HP A5120 EI Series Manuals

Manuals and User Guides for HP A5120 EI Series. We have 5 HP A5120 EI Series manuals available for free PDF download: Configuration Manual, Command Reference Manual

HP A5120 EI Series Configuration Manual

HP A5120 EI Series Configuration Manual (197 pages)

LAN Switching  
Brand: HP | Category: Switch | Size: 1.61 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Ethernet Interface Configuration8................................................................................................................................................................
Configuring Basic Settings Of An Ethernet Interface9................................................................................................................................................................
Setting Speed Options For Auto Negotiation On An Ethernet Interface10................................................................................................................................................................
Configuring Generic Flow Control On An Ethernet Interface11................................................................................................................................................................
Configuring Link Change Suppression On An Ethernet Interface12................................................................................................................................................................
Configuring Loopback Testing On An Ethernet Interface13................................................................................................................................................................
Configuring A Port Group14................................................................................................................................................................
Setting The Statistics Polling Interval16................................................................................................................................................................
Enabling The Auto Power-down Function On An Ethernet Interface17................................................................................................................................................................
Enabling Single-port Loopback Detection On An Ethernet Interface18................................................................................................................................................................
Enabling Multi-port Loopback Detection19................................................................................................................................................................
Setting The Mdi Mode Of An Ethernet Interface20................................................................................................................................................................
Enabling Bridging On An Ethernet Interface21................................................................................................................................................................
Displaying And Maintaining An Ethernet Interface22................................................................................................................................................................
Loopback And Null Interface Configuration24................................................................................................................................................................
Null Interface25................................................................................................................................................................
Mac Address Table Configuration27................................................................................................................................................................
Mac Address Table-based Frame Forwarding28................................................................................................................................................................
Disabling Mac Address Learning29................................................................................................................................................................
Configuring The Aging Timer For Dynamic Mac Address Entries30................................................................................................................................................................
Configuring The Mac Learning Limit On Ports31................................................................................................................................................................
Mac Address Table Configuration Example32................................................................................................................................................................
Mac Information Configuration33................................................................................................................................................................
Configuring Mac Information Mode34................................................................................................................................................................
Mac Information Configuration Example35................................................................................................................................................................
Ethernet Link Aggregation Configuration36................................................................................................................................................................
Aggregating Links In Static Mode39................................................................................................................................................................
Aggregating Links In Dynamic Mode41................................................................................................................................................................
Load-sharing Criteria For Link Aggregation Groups43................................................................................................................................................................
Configuring A Static Aggregation Group44................................................................................................................................................................
Configuring An Aggregate Interface45................................................................................................................................................................
Configuring The Description Of An Aggregate Interface46................................................................................................................................................................
Configuring Load Sharing For Link Aggregation Groups47................................................................................................................................................................
Enabling Local-first Load Sharing For Link Aggregation48................................................................................................................................................................
Enabling Link-aggregation Traffic Redirection49................................................................................................................................................................
Displaying And Maintaining Ethernet Link Aggregation50................................................................................................................................................................
Layer 2 Static Aggregation Configuration Example51................................................................................................................................................................
Layer 2 Dynamic Aggregation Configuration Example53................................................................................................................................................................
Layer 2 Aggregation Load Sharing Configuration Example55................................................................................................................................................................
Port Isolation Configuration58................................................................................................................................................................
Displaying And Maintaining Isolation Groups59................................................................................................................................................................
Mstp Configuration61................................................................................................................................................................
Basic Concepts In Stp62................................................................................................................................................................
How Stp Works63................................................................................................................................................................
Introduction To Rstp69................................................................................................................................................................
Basic Concepts In Mstp70................................................................................................................................................................
How Mstp Works73................................................................................................................................................................
Implementation Of Mstp On Devices74................................................................................................................................................................
Configuring Mstp76................................................................................................................................................................
Configuring The Work Mode Of An Mstp Device77................................................................................................................................................................
Configuring The Priority Of A Device78................................................................................................................................................................
Configuring The Network Diameter Of A Switched Network79................................................................................................................................................................
Configuring The Timeout Factor80................................................................................................................................................................
Configuring The Maximum Port Rate81................................................................................................................................................................
Configuring Path Costs Of Ports82................................................................................................................................................................
Configuring Port Priority84................................................................................................................................................................
Configuring The Link Type Of Ports85................................................................................................................................................................
Configuring The Mode A Port Uses To Recognize/send Mstp Packets86................................................................................................................................................................
Enabling The Output Of Port State Transition Information87................................................................................................................................................................
Configuring Digest Snooping88................................................................................................................................................................
Configuring No Agreement Check90................................................................................................................................................................
Configuring Protection Functions92................................................................................................................................................................
Displaying And Maintaining Mstp95................................................................................................................................................................
Mstp Configuration Example96................................................................................................................................................................
Bpdu Tunneling Configuration101................................................................................................................................................................
Bpdu Tunneling Implementation102................................................................................................................................................................
Configuring Bpdu Tunneling103................................................................................................................................................................
Enabling Bpdu Tunneling104................................................................................................................................................................
Bpdu Tunneling Configuration Examples105................................................................................................................................................................
Bpdu Tunneling For Pvst Configuration Example106................................................................................................................................................................
Vlan Configuration108................................................................................................................................................................
Types Of Vlans109................................................................................................................................................................
Configuring Basic Vlan Settings110................................................................................................................................................................
Configuring Basic Settings Of A Vlan Interface111................................................................................................................................................................
Assigning An Access Port To A Vlan113................................................................................................................................................................
Assigning A Trunk Port To A Vlan114................................................................................................................................................................
Assigning A Hybrid Port To A Vlan115................................................................................................................................................................
Port-based Vlan Configuration Example116................................................................................................................................................................
Mac-based Vlan Configuration117................................................................................................................................................................
Configuring Mac-based Vlan119................................................................................................................................................................
Mac-based Vlan Configuration Example122................................................................................................................................................................
Protocol-based Vlan Configuration125................................................................................................................................................................
Protocol-based Vlan Configuration Example127................................................................................................................................................................
Ip Subnet-based Vlan Configuration129................................................................................................................................................................
Displaying And Maintaining Vlan131................................................................................................................................................................
Isolate-user-vlan Configuration132................................................................................................................................................................
Configuring An Isolate-user-vlan133................................................................................................................................................................
Configuring Secondary Vlans134................................................................................................................................................................
Associating Secondary Vlans With An Isolate-user-vlan135................................................................................................................................................................
Isolate-user-vlan Configuration Example136................................................................................................................................................................
Voice Vlan Configuration139................................................................................................................................................................
Security Mode And Normal Mode Of Voice Vlans142................................................................................................................................................................
Configuring A Voice Vlan143................................................................................................................................................................
Configuring A Port To Operate In Automatic Voice Vlan Assignment Mode144................................................................................................................................................................
Configuring A Port To Operate In Manual Voice Vlan Assignment Mode145................................................................................................................................................................
Displaying And Maintaining Voice Vlan146................................................................................................................................................................
Manual Voice Vlan Assignment Mode Configuration Example148................................................................................................................................................................
Gvrp Configuration150................................................................................................................................................................
Gvrp153................................................................................................................................................................
Protocols And Standards154................................................................................................................................................................
Configuring Garp Timers155................................................................................................................................................................
Displaying And Maintaining Gvrp156................................................................................................................................................................
Gvrp Configuration Examples157................................................................................................................................................................
Gvrp Fixed Registration Mode Configuration Example158................................................................................................................................................................
Gvrp Forbidden Registration Mode Configuration Example159................................................................................................................................................................
Qinq Configuration162................................................................................................................................................................
Qinq Frame Structure163................................................................................................................................................................
Implementations Of Qinq164................................................................................................................................................................
Configuring Basic Qinq166................................................................................................................................................................
Configuring Selective Qinq167................................................................................................................................................................
Configuring An Inner-outer Vlan 802.1p Priority Mapping168................................................................................................................................................................
Configuring The Tpid Value In Vlan Tags169................................................................................................................................................................
Selective Qinq Configuration Example171................................................................................................................................................................
Lldp Configuration175................................................................................................................................................................
How Lldp Works179................................................................................................................................................................
Performing Basic Lldp Configuration181................................................................................................................................................................
Setting The Lldp Re-initialization Delay182................................................................................................................................................................
Configuring The Management Address And Its Encoding Format183................................................................................................................................................................
Setting Other Lldp Parameters184................................................................................................................................................................
Configuring Cdp Compatibility185................................................................................................................................................................
Configuring Lldp Trapping186................................................................................................................................................................
Displaying And Maintaining Lldp187................................................................................................................................................................
Cdp-compatible Lldp Configuration Example190................................................................................................................................................................
Support And Other Resources192................................................................................................................................................................
Conventions193................................................................................................................................................................
Index195................................................................................................................................................................

Advertising

HP A5120 EI Series Configuration Manual

HP A5120 EI Series Configuration Manual (179 pages)

Brand: HP | Category: Switch | Size: 1.52 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Arp Configuration9................................................................................................................................................................
Operation Of Arp10................................................................................................................................................................
Arp Table11................................................................................................................................................................
Configuring The Maximum Number Of Dynamic Arp Entries For An Interface12................................................................................................................................................................
Enabling Dynamic Arp Entry Check13................................................................................................................................................................
Displaying And Maintaining Arp14................................................................................................................................................................
Gratuitous Arp Configuration16................................................................................................................................................................
Proxy Arp Configuration18................................................................................................................................................................
Local Proxy Arp19................................................................................................................................................................
Displaying And Maintaining Proxy Arp20................................................................................................................................................................
Local Proxy Arp Configuration Example In Case Of Port Isolation21................................................................................................................................................................
Local Proxy Arp Configuration Example In Isolate-user-vlan22................................................................................................................................................................
Ip Addressing Configuration25................................................................................................................................................................
Special Ip Addresses26................................................................................................................................................................
Configuring Ip Addresses27................................................................................................................................................................
Displaying And Maintaining Ip Addressing29................................................................................................................................................................
Dhcp Overview30................................................................................................................................................................
Dynamic Ip Address Allocation Process31................................................................................................................................................................
Dhcp Message Format32................................................................................................................................................................
Dhcp Options33................................................................................................................................................................
Protocols And Standards36................................................................................................................................................................
Dhcp Server Configuration38................................................................................................................................................................
Ip Address Allocation Sequence39................................................................................................................................................................
Configuring An Address Pool For The Dhcp Server40................................................................................................................................................................
Configuring An Address Allocation Mode For A Common Address Pool41................................................................................................................................................................
Configuring Dynamic Address Allocation For An Extended Address Pool43................................................................................................................................................................
Configuring A Domain Name Suffix For The Client44................................................................................................................................................................
Configuring Bims Server Information For The Client45................................................................................................................................................................
Configuring Option 184 Parameters For The Client With Voice Service46................................................................................................................................................................
Configuring Self-defined Dhcp Options47................................................................................................................................................................
Enabling Dhcp48................................................................................................................................................................
Applying An Extended Address Pool On An Interface49................................................................................................................................................................
Enabling Unauthorized Dhcp Server Detection50................................................................................................................................................................
Specifying The Threshold For Sending Trap Messages51................................................................................................................................................................
Displaying And Maintaining The Dhcp Server52................................................................................................................................................................
Static Ip Address Assignment Configuration Example53................................................................................................................................................................
Dynamic Ip Address Assignment Configuration Example54................................................................................................................................................................
Self-defined Option Configuration Example55................................................................................................................................................................
Troubleshooting Dhcp Server Configuration56................................................................................................................................................................
Dhcp Relay Agent Configuration58................................................................................................................................................................
Dhcp Relay Agent Support For Option 8259................................................................................................................................................................
Dhcp Relay Agent Configuration Task List60................................................................................................................................................................
Correlating A Dhcp Server Group With A Relay Agent Interface61................................................................................................................................................................
Configuring The Dhcp Relay Agent Security Functions62................................................................................................................................................................
Enabling Offline Detection64................................................................................................................................................................
Configuring The Dhcp Relay Agent To Support Option 8265................................................................................................................................................................
Displaying And Maintaining The Dhcp Relay Agent66................................................................................................................................................................
Dhcp Relay Agent Configuration Examples67................................................................................................................................................................
Dhcp Relay Agent Option 82 Support Configuration Example68................................................................................................................................................................
Troubleshooting Dhcp Relay Agent Configuration69................................................................................................................................................................
Dhcp Client Configuration70................................................................................................................................................................
Dhcp Client Configuration Example71................................................................................................................................................................
Dhcp Snooping Configuration73................................................................................................................................................................
Application Environment Of Trusted Ports74................................................................................................................................................................
Dhcp Snooping Support For Option 8275................................................................................................................................................................
Dhcp Snooping Configuration Task List76................................................................................................................................................................
Configuring Dhcp Snooping To Support Option 8277................................................................................................................................................................
Configuring Dhcp Snooping Entries Backup78................................................................................................................................................................
Enabling Dhcp Starvation Attack Protection79................................................................................................................................................................
Enabling Dhcp-request Message Attack Protection80................................................................................................................................................................
Displaying And Maintaining Dhcp Snooping81................................................................................................................................................................
Dhcp Snooping Option 82 Support Configuration Example82................................................................................................................................................................
Bootp Client Configuration84................................................................................................................................................................
Configuring An Interface To Dynamically Obtain An Ip Address Through Bootp85................................................................................................................................................................
Ipv4 Dns Configuration86................................................................................................................................................................
Dns Proxy87................................................................................................................................................................
Dns Spoofing88................................................................................................................................................................
Configuring The Ipv4 Dns Client89................................................................................................................................................................
Configuring Dynamic Domain Name Resolution90................................................................................................................................................................
Configuring The Dns Proxy91................................................................................................................................................................
Ipv4 Dns Configuration Examples92................................................................................................................................................................
Dynamic Domain Name Resolution Configuration Example93................................................................................................................................................................
Dns Proxy Configuration Example96................................................................................................................................................................
Troubleshooting Ipv4 Dns Configuration97................................................................................................................................................................
Ipv6 Dns Configuration98................................................................................................................................................................
Displaying And Maintaining Ipv6 Dns99................................................................................................................................................................
Configuration Procedure101................................................................................................................................................................
Ip Performance Optimization Configuration106................................................................................................................................................................
Configuration Example107................................................................................................................................................................
Configuring Tcp Attributes108................................................................................................................................................................
Irdp Configuration112................................................................................................................................................................
Terminology113................................................................................................................................................................
Irdp Configuration Example114................................................................................................................................................................
Udp Helper Configuration117................................................................................................................................................................
Displaying And Maintaining Udp Helper118................................................................................................................................................................
Ipv6 Basics Configuration120................................................................................................................................................................
Ipv6 Addresses121................................................................................................................................................................
Ipv6 Neighbor Discovery Protocol124................................................................................................................................................................
Ipv6 Pmtu Discovery126................................................................................................................................................................
Ipv6 Transition Technologies127................................................................................................................................................................
Configuring Basic Ipv6 Functions129................................................................................................................................................................
Configuring An Ipv6 Link-local Address131................................................................................................................................................................
Configure An Ipv6 Anycast Address132................................................................................................................................................................
Configuring Ipv6 Nd133................................................................................................................................................................
Configuring Parameters Related To Ra Messages134................................................................................................................................................................
Configuring The Maximum Number Of Attempts To Send An Ns Message For Dad136................................................................................................................................................................
Setting The Age Timer For Nd Entries137................................................................................................................................................................
Enabling Nd Proxy138................................................................................................................................................................
Configuring Pmtu Discovery139................................................................................................................................................................
Configuring The Aging Time For Dynamic Pmtus140................................................................................................................................................................
Configuring Icmpv6 Packet Sending141................................................................................................................................................................
Enabling Sending Of Icmpv6 Destination Unreachable Messages142................................................................................................................................................................
Displaying And Maintaining Ipv6 Basics Configuration143................................................................................................................................................................
Ipv6 Configuration Example144................................................................................................................................................................
Troubleshooting Ipv6 Basics Configuration149................................................................................................................................................................
Dhcpv6 Overview150................................................................................................................................................................
Address/prefix Lease Renewal151................................................................................................................................................................
Stateless Dhcpv6 Configuration152................................................................................................................................................................
Operation153................................................................................................................................................................
Dhcpv6 Server Configuration154................................................................................................................................................................
Prefix Selection Process155................................................................................................................................................................
Dhcpv6 Server Configuration Task List156................................................................................................................................................................
Applying The Address Pool To An Interface157................................................................................................................................................................
Displaying And Maintaining The Dhcpv6 Server158................................................................................................................................................................
Dhcpv6 Relay Agent Configuration162................................................................................................................................................................
Configuring The Dhcpv6 Relay Agent163................................................................................................................................................................
Displaying And Maintaining The Dhcpv6 Relay Agent164................................................................................................................................................................
Dhcpv6 Client Configuration167................................................................................................................................................................
Stateless Dhcpv6 Configuration Example168................................................................................................................................................................
Dhcpv6 Snooping Configuration170................................................................................................................................................................
Enabling Dhcpv6 Snooping171................................................................................................................................................................
Configuring The Maximum Number Of Dhcpv6 Snooping Entries An Interface Can Learn172................................................................................................................................................................
Support And Other Resources174................................................................................................................................................................
Conventions175................................................................................................................................................................
Index177................................................................................................................................................................
HP A5120 EI Series Configuration Manual

HP A5120 EI Series Configuration Manual (128 pages)

Brand: HP | Category: Network Router | Size: 1.1 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
High Availability Overview6................................................................................................................................................................
High Availability Technologies7................................................................................................................................................................
Protection Switchover Technologies8................................................................................................................................................................
Ethernet Oam Configuration9................................................................................................................................................................
Protocols And Standards13................................................................................................................................................................
Configuring The Ethernet Oam Connection Detection Timers14................................................................................................................................................................
Configuring Errored Symbol Event Detection15................................................................................................................................................................
Configuring Errored Frame Seconds Event Detection16................................................................................................................................................................
Rejecting The Ethernet Oam Remote Loopback Request From A Remote Port17................................................................................................................................................................
Ethernet Oam Configuration Example18................................................................................................................................................................
Cfd Configuration21................................................................................................................................................................
Cfd Functions23................................................................................................................................................................
Configuring Basic Cfd Settings26................................................................................................................................................................
Configuring Meps27................................................................................................................................................................
Configuring Mip Generation Rules28................................................................................................................................................................
Configuring Cfd Functions29................................................................................................................................................................
Configuring Lb On Meps30................................................................................................................................................................
Configuring Ais31................................................................................................................................................................
Configuring One-way Dm32................................................................................................................................................................
Displaying And Maintaining Cfd33................................................................................................................................................................
Cfd Configuration Example34................................................................................................................................................................
Dldp Configuration40................................................................................................................................................................
How Dldp Works41................................................................................................................................................................
Dldp Configuration Task List46................................................................................................................................................................
Enabling Dldp47................................................................................................................................................................
Setting Dldp Mode48................................................................................................................................................................
Setting The Port Shutdown Mode49................................................................................................................................................................
Resetting Dldp State50................................................................................................................................................................
Displaying And Maintaining Dldp51................................................................................................................................................................
Manually Shutting Down Unidirectional Links55................................................................................................................................................................
Troubleshooting Dldp58................................................................................................................................................................
Rrpp Configuration59................................................................................................................................................................
Rrppdus62................................................................................................................................................................
How Rrpp Works63................................................................................................................................................................
Typical Rrpp Networking64................................................................................................................................................................
Creating An Rrpp Domain68................................................................................................................................................................
Configuring Protected Vlans69................................................................................................................................................................
Configuring Rrpp Nodes70................................................................................................................................................................
Activating An Rrpp Domain72................................................................................................................................................................
Configuring An Rrpp Ring Group73................................................................................................................................................................
Rrpp Configuration Examples74................................................................................................................................................................
Intersecting Ring Configuration Example76................................................................................................................................................................
Intersecting-ring Load Balancing Configuration Example82................................................................................................................................................................
Troubleshooting91................................................................................................................................................................
Smart Link Configuration93................................................................................................................................................................
Terminology94................................................................................................................................................................
How Smart Link Works95................................................................................................................................................................
Smart Link Configuration Task List96................................................................................................................................................................
Configuring Member Ports For A Smart Link Group97................................................................................................................................................................
Enabling The Sending Of Flush Messages98................................................................................................................................................................
Displaying And Maintaining Smart Link99................................................................................................................................................................
Multiple Smart Link Groups Load Sharing Configuration Example104................................................................................................................................................................
Monitor Link Configuration108................................................................................................................................................................
How Monitor Link Works109................................................................................................................................................................
Displaying And Maintaining Monitor Link110................................................................................................................................................................
Track Configuration114................................................................................................................................................................
Collaboration Application Example115................................................................................................................................................................
Associating The Track Module With A Detection Module116................................................................................................................................................................
Associating The Track Module With An Application Module117................................................................................................................................................................
Displaying And Maintaining Track Entries118................................................................................................................................................................
Support And Other Resources124................................................................................................................................................................
Conventions125................................................................................................................................................................
Index127................................................................................................................................................................

Advertising

HP A5120 EI Series Command Reference Manual

HP A5120 EI Series Command Reference Manual (82 pages)

Brand: HP | Category: Network Router | Size: 0.54 MB
Table of contents
Command Reference1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Display Igmp-snooping Group6................................................................................................................................................................
Display Igmp-snooping Statistics7................................................................................................................................................................
Display Mac-address Multicast8................................................................................................................................................................
Dot1p-priority (igmp Snooping View)10................................................................................................................................................................
Group-policy (igmp Snooping View)11................................................................................................................................................................
Host-aging-time (igmp Snooping View)12................................................................................................................................................................
Igmp-snooping13................................................................................................................................................................
Igmp-snooping Dot1p-priority14................................................................................................................................................................
Igmp-snooping Drop-unknown15................................................................................................................................................................
Igmp-snooping Fast-leave16................................................................................................................................................................
Igmp-snooping General-query Source-ip17................................................................................................................................................................
Igmp-snooping Group-limit18................................................................................................................................................................
Igmp-snooping Host-aging-time19................................................................................................................................................................
Igmp-snooping Host-join20................................................................................................................................................................
Igmp-snooping Last-member-query-interval21................................................................................................................................................................
Igmp-snooping Leave Source-ip22................................................................................................................................................................
Igmp-snooping Max-response-time23................................................................................................................................................................
Igmp-snooping Proxying Enable24................................................................................................................................................................
Igmp-snooping Querier25................................................................................................................................................................
Igmp-snooping Query-interval26................................................................................................................................................................
Igmp-snooping Router-aging-time27................................................................................................................................................................
Igmp-snooping Router-port-deny28................................................................................................................................................................
Igmp-snooping Source-deny29................................................................................................................................................................
Igmp-snooping Static-group30................................................................................................................................................................
Igmp-snooping Static-router-port31................................................................................................................................................................
Igmp-snooping Version32................................................................................................................................................................
Mac-address Multicast33................................................................................................................................................................
Max-response-time (igmp Snooping View)34................................................................................................................................................................
Overflow-replace (igmp Snooping View)35................................................................................................................................................................
Reset Igmp-snooping Group36................................................................................................................................................................
Router-aging-time (igmp Snooping View)37................................................................................................................................................................
Display Multicast-vlan39................................................................................................................................................................
Multicast-vlan40................................................................................................................................................................
Port (multicast Vlan View)41................................................................................................................................................................
Subvlan (multicast Vlan View)42................................................................................................................................................................
Mld Snooping Configuration Commands43................................................................................................................................................................
Display Mld-snooping Statistics44................................................................................................................................................................
Dot1p-priority (mld Snooping View)46................................................................................................................................................................
Group-policy (mld Snooping View)47................................................................................................................................................................
Host-aging-time (mld Snooping View)48................................................................................................................................................................
Max-response-time (mld Snooping View)49................................................................................................................................................................
Mld-snooping50................................................................................................................................................................
Mld-snooping Done Source-ip51................................................................................................................................................................
Mld-snooping Dot1p-priority52................................................................................................................................................................
Mld-snooping Drop-unknown53................................................................................................................................................................
Mld-snooping Fast-leave54................................................................................................................................................................
Mld-snooping General-query Source-ip55................................................................................................................................................................
Mld-snooping Group-limit56................................................................................................................................................................
Mld-snooping Host-aging-time58................................................................................................................................................................
Mld-snooping Last-listener-query-interval59................................................................................................................................................................
Mld-snooping Max-response-time60................................................................................................................................................................
Mld-snooping Overflow-replace61................................................................................................................................................................
Mld-snooping Proxying Enable62................................................................................................................................................................
Mld-snooping Query-interval63................................................................................................................................................................
Mld-snooping Report Source-ip64................................................................................................................................................................
Mld-snooping Router-aging-time65................................................................................................................................................................
Mld-snooping Source-deny66................................................................................................................................................................
Mld-snooping Special-query Source-ip67................................................................................................................................................................
Mld-snooping Static-router-port68................................................................................................................................................................
Mld-snooping Version69................................................................................................................................................................
Overflow-replace (mld Snooping View)70................................................................................................................................................................
Report-aggregation (mld Snooping View)71................................................................................................................................................................
Reset Mld-snooping Statistics72................................................................................................................................................................
Source-deny (mld Snooping View)73................................................................................................................................................................
Ipv6 Multicast Vlan Configuration Commands74................................................................................................................................................................
Multicast-vlan Ipv675................................................................................................................................................................
Port (ipv6 Multicast Vlan View)76................................................................................................................................................................
Subvlan (ipv6 Multicast Vlan View)77................................................................................................................................................................
Support And Other Resources78................................................................................................................................................................
Conventions79................................................................................................................................................................
HP A5120 EI Series Configuration Manual

HP A5120 EI Series Configuration Manual (77 pages)

ACL and QoS  
Brand: HP | Category: Switch | Size: 0.81 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Acl Configuration6................................................................................................................................................................
Acl Numbering And Naming7................................................................................................................................................................
Acl Rule Numbering8................................................................................................................................................................
Acl Configuration Task List9................................................................................................................................................................
Configuring An Advanced Acl11................................................................................................................................................................
Configuring An Ethernet Frame Header Acl13................................................................................................................................................................
Copying An Acl14................................................................................................................................................................
Packet Filtering With Acls15................................................................................................................................................................
Displaying And Maintaining Acls16................................................................................................................................................................
Acl Configuration Examples17................................................................................................................................................................
Ipv6 Acl Application Configuration Example18................................................................................................................................................................
Qos Overview19................................................................................................................................................................
Qos Techniques Overview20................................................................................................................................................................
Qos Configuration Approaches21................................................................................................................................................................
Defining A Class22................................................................................................................................................................
Defining A Traffic Behavior24................................................................................................................................................................
Applying The Qos Policy25................................................................................................................................................................
Applying The Qos Policy Globally26................................................................................................................................................................
Displaying And Maintaining Qos Policies27................................................................................................................................................................
Priority Mapping Configuration29................................................................................................................................................................
Priority Trust Mode On A Port30................................................................................................................................................................
Priority Mapping Configuration Task List31................................................................................................................................................................
Configuring Priority Mapping32................................................................................................................................................................
Changing The Port Priority Of An Interface33................................................................................................................................................................
Priority Mapping Table And Priority Marking Configuration Example34................................................................................................................................................................
Traffic Policing, Traffic Shaping, And Line Rate Configuration38................................................................................................................................................................
Traffic Policing39................................................................................................................................................................
Traffic Shaping40................................................................................................................................................................
Line Rate41................................................................................................................................................................
Configuring Gts42................................................................................................................................................................
Configuring The Line Rate43................................................................................................................................................................
Congestion Management Configuration44................................................................................................................................................................
Configuring Sp Queuing47................................................................................................................................................................
Configure Wrr Queuing48................................................................................................................................................................
Configuring Wfq Queuing49................................................................................................................................................................
Configuring Sp+wrr Queues50................................................................................................................................................................
Traffic Filtering Configuration52................................................................................................................................................................
Traffic Filtering Configuration Example53................................................................................................................................................................
Priority Marking Configuration55................................................................................................................................................................
Priority Marking Configuration Example56................................................................................................................................................................
Configuration Procedure57................................................................................................................................................................
Traffic Redirecting Configuration59................................................................................................................................................................
Class-based Accounting Configuration61................................................................................................................................................................
Class-based Accounting Configuration Example62................................................................................................................................................................
Data Buffer Configuration64................................................................................................................................................................
Configuring The Data Buffer65................................................................................................................................................................
Using The Burst Function To Configure The Data Buffer Setup66................................................................................................................................................................
Configuring The Minimum Guaranteed Cell Resource Size For A Queue67................................................................................................................................................................
Configuring The Packet Resource68................................................................................................................................................................
Appendix A Default Priority Mapping Tables69................................................................................................................................................................
Appendix B Introduction To Packet Precedences70................................................................................................................................................................
P Priority71................................................................................................................................................................
Support And Other Resources73................................................................................................................................................................
Conventions74................................................................................................................................................................
Index76................................................................................................................................................................

Share and save

Advertising