HP A5830 Series Manuals

Manuals and User Guides for HP A5830 Series. We have 5 HP A5830 Series manuals available for free PDF download: Configuration Manual, Command Reference Manual

HP A5830 Series Configuration Manual

HP A5830 Series Configuration Manual (280 pages)

Security Switch  
Brand: HP | Category: Switch | Size: 2.27 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Aaa9................................................................................................................................................................
Radius10................................................................................................................................................................
Hwtacacs15................................................................................................................................................................
Domain-based User Management17................................................................................................................................................................
Radius Server Feature Of The Switch18................................................................................................................................................................
Protocols And Standards19................................................................................................................................................................
Radius Attributes19................................................................................................................................................................
Aaa Configuration Considerations And Task List22................................................................................................................................................................
Configuring Aaa Schemes24................................................................................................................................................................
Configuring Local Users24................................................................................................................................................................
Configuring Radius Schemes28................................................................................................................................................................
Configuring Hwtacacs Schemes39................................................................................................................................................................
Configuring Aaa Methods For Isp Domains44................................................................................................................................................................
Configuration Prerequisites44................................................................................................................................................................
Creating An Isp Domain44................................................................................................................................................................
Configuring Isp Domain Attributes45................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain46................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain47................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain49................................................................................................................................................................
Tearing Down User Connections50................................................................................................................................................................
Configuring A Nas Id-vlan Binding50................................................................................................................................................................
Configuring A Switch As A Radius Server51................................................................................................................................................................
Radius Server Functions Configuration Task List51................................................................................................................................................................
Configuring A Radius User51................................................................................................................................................................
Specifying A Radius Client52................................................................................................................................................................
Displaying And Maintaining Aaa52................................................................................................................................................................
Aaa Configuration Examples52................................................................................................................................................................
Aaa For Telnet Users By An Hwtacacs Server52................................................................................................................................................................
Aaa For Telnet Users By Separate Servers54................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server55................................................................................................................................................................
Aaa For 802.1x Users By A Radius Server58................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server64................................................................................................................................................................
Radius Authentication And Authorization For Telnet Users By A Switch67................................................................................................................................................................
Troubleshooting Aaa69................................................................................................................................................................
Troubleshooting Radius69................................................................................................................................................................
Troubleshooting Hwtacacs70................................................................................................................................................................
802.1x Fundamentals71................................................................................................................................................................
802.1x Architecture71................................................................................................................................................................
Controlled/uncontrolled Port And Port Authorization Status71................................................................................................................................................................
802.1x-related Protocols72................................................................................................................................................................
Packet Formats72................................................................................................................................................................
Eap Over Radius73................................................................................................................................................................
Initiating 802.1x Authentication74................................................................................................................................................................
802.1x Client As The Initiator74................................................................................................................................................................
Access Device As The Initiator74................................................................................................................................................................
802.1x Authentication Procedures74................................................................................................................................................................
A Comparison Of Eap Relay And Eap Termination75................................................................................................................................................................
Eap Relay75................................................................................................................................................................
Eap Termination78................................................................................................................................................................
Configuring 802.1x79................................................................................................................................................................
Hp Implementation Of 802.1x79................................................................................................................................................................
Access Control Methods79................................................................................................................................................................
Using 802.1x Authentication With Other Features79................................................................................................................................................................
802.1x Configuration Task List82................................................................................................................................................................
Enabling 802.1x82................................................................................................................................................................
Enabling Eap Relay Or Eap Termination83................................................................................................................................................................
Setting The Port Authorization State83................................................................................................................................................................
Specifying An Access Control Method84................................................................................................................................................................
Setting The Maximum Number Of Concurrent 802.1x Users On A Port84................................................................................................................................................................
Setting The Maximum Number Of Authentication Request Attempts85................................................................................................................................................................
Setting The 802.1x Authentication Timeout Timers85................................................................................................................................................................
Configuring The Online User Handshake Function86................................................................................................................................................................
Configuring The Authentication Trigger Function86................................................................................................................................................................
Specifying A Mandatory Authentication Domain On A Port87................................................................................................................................................................
Configuring The Quiet Timer88................................................................................................................................................................
Enabling The Periodic Online User Re-authentication Function88................................................................................................................................................................
Configuring An 802.1x Guest Vlan89................................................................................................................................................................
Configuring An Auth-fail Vlan90................................................................................................................................................................
Specifying Supported Domain Name Delimiters91................................................................................................................................................................
Displaying And Maintaining 802.1x91................................................................................................................................................................
802.1x Configuration Examples91................................................................................................................................................................
802.1x Authentication Configuration Example91................................................................................................................................................................
With Guest Vlan And Vlan Assignment Configuration Example94................................................................................................................................................................
802.1x With Acl Assignment Configuration Example97................................................................................................................................................................
Configuring Ead Fast Deployment99................................................................................................................................................................
Ead Fast Deployment Implementation99................................................................................................................................................................
Configuration Procedure99................................................................................................................................................................
Displaying And Maintaining Ead Fast Deployment100................................................................................................................................................................
Ead Fast Deployment Configuration Example101................................................................................................................................................................
Troubleshooting Ead Fast Deployment103................................................................................................................................................................
Web Browser Users Cannot Be Correctly Redirected103................................................................................................................................................................
Configuring Mac Authentication104................................................................................................................................................................
User Account Policies104................................................................................................................................................................
Authentication Approaches104................................................................................................................................................................
Mac Authentication Timers105................................................................................................................................................................
Using Mac Authentication With Other Features105................................................................................................................................................................
Vlan Assignment105................................................................................................................................................................
Acl Assignment105................................................................................................................................................................
Guest Vlan105................................................................................................................................................................
Mac Authentication Configuration Task List106................................................................................................................................................................
Basic Configuration For Mac Authentication106................................................................................................................................................................
Specifying An Authentication Domain For Mac Authentication Users107................................................................................................................................................................
Configuring A Mac Authentication Guest Vlan108................................................................................................................................................................
Displaying And Maintaining Mac Authentication109................................................................................................................................................................
Mac Authentication Configuration Examples109................................................................................................................................................................
Local Mac Authentication Configuration Example109................................................................................................................................................................
Radius-based Mac Authentication Configuration Example111................................................................................................................................................................
Acl Assignment Configuration Example113................................................................................................................................................................
Configuring Port Security115................................................................................................................................................................
Port Security Features115................................................................................................................................................................
Port Security Modes115................................................................................................................................................................
Support For Guest Vlan And Auth-fail Vlan118................................................................................................................................................................
Port Security Configuration Task List118................................................................................................................................................................
Enabling Port Security119................................................................................................................................................................
Setting Port Security's Limit On The Number Of Mac Addresses On A Port119................................................................................................................................................................
Setting The Port Security Mode120................................................................................................................................................................
Configuring Port Security Features121................................................................................................................................................................
Configuring Ntk121................................................................................................................................................................
Configuring Intrusion Protection121................................................................................................................................................................
Enabling Port Security Traps122................................................................................................................................................................
Configuring Secure Mac Addresses122................................................................................................................................................................
Ignoring Authorization Information From The Server123................................................................................................................................................................
Displaying And Maintaining Port Security124................................................................................................................................................................
Port Security Configuration Examples124................................................................................................................................................................
Configuring The Autolearn Mode124................................................................................................................................................................
Configuring The Userloginwithoui Mode127................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode131................................................................................................................................................................
Troubleshooting Port Security134................................................................................................................................................................
Cannot Set The Port Security Mode134................................................................................................................................................................
Cannot Configure Secure Mac Addresses134................................................................................................................................................................
Cannot Change Port Security Mode When A User Is Online134................................................................................................................................................................
Configuring Password Control136................................................................................................................................................................
Password Control Configuration Task List138................................................................................................................................................................
Enabling Password Control139................................................................................................................................................................
Setting Global Password Control Parameters139................................................................................................................................................................
Setting User Group Password Control Parameters140................................................................................................................................................................
Setting Local User Password Control Parameters141................................................................................................................................................................
Setting Super Password Control Parameters141................................................................................................................................................................
Setting A Local User Password In Interactive Mode142................................................................................................................................................................
Displaying And Maintaining Password Control142................................................................................................................................................................
Password Control Configuration Example143................................................................................................................................................................
Configuring Public Keys146................................................................................................................................................................
Public Key Configuration Task List146................................................................................................................................................................
Configuring A Local Asymmetric Key Pair On The Local Device147................................................................................................................................................................
Creating A Local Asymmetric Key Pair147................................................................................................................................................................
Displaying Or Exporting The Local Host Public Key147................................................................................................................................................................
Destroying A Local Asymmetric Key Pair149................................................................................................................................................................
Specifying The Peer Public Key On The Local Device149................................................................................................................................................................
Displaying And Maintaining Public Keys150................................................................................................................................................................
Public Key Configuration Examples150................................................................................................................................................................
Manually Specifying The Peer Public Key On The Local Device150................................................................................................................................................................
Importing A Public Key From A Public Key File152................................................................................................................................................................
Configuring Pki155................................................................................................................................................................
Pki Terms155................................................................................................................................................................
Pki Architecture156................................................................................................................................................................
Pki Applications157................................................................................................................................................................
Pki Operation157................................................................................................................................................................
Pki Configuration Task List157................................................................................................................................................................
Configuring An Entity Dn158................................................................................................................................................................
Configuring A Pki Domain159................................................................................................................................................................
Submitting A Pki Certificate Request161................................................................................................................................................................
Submitting A Certificate Request In Auto Mode161................................................................................................................................................................
Submitting A Certificate Request In Manual Mode161................................................................................................................................................................
Retrieving A Certificate Manually162................................................................................................................................................................
Configuring Pki Certificate Verification163................................................................................................................................................................
Configuring Crl-checking-enabled Pki Certificate Verification163................................................................................................................................................................
Configuring Crl-checking-disabled Pki Certificate Verification164................................................................................................................................................................
Destroying A Local Rsa Key Pair164................................................................................................................................................................
Deleting A Certificate164................................................................................................................................................................
Configuring An Access Control Policy165................................................................................................................................................................
Displaying And Maintaining Pki165................................................................................................................................................................
Pki Configuration Examples166................................................................................................................................................................
Requesting A Certificate From A Ca Server Running Rsa Keon166................................................................................................................................................................
Requesting A Certificate From A Ca Server Running Windows ® 2003 Server169................................................................................................................................................................
Configuring A Certificate Attribute-based Access Control Policy172................................................................................................................................................................
Troubleshooting Pki174................................................................................................................................................................
Failed To Retrieve A Ca Certificate174................................................................................................................................................................
Failed To Request A Local Certificate174................................................................................................................................................................
Failed To Retrieve Crls175................................................................................................................................................................
Configuring Ssh2.0176................................................................................................................................................................
Ssh Operation176................................................................................................................................................................
Configuring The Switch As An Ssh Server178................................................................................................................................................................
Ssh Server Configuration Task List178................................................................................................................................................................
Generating A Dsa Or Rsa Key Pair179................................................................................................................................................................
Enabling The Ssh Server Function179................................................................................................................................................................
Configuring The User Interfaces For Ssh Clients179................................................................................................................................................................
Configuring A Client Public Key180................................................................................................................................................................
Configuring An Ssh User181................................................................................................................................................................
Setting The Ssh Management Parameters182................................................................................................................................................................
Configuring The Switch As An Ssh Client183................................................................................................................................................................
Ssh Client Configuration Task List183................................................................................................................................................................
Specifying A Source Ip Address/interface For The Ssh Client183................................................................................................................................................................
Configuring Whether First-time Authentication Is Supported183................................................................................................................................................................
Establishing A Connection Between The Ssh Client And Server184................................................................................................................................................................
Displaying And Maintaining Ssh185................................................................................................................................................................
Ssh Server Configuration Examples185................................................................................................................................................................
When The Switch Acts As A Server For Password Authentication185................................................................................................................................................................
When The Switch Acts As A Server For Publickey Authentication187................................................................................................................................................................
Ssh Client Configuration Examples192................................................................................................................................................................
When The Switch Acts As Client For Password Authentication192................................................................................................................................................................
When The Switch Acts As Client For Publickey Authentication195................................................................................................................................................................
Configuring Sftp198................................................................................................................................................................
Configuring The Switch As An Sftp Server198................................................................................................................................................................
Enabling The Sftp Server198................................................................................................................................................................
Configuring The Sftp Connection Idle Timeout Period198................................................................................................................................................................
Configuring The Switch As An Sftp Client199................................................................................................................................................................
Specifying A Source Ip Address Or Interface For The Sftp Client199................................................................................................................................................................
Establishing A Connection To The Sftp Server199................................................................................................................................................................
Working With Sftp Directories199................................................................................................................................................................
Working With Sftp Files200................................................................................................................................................................
Displaying Help Information201................................................................................................................................................................
Terminating The Connection To The Remote Sftp Server201................................................................................................................................................................
Sftp Client Configuration Example201................................................................................................................................................................
Sftp Server Configuration Example205................................................................................................................................................................
Configuring Ssl208................................................................................................................................................................
Ssl Security Mechanism208................................................................................................................................................................
Ssl Protocol Stack208................................................................................................................................................................
Ssl Configuration Task List209................................................................................................................................................................
Configuring An Ssl Server Policy209................................................................................................................................................................
Ssl Server Policy Configuration Example210................................................................................................................................................................
Configuring An Ssl Client Policy212................................................................................................................................................................
Displaying And Maintaining Ssl213................................................................................................................................................................
Troubleshooting Ssl213................................................................................................................................................................
Ssl Handshake Failure213................................................................................................................................................................
Configuring Tcp Attack Protection215................................................................................................................................................................
Enabling The Syn Cookie Feature215................................................................................................................................................................
Displaying And Maintaining Tcp Attack Protection215................................................................................................................................................................
Configuring Ip Source Guard216................................................................................................................................................................
Static Ip Source Guard Binding Entries216................................................................................................................................................................
Dynamic Ip Source Guard Binding Entries217................................................................................................................................................................
Ip Source Guard Configuration Task List217................................................................................................................................................................
Configuring The Ipv4 Source Guard Function217................................................................................................................................................................
Configuring Ipv4 Source Guard On A Port217................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Binding Entry218................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Binding Entries219................................................................................................................................................................
Configuring The Ipv6 Source Guard Function219................................................................................................................................................................
Configuring Ipv6 Source Guard On A Port219................................................................................................................................................................
Configuring A Static Ipv6 Source Guard Binding Entry220................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Source Guard Binding Entries221................................................................................................................................................................
Displaying And Maintaining Ip Source Guard221................................................................................................................................................................
Ip Source Guard Configuration Examples222................................................................................................................................................................
Static Ipv4 Source Guard Binding Entry Configuration Example222................................................................................................................................................................
Dynamic Ipv4 Source Guard Binding By Dhcp Snooping Configuration Example224................................................................................................................................................................
Dynamic Ipv4 Source Guard Binding By Dhcp Relay Configuration Example225................................................................................................................................................................
Static Ipv6 Source Guard Binding Entry Configuration Example227................................................................................................................................................................
Dynamic Ipv6 Source Guard Binding By Dhcpv6 Snooping Configuration Example227................................................................................................................................................................
Dynamic Ipv6 Source Guard Binding By Nd Snooping Configuration Example229................................................................................................................................................................
Troubleshooting Ip Source Guard230................................................................................................................................................................
Cannot Configure Static Binding Entries Or Dynamic Binding Function230................................................................................................................................................................
Configuring Arp Attack Protection231................................................................................................................................................................
Arp Attack Protection Configuration Task List231................................................................................................................................................................
Configuring Arp Defense Against Ip Packet Attacks232................................................................................................................................................................
Configuring Arp Source Suppression232................................................................................................................................................................
Enabling Arp Black Hole Routing233................................................................................................................................................................
Displaying And Maintaining Arp Defense Against Ip Packet Attacks233................................................................................................................................................................
Arp Defense Against Ip Packet Attack Configuration Example233................................................................................................................................................................
Configuring Arp Packet Rate Limit234................................................................................................................................................................
Configuring Source Mac Address-based Arp Attack Detection235................................................................................................................................................................
Displaying And Maintaining Source Mac Address-based Arp Attack Detection235................................................................................................................................................................
Source Mac Address-based Arp Attack Detection Configuration Example236................................................................................................................................................................
Configuring Arp Packet Source Mac Address Consistency Check237................................................................................................................................................................
Configuring Arp Active Acknowledgement237................................................................................................................................................................
Configuring Arp Detection237................................................................................................................................................................
Security Entries238................................................................................................................................................................
Configuring Arp Detection Based On Specified Objects239................................................................................................................................................................
Configuring Arp Restricted Forwarding240................................................................................................................................................................
Displaying And Maintaining Arp Detection240................................................................................................................................................................
Arp Detection Configuration Example 1240................................................................................................................................................................
Arp Detection Configuration Example 2242................................................................................................................................................................
Arp Restricted Forwarding Configuration Example243................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp245................................................................................................................................................................
Configuring Nd Attack Defense247................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets248................................................................................................................................................................
Configuring The Nd Detection Function248................................................................................................................................................................
Configuring Nd Detection249................................................................................................................................................................
Displaying And Maintaining Nd Detection249................................................................................................................................................................
Nd Detection Configuration Example249................................................................................................................................................................
Network Diagram250................................................................................................................................................................
Configuring Urpf252................................................................................................................................................................
Urpf Check Modes252................................................................................................................................................................
How Urpf Works252................................................................................................................................................................
Network Application255................................................................................................................................................................
Urpf Configuration255................................................................................................................................................................
Urpf Configuration Examples255................................................................................................................................................................
Support And Other Resources257................................................................................................................................................................
Contacting Hp257................................................................................................................................................................
Subscription Service257................................................................................................................................................................
Related Information257................................................................................................................................................................
Documents257................................................................................................................................................................
Websites257................................................................................................................................................................
Conventions258................................................................................................................................................................
Index260................................................................................................................................................................

Advertisement

HP A5830 Series Command Reference Manual

HP A5830 Series Command Reference Manual (249 pages)

Layer 2 - LAN Switching  
Brand: HP | Category: Switch | Size: 2.23 MB
Table of contents
Command Reference1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Ethernet Interface Configuration Commands8................................................................................................................................................................
General Ethernet Interface Configuration Commands8................................................................................................................................................................
Default8................................................................................................................................................................
Description8................................................................................................................................................................
Display Counters9................................................................................................................................................................
Display Counters Rate10................................................................................................................................................................
Display Interface12................................................................................................................................................................
Display Packet-drop Interface21................................................................................................................................................................
Display Packet-drop Summary22................................................................................................................................................................
Display Port Combo23................................................................................................................................................................
Duplex23................................................................................................................................................................
Flow-interval24................................................................................................................................................................
Interface25................................................................................................................................................................
Jumboframe Enable25................................................................................................................................................................
Link-delay26................................................................................................................................................................
Loopback27................................................................................................................................................................
Port Link-mode27................................................................................................................................................................
Port Link-mode Interface-list28................................................................................................................................................................
Reset Counters Interface29................................................................................................................................................................
Reset Packet-drop Interface30................................................................................................................................................................
Shutdown30................................................................................................................................................................
Speed31................................................................................................................................................................
Layer 2 Ethernet Interface Configuration Commands32................................................................................................................................................................
Broadcast-suppression32................................................................................................................................................................
Display Loopback-detection33................................................................................................................................................................
Display Port-group Manual34................................................................................................................................................................
Group-member35................................................................................................................................................................
Loopback-detection Action36................................................................................................................................................................
Loopback-detection Control Enable37................................................................................................................................................................
Loopback-detection Enable37................................................................................................................................................................
Loopback-detection Interval-time38................................................................................................................................................................
Loopback-detection Per-vlan Enable39................................................................................................................................................................
Mdi40................................................................................................................................................................
Multicast-suppression40................................................................................................................................................................
Port Auto-power-down42................................................................................................................................................................
Port-group Manual42................................................................................................................................................................
Speed Auto43................................................................................................................................................................
Unicast-suppression44................................................................................................................................................................
Virtual-cable-test45................................................................................................................................................................
Layer 3 Ethernet Interface Configuration Commands46................................................................................................................................................................
Mtu46................................................................................................................................................................
Loopback And Null Interface Configuration Commands47................................................................................................................................................................
Display Interface Loopback48................................................................................................................................................................
Display Interface Null51................................................................................................................................................................
Interface Loopback53................................................................................................................................................................
Interface Null53................................................................................................................................................................
Reset Counters Interface Loopback54................................................................................................................................................................
Reset Counters Interface Null54................................................................................................................................................................
Mac Address Table Configuration Commands56................................................................................................................................................................
Display Mac-address56................................................................................................................................................................
Display Mac-address Aging-time57................................................................................................................................................................
Display Mac-address Statistics58................................................................................................................................................................
Mac-address (interface View)59................................................................................................................................................................
Mac-address (system View)60................................................................................................................................................................
Mac-address Mac-learning Disable61................................................................................................................................................................
Mac-address Max-mac-count62................................................................................................................................................................
Mac-address Timer63................................................................................................................................................................
Mac Information Configuration Commands65................................................................................................................................................................
Mac-address Information Enable (ethernet Interface View)65................................................................................................................................................................
Mac-address Information Enable (system View)65................................................................................................................................................................
Mac-address Information Interval66................................................................................................................................................................
Mac-address Information Mode67................................................................................................................................................................
Mac-address Information Queue-length67................................................................................................................................................................
Ethernet Link Aggregation Configuration Commands69................................................................................................................................................................
Display Lacp System-id73................................................................................................................................................................
Display Link-aggregation Load-sharing Mode74................................................................................................................................................................
Display Link-aggregation Member-port76................................................................................................................................................................
Display Link-aggregation Summary78................................................................................................................................................................
Display Link-aggregation Verbose80................................................................................................................................................................
Enable Snmp Trap Updown82................................................................................................................................................................
Interface Bridge-aggregation83................................................................................................................................................................
Lacp Period Short84................................................................................................................................................................
Lacp System-priority84................................................................................................................................................................
Link-aggregation Lacp Traffic-redirect-notification Enable85................................................................................................................................................................
Link-aggregation Load-sharing Mode85................................................................................................................................................................
Link-aggregation Load-sharing Mode Local-first87................................................................................................................................................................
Link-aggregation Mode88................................................................................................................................................................
Link-aggregation Port-priority88................................................................................................................................................................
Port Link-aggregation Group89................................................................................................................................................................
Reset Lacp Statistics90................................................................................................................................................................
Port Isolation Configuration Commands92................................................................................................................................................................
Display Port-isolate Group92................................................................................................................................................................
Port-isolate Enable93................................................................................................................................................................
Spanning Tree Configuration Commands95................................................................................................................................................................
Active Region-configuration95................................................................................................................................................................
Bpdu-drop Any95................................................................................................................................................................
Check Region-configuration96................................................................................................................................................................
Display Stp97................................................................................................................................................................
Display Stp Abnormal-port106................................................................................................................................................................
Display Stp Bpdu-statistics107................................................................................................................................................................
Display Stp Down-port110................................................................................................................................................................
Display Stp History111................................................................................................................................................................
Display Stp Ignored-vlan113................................................................................................................................................................
Display Stp Region-configuration114................................................................................................................................................................
Display Stp Root115................................................................................................................................................................
Display Stp Tc116................................................................................................................................................................
Instance118................................................................................................................................................................
Region-name119................................................................................................................................................................
Reset Stp119................................................................................................................................................................
Revision-level120................................................................................................................................................................
Stp Bpdu-protection121................................................................................................................................................................
Stp Bridge-diameter121................................................................................................................................................................
Stp Compliance122................................................................................................................................................................
Stp Config-digest-snooping123................................................................................................................................................................
Stp Cost124................................................................................................................................................................
Stp Edged-port125................................................................................................................................................................
Stp Enable126................................................................................................................................................................
Stp Ignored Vlan128................................................................................................................................................................
Stp Loop-protection128................................................................................................................................................................
Stp Max-hops129................................................................................................................................................................
Stp Mcheck130................................................................................................................................................................
Stp Mode131................................................................................................................................................................
Stp No-agreement-check131................................................................................................................................................................
Stp Pathcost-standard132................................................................................................................................................................
Stp Point-to-point133................................................................................................................................................................
Stp Port Priority134................................................................................................................................................................
Stp Port-log135................................................................................................................................................................
Stp Priority136................................................................................................................................................................
Stp Region-configuration137................................................................................................................................................................
Stp Root Primary137................................................................................................................................................................
Stp Root Secondary138................................................................................................................................................................
Stp Root-protection139................................................................................................................................................................
Stp Tc-protection140................................................................................................................................................................
Stp Tc-protection Threshold141................................................................................................................................................................
Stp Timer Forward-delay141................................................................................................................................................................
Stp Timer Hello142................................................................................................................................................................
Stp Timer Max-age143................................................................................................................................................................
Stp Timer-factor144................................................................................................................................................................
Stp Transmit-limit145................................................................................................................................................................
Vlan-mapping Modulo146................................................................................................................................................................
Bpdu Tunneling Configuration Commands147................................................................................................................................................................
Bpdu-tunnel Dot1q147................................................................................................................................................................
Bpdu-tunnel Tunnel-dmac148................................................................................................................................................................
Vlan Configuration Commands150................................................................................................................................................................
Display Interface Vlan-interface151................................................................................................................................................................
Display Vlan154................................................................................................................................................................
Interface Vlan-interface156................................................................................................................................................................
Ip Address157................................................................................................................................................................
Name158................................................................................................................................................................
Reset Counters Interface Vlan-interface159................................................................................................................................................................
Vlan160................................................................................................................................................................
Port-based Vlan Configuration Commands161................................................................................................................................................................
Display Port161................................................................................................................................................................
Port162................................................................................................................................................................
Port Access Vlan163................................................................................................................................................................
Port Hybrid Pvid164................................................................................................................................................................
Port Hybrid Vlan165................................................................................................................................................................
Port Link-type167................................................................................................................................................................
Port Trunk Permit Vlan168................................................................................................................................................................
Port Trunk Pvid169................................................................................................................................................................
Mac-based Vlan Configuration Commands170................................................................................................................................................................
Display Mac-vlan170................................................................................................................................................................
Display Mac-vlan Interface172................................................................................................................................................................
Mac-vlan Enable173................................................................................................................................................................
Mac-vlan Mac-address173................................................................................................................................................................
Mac-vlan Trigger Enable174................................................................................................................................................................
Port Pvid Disable175................................................................................................................................................................
Vlan Precedence176................................................................................................................................................................
Protocol-based Vlan Configuration Commands176................................................................................................................................................................
Display Protocol-vlan Interface176................................................................................................................................................................
Display Protocol-vlan Vlan177................................................................................................................................................................
Port Hybrid Protocol-vlan178................................................................................................................................................................
Protocol-vlan180................................................................................................................................................................
Ip Subnet-based Vlan Configuration Commands182................................................................................................................................................................
Display Ip-subnet-vlan Interface182................................................................................................................................................................
Display Ip-subnet-vlan Vlan183................................................................................................................................................................
Ip-subnet-vlan184................................................................................................................................................................
Port Hybrid Ip-subnet-vlan184................................................................................................................................................................
Isolate-user-vlan Configuration Commands187................................................................................................................................................................
Display Isolate-user-vlan187................................................................................................................................................................
Isolate-user-vlan189................................................................................................................................................................
Isolate-user-vlan Enable190................................................................................................................................................................
Isolated-vlan Enable190................................................................................................................................................................
Port Isolate-user-vlan Promiscuous191................................................................................................................................................................
Port Isolate-user-vlan Host194................................................................................................................................................................
Gvrp Configuration Commands196................................................................................................................................................................
Display Garp Statistics196................................................................................................................................................................
Display Garp Timer197................................................................................................................................................................
Display Gvrp Local-vlan198................................................................................................................................................................
Display Gvrp State198................................................................................................................................................................
Display Gvrp Statistics200................................................................................................................................................................
Display Gvrp Status201................................................................................................................................................................
Display Gvrp Vlan-operation202................................................................................................................................................................
Garp Timer Hold202................................................................................................................................................................
Garp Timer Join203................................................................................................................................................................
Garp Timer Leave204................................................................................................................................................................
Garp Timer Leaveall204................................................................................................................................................................
Gvrp205................................................................................................................................................................
Gvrp Registration206................................................................................................................................................................
Reset Garp Statistics207................................................................................................................................................................
Qinq Configuration Commands208................................................................................................................................................................
Nest208................................................................................................................................................................
Qinq Enable209................................................................................................................................................................
Qinq Ethernet-type Customer-tag209................................................................................................................................................................
Qinq Ethernet-type Service-tag210................................................................................................................................................................
Qinq Transparent-vlan211................................................................................................................................................................
Vlan Mapping Configuration Commands213................................................................................................................................................................
Qinq Enable Downlink213................................................................................................................................................................
Qinq Enable Uplink214................................................................................................................................................................
Remark Customer-vlan-id215................................................................................................................................................................
Remark Service-vlan-id215................................................................................................................................................................
Lldp Configuration Commands217................................................................................................................................................................
Display Lldp Local-information217................................................................................................................................................................
Display Lldp Neighbor-information220................................................................................................................................................................
Display Lldp Statistics225................................................................................................................................................................
Display Lldp Status226................................................................................................................................................................
Display Lldp Tlv-config228................................................................................................................................................................
Lldp Admin-status230................................................................................................................................................................
Lldp Check-change-interval231................................................................................................................................................................
Lldp Enable231................................................................................................................................................................
Lldp Encapsulation Snap232................................................................................................................................................................
Lldp Fast-count232................................................................................................................................................................
Lldp Hold-multiplier233................................................................................................................................................................
Lldp Management-address-format String234................................................................................................................................................................
Lldp Management-address-tlv234................................................................................................................................................................
Lldp Notification Remote-change Enable235................................................................................................................................................................
Lldp Timer Notification-interval236................................................................................................................................................................
Lldp Timer Reinit-delay236................................................................................................................................................................
Lldp Timer Tx-delay237................................................................................................................................................................
Lldp Timer Tx-interval237................................................................................................................................................................
Lldp Tlv-enable238................................................................................................................................................................
Service Loopback Group Configuration Commands241................................................................................................................................................................
Display Service-loopback Group241................................................................................................................................................................
Port Service-loopback Group242................................................................................................................................................................
Service-loopback Group243................................................................................................................................................................
Support And Other Resources244................................................................................................................................................................
Contacting Hp244................................................................................................................................................................
Subscription Service244................................................................................................................................................................
Related Information244................................................................................................................................................................
Documents244................................................................................................................................................................
Websites244................................................................................................................................................................
Conventions245................................................................................................................................................................
Index247................................................................................................................................................................
HP A5830 Series Configuration Manual

HP A5830 Series Configuration Manual (246 pages)

Layer 2 LAN Switching  
Brand: HP | Category: Switch | Size: 2.1 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring The Ethernet Interface8................................................................................................................................................................
Naming The Ethernet Interfaces8................................................................................................................................................................
Understanding The General Configuration8................................................................................................................................................................
Configuring The Management Ethernet Interface8................................................................................................................................................................
Configuring A Combo Interface9................................................................................................................................................................
Configuring Basic Settings Of An Ethernet Interface9................................................................................................................................................................
Shutting Down An Ethernet Interface10................................................................................................................................................................
Configuring Link-down Event Suppression On An Ethernet Interface11................................................................................................................................................................
Configuring Loopback Testing On An Ethernet Interface11................................................................................................................................................................
Configuring The Link Mode Of An Ethernet Interface12................................................................................................................................................................
Configuring Jumbo Frame Support12................................................................................................................................................................
Configuring A Layer 2 Ethernet Interface13................................................................................................................................................................
Using The Layer 2 Ethernet Interface Configuration Task List13................................................................................................................................................................
Configuring A Port Group13................................................................................................................................................................
Enabling Ethernet Interface Auto Power-down Function14................................................................................................................................................................
Setting Ethernet Interface Speed Options For Auto Negotiation14................................................................................................................................................................
Setting Storm Suppression15................................................................................................................................................................
Setting The Statistics Polling Interval16................................................................................................................................................................
Enabling Ethernet Interface Loopback Detection16................................................................................................................................................................
Setting An Ethernet Interface Mdi Mode18................................................................................................................................................................
Testing An Ethernet Interface Cable Connection19................................................................................................................................................................
Setting A Layer 3 Ethernet Interface Mtu19................................................................................................................................................................
Displaying And Maintaining An Ethernet Interface20................................................................................................................................................................
Configuring The Loopback And Null Interface21................................................................................................................................................................
Configuring A Loopback Interface21................................................................................................................................................................
Configuring The Null Interface22................................................................................................................................................................
Displaying And Maintaining Loopback And Null Interfaces22................................................................................................................................................................
Configuring The Mac Address Table24................................................................................................................................................................
Creating A Mac Address Table Entry24................................................................................................................................................................
Using Mac Address Table Entries24................................................................................................................................................................
Forwarding A Mac Address Table-based Frame25................................................................................................................................................................
Configuring Static, Dynamic, And Blackhole Mac Address Table Entries25................................................................................................................................................................
Disabling Mac Address Learning26................................................................................................................................................................
Configuring The Aging Timer For Dynamic Mac Address Entries27................................................................................................................................................................
Configuring The Mac Learning Limit On Ports28................................................................................................................................................................
Displaying Mac Address Tables28................................................................................................................................................................
Setting A Mac Address Table Configuration28................................................................................................................................................................
Configuring Mac Information30................................................................................................................................................................
Enabling Mac Information30................................................................................................................................................................
Enabling Mac Information Globally30................................................................................................................................................................
Enabling Mac Information On An Interface30................................................................................................................................................................
Configuring Mac Information Mode30................................................................................................................................................................
Configuring The Interval For Sending Syslog Or Trap Messages31................................................................................................................................................................
Configuring The Mac Information Queue Length31................................................................................................................................................................
Setting A Mac Information Configuration31................................................................................................................................................................
Network Requirements31................................................................................................................................................................
Configuration Procedure32................................................................................................................................................................
Configuring Ethernet Link-aggregation33................................................................................................................................................................
Basic Concepts33................................................................................................................................................................
Using Aggregating Links In Static Mode36................................................................................................................................................................
Using Aggregating Links In Dynamic Mode37................................................................................................................................................................
Using Load-sharing Criteria For Link-aggregation Groups39................................................................................................................................................................
Using The Ethernet Link-aggregation Configuration Task List39................................................................................................................................................................
Configuring An Aggregation Group39................................................................................................................................................................
Configuring A Layer 2 Static Aggregation Group40................................................................................................................................................................
Configuring A Layer 2 Dynamic Aggregation Group41................................................................................................................................................................
Configuring An Aggregate Interface42................................................................................................................................................................
Configuring The Description Of An Aggregate Interface42................................................................................................................................................................
Enabling Link State Traps For An Aggregate Interface42................................................................................................................................................................
Shutting Down An Aggregate Interface43................................................................................................................................................................
Restoring The Default Settings For An Aggregate Interface43................................................................................................................................................................
Configuring Load Sharing For Link-aggregation Groups43................................................................................................................................................................
Configuring Load-sharing Criteria For Link-aggregation Groups43................................................................................................................................................................
Enabling Local-first Load Sharing For Link-aggregation45................................................................................................................................................................
Enabling Link-aggregation Traffic Redirection45................................................................................................................................................................
Displaying And Maintaining Ethernet Link-aggregation46................................................................................................................................................................
Setting An Example Layer 2 Static Aggregation Configuration47................................................................................................................................................................
Setting An Example Layer 2 Dynamic Aggregation Configuration49................................................................................................................................................................
Configuring Port Isolation51................................................................................................................................................................
Configuring An Isolation Group51................................................................................................................................................................
Assigning A Port To The Isolation Group51................................................................................................................................................................
Displaying Isolation Groups51................................................................................................................................................................
Using A Port Isolation Configuration52................................................................................................................................................................
Configuring The Spanning Tree53................................................................................................................................................................
Using Stp Protocol Packets53................................................................................................................................................................
Outlining The Basic Concepts In Stp53................................................................................................................................................................
Performing The Calculation Process Of The Stp Algorithm54................................................................................................................................................................
Using Rstp60................................................................................................................................................................
Using Pvst60................................................................................................................................................................
Using Mstp60................................................................................................................................................................
Limitations Of Stp, Rstp, And Pvst60................................................................................................................................................................
Mstp Features61................................................................................................................................................................
Mstp Basic Concepts61................................................................................................................................................................
Implementing Mstp On Devices65................................................................................................................................................................
Protocols And Standards65................................................................................................................................................................
Configuration Task Lists66................................................................................................................................................................
Setting The Spanning Tree Mode70................................................................................................................................................................
Configuring An Mst Region71................................................................................................................................................................
Configuring The Root Bridge Or A Secondary Root Bridge72................................................................................................................................................................
Configuring The Device Priority73................................................................................................................................................................
Configuring The Maximum Hops Of An Mst Region73................................................................................................................................................................
Configuring The Network Diameter Of A Switched Network74................................................................................................................................................................
Configuring Spanning Tree Timers74................................................................................................................................................................
Configuring The Timeout Factor75................................................................................................................................................................
Configuring The Maximum Port Rate76................................................................................................................................................................
Configuring Edge Ports76................................................................................................................................................................
Configuring Port Path Costs77................................................................................................................................................................
Configuring Port Priority79................................................................................................................................................................
Configuring The Port Link Type80................................................................................................................................................................
Configuring Port Mode Used To Recognize/send Mstp Packets80................................................................................................................................................................
Enabling Port State Transition Information Output81................................................................................................................................................................
Enabling The Spanning Tree Feature82................................................................................................................................................................
Performing Mcheck83................................................................................................................................................................
Configuring The Vlan Ignore Feature83................................................................................................................................................................
Configuring Digest Snooping85................................................................................................................................................................
Configuring No Agreement Check87................................................................................................................................................................
Configuring Protection Functions89................................................................................................................................................................
Displaying And Maintaining The Spanning Tree92................................................................................................................................................................
Spanning Tree Configuration Examples93................................................................................................................................................................
Setting The Mstp Configuration93................................................................................................................................................................
Setting The Pvst Configuration97................................................................................................................................................................
Configuring Bpdu Tunneling101................................................................................................................................................................
Implementing Bpdu Tunneling102................................................................................................................................................................
Performing Configuration Prerequisites103................................................................................................................................................................
Enabling Bpdu Tunneling103................................................................................................................................................................
Configuring Destination Multicast Mac Address For Bpdus104................................................................................................................................................................
Bpdu Tunneling Configuration Examples104................................................................................................................................................................
Configuring Bpdu Tunneling For The Stp Configuration104................................................................................................................................................................
Setting Bpdu Tunneling For The Pvst Configuration106................................................................................................................................................................
Configuring Vlan108................................................................................................................................................................
Vlan Fundamentals108................................................................................................................................................................
Implementing The Vlan Types109................................................................................................................................................................
Configuring Basic Vlan Settings110................................................................................................................................................................
Configuring Vlan Interface Basic Settings111................................................................................................................................................................
Configuring A Vlan Interface111................................................................................................................................................................
Configuring Port-based Vlan113................................................................................................................................................................
Port Link Type113................................................................................................................................................................
Pvid114................................................................................................................................................................
Assigning A Vlan Access Port115................................................................................................................................................................
Assigning A Vlan Trunk Port116................................................................................................................................................................
Assigning A Vlan Hybrid Port117................................................................................................................................................................
Configuring Mac-based Vlan120................................................................................................................................................................
Static Mac-based Vlan Assignment120................................................................................................................................................................
Dynamic Mac-based Vlan Assignment120................................................................................................................................................................
Dynamic Mac-based Vlan122................................................................................................................................................................
Configuring Protocol-based Vlan127................................................................................................................................................................
Configuring Ip Subnet-based Vlan131................................................................................................................................................................
Setting The Ip Subnet-based Vlan Configuration132................................................................................................................................................................
Displaying And Maintaining Vlan134................................................................................................................................................................
Configuring Isolate-user-vlan135................................................................................................................................................................
Configuring Primary Isolate-user-vlan135................................................................................................................................................................
Configuring Secondary Vlans137................................................................................................................................................................
Associating Secondary Vlans With An Isolate-user-vlan138................................................................................................................................................................
Displaying Isolate-user-vlan138................................................................................................................................................................
Setting An Example Isolate-user-vlan Configuration138................................................................................................................................................................
Configuring Gvrp141................................................................................................................................................................
Using Gvrp144................................................................................................................................................................
Gvrp Registration Modes144................................................................................................................................................................
Configuration Task List144................................................................................................................................................................
Configuring Gvrp Functions145................................................................................................................................................................
Configuring Garp Timers146................................................................................................................................................................
Displaying And Maintaining Gvrp147................................................................................................................................................................
Setting The Gvrp Configuration147................................................................................................................................................................
Setting Gvrp Normal Registration Mode Configuration147................................................................................................................................................................
Setting The Gvrp Fixed Registration Mode Configuration149................................................................................................................................................................
Setting The Gvrp Forbidden Registration Mode Configuration150................................................................................................................................................................
Configuring Qinq152................................................................................................................................................................
Operation152................................................................................................................................................................
Frame Structure153................................................................................................................................................................
Implementing Qinq153................................................................................................................................................................
Modifying The Tpid In A Vlan Tag154................................................................................................................................................................
Configuring Basic Qinq155................................................................................................................................................................
Enabling Basic Qinq155................................................................................................................................................................
Configuring Vlan Transparent Transmission156................................................................................................................................................................
Configuring Selective Qinq156................................................................................................................................................................
Configuring An Svlan Tagging Policy156................................................................................................................................................................
Configuring An Inner-outer Vlan 802.1p Priority Mapping157................................................................................................................................................................
Configuring Cvlan Id Substitution158................................................................................................................................................................
Configuring The Tpid Value In Vlan Tags159................................................................................................................................................................
Qinq Configuration Examples160................................................................................................................................................................
Setting Basic Qinq Configuration160................................................................................................................................................................
Setting The Vlan Transparent Transmission Configuration162................................................................................................................................................................
Setting Simple Selective Qinq Configuration164................................................................................................................................................................
Setting The Comprehensive Selective Qinq Configuration166................................................................................................................................................................
Configuring Vlan Mapping171................................................................................................................................................................
Demonstrating One-to-one And Many-to-one Vlan Mapping171................................................................................................................................................................
Demonstrating One-to-two And Two-to-two Vlan Mapping172................................................................................................................................................................
Mapping Concepts And Terms173................................................................................................................................................................
Implementing Vlan Mapping174................................................................................................................................................................
Configuring One-to-one Vlan Mapping177................................................................................................................................................................
Configuring Many-to-one Vlan Mapping179................................................................................................................................................................
Configuring One-to-two Vlan Mapping181................................................................................................................................................................
Configuring Two-to-two Vlan Mapping183................................................................................................................................................................
Setting Vlan Mapping Configurations187................................................................................................................................................................
Setting One-to-one And Many-to-one Vlan Mapping Configuration187................................................................................................................................................................
Configuring Switch A188................................................................................................................................................................
Setting One-to-two And Two-to-two Vlan Mapping Configuration193................................................................................................................................................................
Configuring Lldp197................................................................................................................................................................
Concepts197................................................................................................................................................................
Lldpdus197................................................................................................................................................................
Lldpdu Formats197................................................................................................................................................................
Tlv Overview198................................................................................................................................................................
Operating Modes Of Lldp201................................................................................................................................................................
Transmitting Lldpdus201................................................................................................................................................................
Receiving Lldpdus201................................................................................................................................................................
Configuring Basic Lldp202................................................................................................................................................................
Enabling Lldp202................................................................................................................................................................
Setting The Lldp Operating Mode203................................................................................................................................................................
Setting The Lldp Re-initialization Delay203................................................................................................................................................................
Enabling Lldp Polling203................................................................................................................................................................
Configuring Advertisable Tlvs204................................................................................................................................................................
Configuring The Management Address Tlv And Its Encoding Format204................................................................................................................................................................
Setting Other Lldp Parameters205................................................................................................................................................................
Setting An Lldpdu Encapsulation Format 0206................................................................................................................................................................
Configuring Lldp Trapping206................................................................................................................................................................
Displaying And Maintaining Lldp207................................................................................................................................................................
Configuration Examples208................................................................................................................................................................
Basic Lldp Configuration Example208................................................................................................................................................................
Configuring A Service Loopback Group211................................................................................................................................................................
Service Type211................................................................................................................................................................
Preparing Service Loopback Ports211................................................................................................................................................................
Port States211................................................................................................................................................................
Displaying Service Loopback Groups213................................................................................................................................................................
Service Loopback Group Configuration213................................................................................................................................................................
Support And Other Resources215................................................................................................................................................................
Contacting Hp215................................................................................................................................................................
Subscription Service215................................................................................................................................................................
Related Information215................................................................................................................................................................
Documents215................................................................................................................................................................
Websites215................................................................................................................................................................
Conventions216................................................................................................................................................................
Index218................................................................................................................................................................

Advertisement

HP A5830 Series Configuration Manual

HP A5830 Series Configuration Manual (207 pages)

High Availability  
Brand: HP | Category: Switch | Size: 1.72 MB
Table of contents
High Availability1................................................................................................................................................................
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
High Availability Overview7................................................................................................................................................................
Availability Requirements7................................................................................................................................................................
Availability Evaluation7................................................................................................................................................................
High Availability Technologies8................................................................................................................................................................
Fault Detection Technologies8................................................................................................................................................................
Protection Switchover Technologies9................................................................................................................................................................
Ethernet Oam Configuration11................................................................................................................................................................
Ethernet Oam Overview11................................................................................................................................................................
Background11................................................................................................................................................................
Major Functions Of Ethernet Oam11................................................................................................................................................................
Ethernet Oampdus11................................................................................................................................................................
How Ethernet Oam Works12................................................................................................................................................................
Standards And Protocols15................................................................................................................................................................
Ethernet Oam Configuration Task List15................................................................................................................................................................
Configuring Basic Ethernet Oam Functions15................................................................................................................................................................
Configuring The Ethernet Oam Connection Detection Timers15................................................................................................................................................................
Configuring Link Monitoring16................................................................................................................................................................
Configuring Errored Symbol Event Detection16................................................................................................................................................................
Configuring Errored Frame Event Detection16................................................................................................................................................................
Configuring Errored Frame Period Event Detection17................................................................................................................................................................
Configuring Errored Frame Seconds Event Detection17................................................................................................................................................................
Displaying And Maintaining Ethernet Oam Configuration17................................................................................................................................................................
Ethernet Oam Configuration Example18................................................................................................................................................................
Cfd Configuration21................................................................................................................................................................
Cfd Overview21................................................................................................................................................................
Basic Concepts In Cfd21................................................................................................................................................................
Cfd Functions23................................................................................................................................................................
Protocols And Standards24................................................................................................................................................................
Cfd Configuration Task List24................................................................................................................................................................
Configuring Basic Cfd Settings25................................................................................................................................................................
Enabling Cfd25................................................................................................................................................................
Configuring The Cfd Protocol Version25................................................................................................................................................................
Configuring Service Instances25................................................................................................................................................................
Configuring Meps26................................................................................................................................................................
Configuring Mip Generation Rules27................................................................................................................................................................
Configuring Cfd Functions28................................................................................................................................................................
Configuration Prerequisites28................................................................................................................................................................
Configuring Cc On Meps28................................................................................................................................................................
Configuring Lb On Meps29................................................................................................................................................................
Configuring Lt On Meps29................................................................................................................................................................
Displaying And Maintaining Cfd29................................................................................................................................................................
Cfd Configuration Example30................................................................................................................................................................
Dldp Configuration35................................................................................................................................................................
Dldp Overview35................................................................................................................................................................
How Dldp Works36................................................................................................................................................................
Dldp Configuration Task List42................................................................................................................................................................
Configuring The Duplex Mode And Speed Of An Ethernet Interface42................................................................................................................................................................
Enabling Dldp43................................................................................................................................................................
Setting Dldp Mode43................................................................................................................................................................
Setting The Interval To Send Advertisement Packets43................................................................................................................................................................
Setting The Delaydown Timer44................................................................................................................................................................
Setting The Port Shutdown Mode44................................................................................................................................................................
Configuring Dldp Authentication45................................................................................................................................................................
Resetting Dldp State45................................................................................................................................................................
Displaying And Maintaining Dldp46................................................................................................................................................................
Dldp Configuration Examples46................................................................................................................................................................
Automatically Shutting Down Unidirectional Links46................................................................................................................................................................
Manually Shutting Down Unidirectional Links50................................................................................................................................................................
Troubleshooting Dldp53................................................................................................................................................................
Rrpp Configuration54................................................................................................................................................................
Basic Concepts In Rrpp54................................................................................................................................................................
Rrppdus56................................................................................................................................................................
Rrpp Timers57................................................................................................................................................................
How Rrpp Works57................................................................................................................................................................
Typical Rrpp Networking59................................................................................................................................................................
Rrpp Configuration Task List62................................................................................................................................................................
Creating An Rrpp Domain63................................................................................................................................................................
Configuring Control Vlans63................................................................................................................................................................
Configuring Protected Vlans64................................................................................................................................................................
Configuring Rrpp Rings65................................................................................................................................................................
Configuring Rrpp Ports65................................................................................................................................................................
Configuring Rrpp Nodes65................................................................................................................................................................
Activating An Rrpp Domain67................................................................................................................................................................
Configuring Rrpp Timers67................................................................................................................................................................
Configuring An Rrpp Ring Group68................................................................................................................................................................
Displaying And Maintaining Rrpp68................................................................................................................................................................
Rrpp Configuration Examples69................................................................................................................................................................
Single Ring Configuration Example69................................................................................................................................................................
Intersecting Ring Configuration Example71................................................................................................................................................................
Dual Homed Rings Configuration Example77................................................................................................................................................................
Intersecting-ring Load Balancing Configuration Example86................................................................................................................................................................
Troubleshooting94................................................................................................................................................................
Smart Link Configuration95................................................................................................................................................................
Smart Link Overview95................................................................................................................................................................
Terminology96................................................................................................................................................................
How Smart Link Works97................................................................................................................................................................
Smart Link Collaboration Mechanisms97................................................................................................................................................................
Smart Link Configuration Task List98................................................................................................................................................................
Configuring A Smart Link Device98................................................................................................................................................................
Configuring Protected Vlans For A Smart Link Group98................................................................................................................................................................
Configuring Member Ports For A Smart Link Group99................................................................................................................................................................
Configuring Role Preemption For A Smart Link Group100................................................................................................................................................................
Enabling The Sending Of Flush Messages100................................................................................................................................................................
Configuring An Associated Device101................................................................................................................................................................
Enabling The Receiving Of Flush Messages101................................................................................................................................................................
Displaying And Maintaining Smart Link101................................................................................................................................................................
Smart Link Configuration Examples102................................................................................................................................................................
Single Smart Link Group Configuration Example102................................................................................................................................................................
Multiple Smart Link Groups Load Sharing Configuration Example106................................................................................................................................................................
Monitor Link Configuration111................................................................................................................................................................
Monitor Link Overview111................................................................................................................................................................
How Monitor Link Works112................................................................................................................................................................
Configuring Monitor Link112................................................................................................................................................................
Creating A Monitor Link Group112................................................................................................................................................................
Configuring Monitor Link Group Member Ports112................................................................................................................................................................
Displaying And Maintaining Monitor Link113................................................................................................................................................................
Monitor Link Configuration Example113................................................................................................................................................................
Vrrp Configuration117................................................................................................................................................................
Vrrp Overview117................................................................................................................................................................
Vrrp Standard Protocol Mode118................................................................................................................................................................
Introduction To Vrrp Group118................................................................................................................................................................
Vrrp Timers119................................................................................................................................................................
Packet Format120................................................................................................................................................................
Principles Of Vrrp121................................................................................................................................................................
Vrrp Tracking121................................................................................................................................................................
Vrrp Application (taking Ipv4-based Vrrp For Example)122................................................................................................................................................................
Configuring Vrrp For Ipv4123................................................................................................................................................................
Vrrp For Ipv4 Configuration Task List123................................................................................................................................................................
Specifying The Type Of Mac Addresses Mapped To Virtual Ip Addresses124................................................................................................................................................................
Creating A Vrrp Group And Configuring Virtual Ip Address124................................................................................................................................................................
Configuring Router Priority, Preemptive Mode And Tracking Function125................................................................................................................................................................
Configuring Vrrp Packet Attributes126................................................................................................................................................................
Enabling The Trap Function For Vrrp127................................................................................................................................................................
Displaying And Maintaining Vrrp For Ipv4128................................................................................................................................................................
Configuring Vrrp For Ipv6128................................................................................................................................................................
Vrrp For Ipv6 Configuration Task List128................................................................................................................................................................
Specifying The Type Of Mac Addresses Mapped To Virtual Ipv6 Addresses128................................................................................................................................................................
Creating A Vrrp Group And Configuring A Virtual Ipv6 Address129................................................................................................................................................................
Displaying And Maintaining Vrrp For Ipv6132................................................................................................................................................................
Ipv4-based Vrrp Configuration Examples132................................................................................................................................................................
Single Vrrp Group Configuration Example132................................................................................................................................................................
Vrrp Interface Tracking Configuration Example135................................................................................................................................................................
Vrrp With Multiple Vlans Configuration Example138................................................................................................................................................................
Ipv6-based Vrrp Configuration Examples141................................................................................................................................................................
Troubleshooting Vrrp152................................................................................................................................................................
Bfd Configuration153................................................................................................................................................................
Bfd Overview153................................................................................................................................................................
How Bfd Works153................................................................................................................................................................
Bfd Packet Format155................................................................................................................................................................
Supported Features157................................................................................................................................................................
Configuring Bfd Basic Functions158................................................................................................................................................................
Configuration Procedure158................................................................................................................................................................
Displaying And Maintaining Bfd159................................................................................................................................................................
Track Configuration160................................................................................................................................................................
Track Overview160................................................................................................................................................................
Introduction To Collaboration160................................................................................................................................................................
Collaboration Fundamentals160................................................................................................................................................................
Collaboration Application Example161................................................................................................................................................................
Track Configuration Task List161................................................................................................................................................................
Associating The Track Module With A Detection Module162................................................................................................................................................................
Associating Track With Nqa162................................................................................................................................................................
Associating Track With Bfd162................................................................................................................................................................
Associating Track With Interface Management163................................................................................................................................................................
Associating The Track Module With An Application Module164................................................................................................................................................................
Associating Track With Vrrp164................................................................................................................................................................
Associating Track With Static Routing165................................................................................................................................................................
Associating Track With Pbr166................................................................................................................................................................
Displaying And Maintaining Track Entries167................................................................................................................................................................
Track Configuration Examples167................................................................................................................................................................
Vrrp-track-nqa Collaboration Configuration Example (the Master Monitors The Uplink)167................................................................................................................................................................
Configuring Bfd For A Vrrp Backup To Monitor The Master170................................................................................................................................................................
Configuring Bfd For The Vrrp Master To Monitor The Uplinks173................................................................................................................................................................
Static Routing-track-nqa Collaboration Configuration Example177................................................................................................................................................................
Static Routing-track-bfd Collaboration Configuration Example182................................................................................................................................................................
Interface184................................................................................................................................................................
Network Requirements185................................................................................................................................................................
Support And Other Resources189................................................................................................................................................................
Contacting Hp189................................................................................................................................................................
Subscription Service189................................................................................................................................................................
Related Information189................................................................................................................................................................
Documents189................................................................................................................................................................
Websites189................................................................................................................................................................
Conventions190................................................................................................................................................................
Index192................................................................................................................................................................
HP A5830 Series Configuration Manual

HP A5830 Series Configuration Manual (152 pages)

Brand: HP | Category: Network Router | Size: 1.56 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Cli8................................................................................................................................................................
Entering The Cli8................................................................................................................................................................
Undo Form Of A Command8................................................................................................................................................................
Cli Views8................................................................................................................................................................
Entering System View9................................................................................................................................................................
Exiting The Current View9................................................................................................................................................................
Returning To User View10................................................................................................................................................................
Using The Cli Online Help10................................................................................................................................................................
Entering And Editing Commands11................................................................................................................................................................
Entering Incomplete Keywords11................................................................................................................................................................
Configuring Command Aliases12................................................................................................................................................................
Configuring Cli Hotkeys12................................................................................................................................................................
Redisplaying Commands Previously Entered But Not Submitted14................................................................................................................................................................
Checking Command-line Errors14................................................................................................................................................................
Using Command History14................................................................................................................................................................
Accessing History Commands15................................................................................................................................................................
Configuring The History Buffer Size15................................................................................................................................................................
Controlling The Cli Display16................................................................................................................................................................
Filtering Output Information16................................................................................................................................................................
Configuring User Privilege And Command Levels19................................................................................................................................................................
Configuring A User Privilege Level19................................................................................................................................................................
Switching User Privilege Level22................................................................................................................................................................
Modifying The Level Of A Command25................................................................................................................................................................
Saving The Current Configuration25................................................................................................................................................................
Displaying Cli26................................................................................................................................................................
Login Methods27................................................................................................................................................................
User Interface Overview28................................................................................................................................................................
Users And User Interfaces28................................................................................................................................................................
Numbering User Interfaces28................................................................................................................................................................
Cli Login30................................................................................................................................................................
Overview30................................................................................................................................................................
Logging In Through The Console Port30................................................................................................................................................................
Configuration Requirements30................................................................................................................................................................
Login Procedure31................................................................................................................................................................
Console Login Authentication Modes33................................................................................................................................................................
Configuring None Authentication For Console Login34................................................................................................................................................................
Configuring Password Authentication For Console Login35................................................................................................................................................................
Configuring Scheme Authentication For Console Login36................................................................................................................................................................
Configuring Optional Common Settings For Console Login39................................................................................................................................................................
Logging In Through Telnet41................................................................................................................................................................
Telnet Login Authentication Modes42................................................................................................................................................................
Configuring None Authentication For Telnet Login43................................................................................................................................................................
Configuring Password Authentication For Telnet Login44................................................................................................................................................................
Configuring Scheme Authentication For Telnet Login45................................................................................................................................................................
Configuring Common Settings For Vty User Interfaces (optional)49................................................................................................................................................................
Configuring The Device To Log In To A Telnet Server As A Telnet Client50................................................................................................................................................................
Logging In Through Ssh51................................................................................................................................................................
Configuring The Ssh Server52................................................................................................................................................................
Configuring The Ssh Client To Log In To The Ssh Server55................................................................................................................................................................
Displaying And Maintaining Cli Login55................................................................................................................................................................
Web Login57................................................................................................................................................................
Configuring Http Login57................................................................................................................................................................
Configuring Https Login58................................................................................................................................................................
Displaying Web Login60................................................................................................................................................................
Web Login Example60................................................................................................................................................................
Http Login Example60................................................................................................................................................................
Https Login Example62................................................................................................................................................................
Nms Login65................................................................................................................................................................
Configuring Nms Login65................................................................................................................................................................
Nms Login Example67................................................................................................................................................................
User Login Control70................................................................................................................................................................
User Login Control Overview70................................................................................................................................................................
Configuring Login Control Over Telnet Users70................................................................................................................................................................
Configuring Source Ip-based Login Control Over Telnet Users70................................................................................................................................................................
Configuring Source And Destination Ip-based Login Control Over Telnet Users71................................................................................................................................................................
Configuring Source Mac-based Login Control Over Telnet Users71................................................................................................................................................................
Source Mac-based Login Control Configuration Example72................................................................................................................................................................
Configuring Source Ip-based Login Control Over Nms Users73................................................................................................................................................................
Source Ip-based Login Control Over Nms Users Configuration Example73................................................................................................................................................................
Configuring Source Ip-based Login Control Over Web Users74................................................................................................................................................................
Logging Off Online Web Users75................................................................................................................................................................
Source Ip-based Login Control Over Web Users Configuration Example75................................................................................................................................................................
Configuring Ftp77................................................................................................................................................................
Operation Mode77................................................................................................................................................................
Configuring The Ftp Client78................................................................................................................................................................
Establishing An Ftp Connection78................................................................................................................................................................
Managing Directories On The Ftp Server80................................................................................................................................................................
Operating The Files On The Ftp Server80................................................................................................................................................................
Using Another Username To Log In To The Ftp Server81................................................................................................................................................................
Maintaining And Debugging The Ftp Connection81................................................................................................................................................................
Terminating An Ftp Connection82................................................................................................................................................................
Ftp Client Configuration Example82................................................................................................................................................................
Configuring The Ftp Server84................................................................................................................................................................
Configuring Ftp Server Operating Parameters84................................................................................................................................................................
Configuring Authentication And Authorization On The Ftp Server85................................................................................................................................................................
Ftp Server Configuration Example86................................................................................................................................................................
Displaying Ftp88................................................................................................................................................................
Configuring Tftp89................................................................................................................................................................
Configuring The Tftp Client90................................................................................................................................................................
Displaying The Tftp Client91................................................................................................................................................................
Tftp Client Configuration Example91................................................................................................................................................................
File Management93................................................................................................................................................................
Filename Formats93................................................................................................................................................................
Performing File Operations93................................................................................................................................................................
Displaying File Information94................................................................................................................................................................
Displaying The Contents Of A File94................................................................................................................................................................
Renaming A File94................................................................................................................................................................
Copying A File94................................................................................................................................................................
Moving A File94................................................................................................................................................................
Deleting A File95................................................................................................................................................................
Restoring A File From The Recycle Bin95................................................................................................................................................................
Emptying The Recycle Bin95................................................................................................................................................................
Performing Directory Operations95................................................................................................................................................................
Displaying Directory Information95................................................................................................................................................................
Displaying The Current Working Directory96................................................................................................................................................................
Changing The Current Working Directory96................................................................................................................................................................
Creating A Directory96................................................................................................................................................................
Removing A Directory96................................................................................................................................................................
Performing Storage Media Operations97................................................................................................................................................................
Managing Storage Media Space97................................................................................................................................................................
Performing Batch Operations97................................................................................................................................................................
Setting Prompt Modes98................................................................................................................................................................
Example For File Operations98................................................................................................................................................................
Configuration File Management99................................................................................................................................................................
Configuration Types99................................................................................................................................................................
Format And Content Of A Configuration File100................................................................................................................................................................
Coexistence Of Multiple Configuration Files100................................................................................................................................................................
Startup With The Configuration File100................................................................................................................................................................
Saving The Running Configuration101................................................................................................................................................................
Enabling Configuration File Auto-save101................................................................................................................................................................
Selecting The Modes For Saving The Configuration File101................................................................................................................................................................
Setting Configuration Rollback102................................................................................................................................................................
Configuration Task List103................................................................................................................................................................
Configuring Parameters For Saving The Current Running Configuration103................................................................................................................................................................
Enabling Automatic Saving Of The Running Configuration104................................................................................................................................................................
Manually Saving The Running Configuration104................................................................................................................................................................
Specifying A Startup Configuration File105................................................................................................................................................................
Backing Up The Startup Configuration File106................................................................................................................................................................
Deleting A Startup Configuration File106................................................................................................................................................................
Restoring A Startup Configuration File107................................................................................................................................................................
Displaying A Configuration File107................................................................................................................................................................
Software Upgrade Configuration108................................................................................................................................................................
Software Upgrade Methods108................................................................................................................................................................
Software Upgrade Through A System Reboot109................................................................................................................................................................
Upgrading Bootware109................................................................................................................................................................
Upgrading System Software (method110................................................................................................................................................................
Software Upgrade By Installing Hotfixes111................................................................................................................................................................
Basic Concepts In Hotfix111................................................................................................................................................................
Patch State112................................................................................................................................................................
Hotfix Configuration Task List114................................................................................................................................................................
Configuration Prerequisites115................................................................................................................................................................
Installing A Patch In One Step115................................................................................................................................................................
Installing A Patch Step-by-step116................................................................................................................................................................
Uninstalling A Patch Step-by-step117................................................................................................................................................................
Displaying Software Upgrade118................................................................................................................................................................
Software Upgrade Configuration Examples119................................................................................................................................................................
Immediate Upgrade Configuration Example119................................................................................................................................................................
Hotfix Configuration Example120................................................................................................................................................................
Network Requirements120................................................................................................................................................................
Device Management122................................................................................................................................................................
Configuring The Device Name122................................................................................................................................................................
Changing The System Time122................................................................................................................................................................
Configuration Guidelines122................................................................................................................................................................
Configuration Procedure125................................................................................................................................................................
Enabling Display Of The Copyright Statement125................................................................................................................................................................
Configuring Banners126................................................................................................................................................................
Configuring The Software Exception Handling Method127................................................................................................................................................................
Rebooting Switches128................................................................................................................................................................
Rebooting Switches Immediately At The Cli128................................................................................................................................................................
Scheduling A Reboot129................................................................................................................................................................
Scheduling Jobs129................................................................................................................................................................
Configuring Job Scheduling130................................................................................................................................................................
Setting Preferred Airflow Direction131................................................................................................................................................................
Configuring The Detection Timer131................................................................................................................................................................
Configuring Temperature Thresholds132................................................................................................................................................................
Clearing Unused Assigned 16-bit Interface Indexes133................................................................................................................................................................
Verifying And Diagnosing Transceiver Modules133................................................................................................................................................................
Verifying Transceiver Modules133................................................................................................................................................................
Diagnosing Transceiver Modules133................................................................................................................................................................
Displaying Device Management Configuration134................................................................................................................................................................
Support And Other Resources136................................................................................................................................................................
Contacting136................................................................................................................................................................
Subscription Service136................................................................................................................................................................
Related Information136................................................................................................................................................................
Documents136................................................................................................................................................................
Websites136................................................................................................................................................................
Conventions137................................................................................................................................................................
Command Conventions137................................................................................................................................................................
Index139................................................................................................................................................................

Share and save

Advertisement