................................................................................................................................................
Configuring Password Authentication For Console Login33................................................................................................................................................................
Configuring Scheme Authentication For Console Login34................................................................................................................................................................
Configuring Common Console Login Settings (optional)36................................................................................................................................................................
Logging In Through Telnet38................................................................................................................................................................
Configuring None Authentication For Telnet Login39................................................................................................................................................................
Configuring Password Authentication For Telnet Login40................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login41................................................................................................................................................................
Configuring Common Settings For Vty User Interfaces (optional)43................................................................................................................................................................
Using The Device To Log In To A Telnet Server45................................................................................................................................................................
Setting The Dscp Value For Ip To Use For Outgoing Telnet Packets46................................................................................................................................................................
Logging In Through Ssh46................................................................................................................................................................
Configuring The Ssh Server On The Device46................................................................................................................................................................
Using The Device As An Ssh Client To Log In To The Ssh Server49................................................................................................................................................................
Modem Dial-in Through The Console Port49................................................................................................................................................................
Setting Up The Configuration Environment50................................................................................................................................................................
Configuring None Authentication For Modem Dial-in53................................................................................................................................................................
Configuring Password Authentication For Modem Dial-in53................................................................................................................................................................
Configuring Scheme Authentication For Modem Dial-in54................................................................................................................................................................
Configuring Common Settings For Modem Dial-in (optional)57................................................................................................................................................................
Displaying And Maintaining Cli Login59................................................................................................................................................................
Logging In To The Web Interface60................................................................................................................................................................
Configuring Http Login60................................................................................................................................................................
Configuring Https Login61................................................................................................................................................................
Displaying And Maintaining Web Login63................................................................................................................................................................
Http Login Configuration Example63................................................................................................................................................................
Network Requirements63................................................................................................................................................................
Configuration Procedure64................................................................................................................................................................
Https Login Configuration Example65................................................................................................................................................................
Logging In Through Snmp68................................................................................................................................................................
Configuring Snmp Login68................................................................................................................................................................
Prerequisites68................................................................................................................................................................
Configuring Snmpv3 Settings68................................................................................................................................................................
Configuring Snmpv1 Or Snmpv2c Settings69................................................................................................................................................................
Nms Login Example70................................................................................................................................................................
Controlling User Logins71................................................................................................................................................................
Controlling Telnet Logins71................................................................................................................................................................
Configuring Source Ip-based Telnet Login Control71................................................................................................................................................................
Configuring Source/destination Ip-based Telnet Login Control71................................................................................................................................................................
Configuring Source Mac-based Telnet Login Control72................................................................................................................................................................
Telnet Login Control Configuration Example72................................................................................................................................................................
Configuring Source Ip-based Snmp Login Control73................................................................................................................................................................
Snmp Login Control Configuration Example74................................................................................................................................................................
Configuring Web Login Control75................................................................................................................................................................
Configuring Source Ip-based Web Login Control75................................................................................................................................................................
Logging Off Online Web Users75................................................................................................................................................................
Web Login Control Configuration Example76................................................................................................................................................................
Configuring Ftp77................................................................................................................................................................
Using The Device As An Ftp Client77................................................................................................................................................................
Establishing An Ftp Connection77................................................................................................................................................................
Setting The Dscp Value For Ip To Use For Outgoing Ftp Packets78................................................................................................................................................................
Managing Directories On The Ftp Server79................................................................................................................................................................
Working With The Files On The Ftp Server79................................................................................................................................................................
Switching To Another User Account80................................................................................................................................................................
Maintaining And Troubleshooting The Ftp Connection80................................................................................................................................................................
Terminating The Ftp Connection80................................................................................................................................................................
Ftp Client Configuration Example81................................................................................................................................................................
Using The Device As An Ftp Server82................................................................................................................................................................
Configuring Basic Parameters82................................................................................................................................................................
Configuring Authentication And Authorization83................................................................................................................................................................
Ftp Server Configuration Example84................................................................................................................................................................
Displaying And Maintaining Ftp86................................................................................................................................................................
Configuring Tftp87................................................................................................................................................................
Using The Device As A Tftp Client87................................................................................................................................................................
Displaying And Maintaining The Tftp Client88................................................................................................................................................................
Tftp Client Configuration Example88................................................................................................................................................................
Managing The File System90................................................................................................................................................................
Storage Medium Naming Rules90................................................................................................................................................................
File Name Formats90................................................................................................................................................................
Managing Files91................................................................................................................................................................
Displaying File Information91................................................................................................................................................................
Displaying File Contents91................................................................................................................................................................
Renaming A File91................................................................................................................................................................
Copying A File91................................................................................................................................................................
Moving A File91................................................................................................................................................................
Deleting/restoring A File92................................................................................................................................................................
Emptying The Recycle Bin92................................................................................................................................................................
Managing Directories92................................................................................................................................................................
Displaying Directory Information92................................................................................................................................................................
Displaying The Current Working Directory92................................................................................................................................................................
Changing The Current Working Directory93................................................................................................................................................................
Creating A Directory93................................................................................................................................................................
Removing A Directory93................................................................................................................................................................
Managing Storage Medium Space93................................................................................................................................................................
Displaying And Maintaining The Nand Flash Memory94................................................................................................................................................................
Performing Batch Operations94................................................................................................................................................................
Setting The File System Operation Mode95................................................................................................................................................................
File System Management Examples95................................................................................................................................................................
Managing Configuration Files96................................................................................................................................................................
Overview96................................................................................................................................................................
Configuration Types96................................................................................................................................................................
Configuration File Format And Content97................................................................................................................................................................
Next-startup Configuration File Redundancy97................................................................................................................................................................
Startup With A Configuration File97................................................................................................................................................................
Enabling Configuration File Auto-update98................................................................................................................................................................
Saving Configuration In Different Approaches98................................................................................................................................................................
Configuring Configuration Rollback99................................................................................................................................................................
Configuration Task List99................................................................................................................................................................
Configuring Configuration Archive Parameters100................................................................................................................................................................
Enabling Automatic Configuration Archiving101................................................................................................................................................................
Manually Archiving Running Configuration102................................................................................................................................................................
Performing Configuration Rollback102................................................................................................................................................................
Specifying A Configuration File For The Next Startup103................................................................................................................................................................
Backing Up The Next-startup Configuration File To A Tftp Server103................................................................................................................................................................
Deleting The Next-startup Configuration File103................................................................................................................................................................
Restoring The Next-startup Configuration File From A Tftp Server104................................................................................................................................................................
Displaying And Maintaining A Configuration File104................................................................................................................................................................
Upgrading Software106................................................................................................................................................................
Software Upgrade Methods106................................................................................................................................................................
Upgrading Bootware107................................................................................................................................................................
Upgrading The Entire System Software107................................................................................................................................................................
Installing Patches108................................................................................................................................................................
Displaying And Maintaining Software Upgrade109................................................................................................................................................................
Software Upgrade Examples109................................................................................................................................................................
Managing The Device112................................................................................................................................................................
Configuring The Device Name112................................................................................................................................................................
Changing The System Time112................................................................................................................................................................
Configuration Guidelines112................................................................................................................................................................
Enabling Displaying The Copyright Statement115................................................................................................................................................................
Configuring Banners116................................................................................................................................................................
Banner Message Input Modes116................................................................................................................................................................
Configuring The Exception Handling Method117................................................................................................................................................................
Rebooting The Device117................................................................................................................................................................
Rebooting Devices Immediately At The Cli118................................................................................................................................................................
Scheduling A Device Reboot118................................................................................................................................................................
Scheduling Jobs119................................................................................................................................................................
Job Configuration Approaches119................................................................................................................................................................
Scheduling A Job In The Non-modular Approach120................................................................................................................................................................
Scheduling A Job In The Modular Approach120................................................................................................................................................................
Configuring The Port Status Detection Timer121................................................................................................................................................................
Clearing Unused 16-bit Interface Indexes121................................................................................................................................................................
Verifying And Diagnosing Transceiver Modules122................................................................................................................................................................
Verifying Transceiver Modules122................................................................................................................................................................
Diagnosing Transceiver Modules122................................................................................................................................................................
Displaying And Maintaining Device Management122................................................................................................................................................................
Automatic Configuration125................................................................................................................................................................
Typical Application Scenario125................................................................................................................................................................
How Automatic Configuration Works126................................................................................................................................................................
Automatic Configuration Work Flow126................................................................................................................................................................
Using Dhcp To Obtain An Ip Address And Other Configuration Information127................................................................................................................................................................
Obtaining The Configuration File From The Tftp Server128................................................................................................................................................................
Obtaining The Configuration File129................................................................................................................................................................
Tftp Request Sending Mode129................................................................................................................................................................
Executing The Configuration File130................................................................................................................................................................
Support And Other Resources131................................................................................................................................................................
Contacting Hp131................................................................................................................................................................
Subscription Service131................................................................................................................................................................
Related Information131................................................................................................................................................................
Documents131................................................................................................................................................................
Websites131................................................................................................................................................................
Conventions132................................................................................................................................................................
Index134................................................................................................................................................................

Advertisement

HP 5500 HI Series Installation Manual

HP 5500 HI Series Installation Manual (72 pages)

Brand: HP | Category: Network Router | Size: 3.44 MB
Table of contents
Installation Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Product Overview6................................................................................................................................................................
G-4sfp Hi (2 Slots) Panel Views7................................................................................................................................................................
G-sfp Hi (2 Slots)/5500-24g-sfp Hi Taa (2 Slots) Panel Views9................................................................................................................................................................
G-poe+-4sfp Hi (2 Slots)/ 5500-24g-poe+-4sfp Hi Taa (2 Slots) Panel Views10................................................................................................................................................................
G-poe+-4sfp Hi (2 Slots)/ 5500-48g-poe+-4sfp Hi Taa (2 Slots) Panel Views11................................................................................................................................................................
Preparing For Installation12................................................................................................................................................................
Cleanness13................................................................................................................................................................
Installing The Switch15................................................................................................................................................................
Installing The Switch In A 19-inch Rack16................................................................................................................................................................
Rack-mounting By Using Front Mounting Brackets18................................................................................................................................................................
Rack-mounting By Using Front And Rear Mounting Brackets19................................................................................................................................................................
Mounting The Switch On A Workbench21................................................................................................................................................................
Grounding The Switch22................................................................................................................................................................
Grounding The Switch With A Grounding Conductor Buried In The Earth Ground24................................................................................................................................................................
Installing/removing A Power Supply25................................................................................................................................................................
Removing A Psr150 Series Power Supply27................................................................................................................................................................
Removing A Psr720-56a/psr1110-56a Power Supply28................................................................................................................................................................
Connecting The Power Cord30................................................................................................................................................................
Connecting The Psr150-a/psr150-a131................................................................................................................................................................
Connecting The Psr720-56a/psr1110-56a32................................................................................................................................................................
Installing/removing An Interface Card33................................................................................................................................................................
Removing An Interface Card35................................................................................................................................................................
Verifying The Installation36................................................................................................................................................................
Accessing The Switch For The First Time37................................................................................................................................................................
Setting Terminal Parameters38................................................................................................................................................................
Powering On The Switch41................................................................................................................................................................
Setting Up An Irf Fabric42................................................................................................................................................................
Planning Irf Fabric Setup43................................................................................................................................................................
Identifying The Master Switch And Planning Irf Member Ids44................................................................................................................................................................
Identifying Physical Irf Ports On The Member Switches45................................................................................................................................................................
Planning The Cabling Scheme46................................................................................................................................................................
Configuring Basic Irf Settings48................................................................................................................................................................
Maintenance And Troubleshooting50................................................................................................................................................................
Appendix A Technical Specifications52................................................................................................................................................................
Cooling System54................................................................................................................................................................
Appendix B Frus And Compatibility Matrixes55................................................................................................................................................................
Hot Swappable Power Supplies56................................................................................................................................................................
Sfp/sfp+/xfp Transceiver Modules And Sfp+/cx4 Cables57................................................................................................................................................................
Mbps Sfp Transceiver Modules58................................................................................................................................................................
Gbps Sfp+ Transceiver Modules/sfp+ Cables59................................................................................................................................................................
Gbps Xfp Transceiver Modules60................................................................................................................................................................
Cx4 Cables61................................................................................................................................................................
Appendix C Ports And Leds62................................................................................................................................................................
Base-x Sfp Port63................................................................................................................................................................
Port Mode Led64................................................................................................................................................................
Management Ethernet Port Led65................................................................................................................................................................
Base-t Ethernet Port Led66................................................................................................................................................................
Base-x Sfp Port Led67................................................................................................................................................................
Port Led On The Interface Card68................................................................................................................................................................
Support And Other Resources69................................................................................................................................................................
Conventions70................................................................................................................................................................
HP 5500 HI Series Quickspecs

HP 5500 HI Series Quickspecs (35 pages)

HP 5500 HI Switch Series  
Brand: HP | Category: Switch | Size: 1.15 MB

Share and save

Advertisement