HP A5820X Series Manuals

Manuals and User Guides for HP A5820X Series. We have 2 HP A5820X Series manuals available for free PDF download: Configuration Manual

HP A5820X Series Configuration Manual

HP A5820X Series Configuration Manual (200 pages)

Brand: HP | Category: Switch | Size: 2.03 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring The Cli8................................................................................................................................................................
Command Conventions9................................................................................................................................................................
Undo Form Of A Command10................................................................................................................................................................
Entering System View11................................................................................................................................................................
Using Online Help12................................................................................................................................................................
Editing Command Lines13................................................................................................................................................................
Configuring Cli Hotkeys14................................................................................................................................................................
Redisplaying Entered But Not Submitted Commands15................................................................................................................................................................
Checking Command Line Errors16................................................................................................................................................................
Controlling The Cli Display17................................................................................................................................................................
Filtering Output Information18................................................................................................................................................................
Configuring User Privilege And Command Levels21................................................................................................................................................................
Configuring A User Privilege Level22................................................................................................................................................................
Modifying The Level Of A Command27................................................................................................................................................................
Saving The Current Configuration28................................................................................................................................................................
Login Methods29................................................................................................................................................................
Users And User Interfaces30................................................................................................................................................................
Numbering User Interfaces31................................................................................................................................................................
Cli Login32................................................................................................................................................................
Login Procedure33................................................................................................................................................................
Console Login Authentication Modes35................................................................................................................................................................
Configuring None Authentication For Console Login36................................................................................................................................................................
Configuring Password Authentication For Console Login37................................................................................................................................................................
Configuring Scheme Authentication For Console Login39................................................................................................................................................................
Configuring Common Settings For Console Login (optional)42................................................................................................................................................................
Logging In Through Telnet43................................................................................................................................................................
Telnet Login Authentication Modes44................................................................................................................................................................
Configuring None Authentication For Telnet Login45................................................................................................................................................................
Configuring Password Authentication For Telnet Login47................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login48................................................................................................................................................................
Configuring Common Settings For Vty User Interfaces (optional)51................................................................................................................................................................
Configuring The Device To Log In To A Telnet Server As A Telnet Client53................................................................................................................................................................
Logging In Through Ssh54................................................................................................................................................................
Configuring The Ssh Client To Log In To The Ssh Server57................................................................................................................................................................
Logging In Through Modems58................................................................................................................................................................
Modem Login Authentication Modes61................................................................................................................................................................
Configuring None Authentication For Modem Login62................................................................................................................................................................
Configuring Password Authentication For Modem Login63................................................................................................................................................................
Configuring Scheme Authentication For Modem Login65................................................................................................................................................................
Configuring Common Settings For Modem Login (optional)68................................................................................................................................................................
Displaying And Maintaining Cli Login70................................................................................................................................................................
Web Login71................................................................................................................................................................
Configuring Http Login72................................................................................................................................................................
Configuring Https Login73................................................................................................................................................................
Displaying And Maintaining Web Login75................................................................................................................................................................
Https Login Example76................................................................................................................................................................
Nms Login79................................................................................................................................................................
Configuring Snmpv1 And Snmpv2c Settings80................................................................................................................................................................
Configuring Snmpv3 Settings81................................................................................................................................................................
User Login Control84................................................................................................................................................................
Configuring Source And Destination Ip-based Login Control Over Telnet Users85................................................................................................................................................................
Source Mac-based Login Control Configuration Example86................................................................................................................................................................
Configuring Source Ip-based Login Control Over Nms Users87................................................................................................................................................................
Source Ip-based Login Control Over Nms Users Configuration Example88................................................................................................................................................................
Configuring Source Ip-based Login Control Over Web Users89................................................................................................................................................................
Logging Off Online Web Users90................................................................................................................................................................
Configuring Ftp91................................................................................................................................................................
Configuring The Ftp Client92................................................................................................................................................................
Operating Ftp Server Directories94................................................................................................................................................................
Using Another Username To Log In To An Ftp Server95................................................................................................................................................................
Maintaining And Debugging An Ftp Connection96................................................................................................................................................................
Ftp Client Configuration Example98................................................................................................................................................................
Network Requirements98................................................................................................................................................................
Configuring The Ftp Server99................................................................................................................................................................
Configuring Authentication And Authorization On The Ftp Server100................................................................................................................................................................
Ftp Server Configuration Example101................................................................................................................................................................
Displaying And Maintaining Ftp105................................................................................................................................................................
Configuring Tftp106................................................................................................................................................................
Configuring The Tftp Client107................................................................................................................................................................
Displaying And Maintaining The Tftp Client108................................................................................................................................................................
Tftp Client Configuration Example109................................................................................................................................................................
Tftp Client Configuration (irf Mode) Example110................................................................................................................................................................
File Management112................................................................................................................................................................
Displaying Directory Information113................................................................................................................................................................
Performing File Operations114................................................................................................................................................................
Deleting A File115................................................................................................................................................................
Performing Storage Media Operations116................................................................................................................................................................
Setting Prompt Modes117................................................................................................................................................................
File Operation Example118................................................................................................................................................................
Configuration File Management119................................................................................................................................................................
Configuration File Format And Content120................................................................................................................................................................
Startup With The Configuration File121................................................................................................................................................................
Setting Configuration Rollback124................................................................................................................................................................
Configuring Parameters For Saving The Running Configuration125................................................................................................................................................................
Enabling Automatic Saving Of The Running Configuration126................................................................................................................................................................
Manually Saving The Running Configuration127................................................................................................................................................................
Specifying A Startup Configuration File To Be Used At The Next System Startup128................................................................................................................................................................
Deleting A Startup Configuration File To Be Used At The Next Startup129................................................................................................................................................................
Displaying And Maintaining A Configuration File130................................................................................................................................................................
Configuring Software Upgrade131................................................................................................................................................................
Software Upgrade Methods132................................................................................................................................................................
Upgrading The Boot Rom Program Through A System Reboot133................................................................................................................................................................
Upgrading The Boot File Through A System Reboot134................................................................................................................................................................
Upgrading Irf Member Switch Boot File135................................................................................................................................................................
Software Upgrade By Installing Hotfixes136................................................................................................................................................................
Configuration Prerequisites139................................................................................................................................................................
One-step Patch Installation140................................................................................................................................................................
Step-by-step Patch Uninstallation141................................................................................................................................................................
Hotfix Configuration Example143................................................................................................................................................................
Configuring Issu145................................................................................................................................................................
Issu Process146................................................................................................................................................................
Boot File Version Rollback147................................................................................................................................................................
Enabling Version Compatibility Check149................................................................................................................................................................
Configuring The Issu Version Rollback Timer152................................................................................................................................................................
Performing Manual Version Rollback153................................................................................................................................................................
Network Diagram154................................................................................................................................................................
Configuration Procedure155................................................................................................................................................................
Issu Upgrade Preparation157................................................................................................................................................................
Performing Compatible Issu Upgrade161................................................................................................................................................................
Performing Incompatible Issu Upgrade162................................................................................................................................................................
Configuring Device Management164................................................................................................................................................................
Displaying The System Clock165................................................................................................................................................................
Enabling The Display Of Copyright Information168................................................................................................................................................................
Input Modes169................................................................................................................................................................
Configuring The Exception Handling Method170................................................................................................................................................................
Configuring Scheduled Tasks172................................................................................................................................................................
Configuring The Fan Ventilation Direction174................................................................................................................................................................
Clearing The 16-bit Interface Indexes Not Used In The Current System176................................................................................................................................................................
Identifying Pluggable Transceivers177................................................................................................................................................................
Displaying And Maintaining Device Management Configuration178................................................................................................................................................................
Automatic Configuration180................................................................................................................................................................
How Automatic Configuration Works181................................................................................................................................................................
Using Dhcp To Obtain An Ip Address And Other Configuration Information182................................................................................................................................................................
Obtaining The Configuration File From The Tftp Server183................................................................................................................................................................
Executing The Configuration File185................................................................................................................................................................
Support And Other Resources186................................................................................................................................................................
Conventions187................................................................................................................................................................
Index189................................................................................................................................................................

Advertising

HP A5820X Series Configuration Manual

HP A5820X Series Configuration Manual (45 pages)

Brand: HP | Category: Switch | Size: 0.7 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Irf Configuration4................................................................................................................................................................
Application Scenario5................................................................................................................................................................
Establishment, Operation, And Maintenance Of An Irf Virtual Device7................................................................................................................................................................
Topology Collection10................................................................................................................................................................
Irf Multi-active Detection12................................................................................................................................................................
Irf Virtual Device Configuration Task List13................................................................................................................................................................
Configuring An Irf Virtual Device14................................................................................................................................................................
Changing The Irf Member Id Of A Switch16................................................................................................................................................................
Specifying A Priority For A Member Switch18................................................................................................................................................................
Specifying The Preservation Time Of Bridge Mac Address20................................................................................................................................................................
Enabling Automatic Boot File Updating21................................................................................................................................................................
Setting The Irf Link Down Report Delay22................................................................................................................................................................
Configuring Lacp Mad23................................................................................................................................................................
Configuring Bfd Mad25................................................................................................................................................................
Accessing An Irf Virtual Device31................................................................................................................................................................
Displaying And Maintaining An Irf Virtual Device32................................................................................................................................................................
Irf Virtual Device Configuration Examples33................................................................................................................................................................
Configuration Procedure34................................................................................................................................................................
Bfd Mad Detection-enabled Irf Configuration Example35................................................................................................................................................................
Support And Other Resources41................................................................................................................................................................
Conventions42................................................................................................................................................................
Basic Concepts44................................................................................................................................................................

Share and save

Advertising