Sign In
Upload
Manuals
Brands
HP Manuals
Switch
A5830 Series
HP A5830 Series Manuals
Manuals and User Guides for HP A5830 Series. We have
5
HP A5830 Series manuals available for free PDF download: Configuration Manual, Command Reference Manual
HP A5830 Series Configuration Manual (280 pages)
Security Switch
Brand:
HP
| Category:
Switch
| Size: 2.27 MB
Table of Contents
1
Configuration Guide
3
Table of Contents
9
Configuring AAA
10
Radius
15
Hwtacacs
17
Domain-Based User Management
18
RADIUS Server Feature of the Switch
19
Protocols and Standards
19
RADIUS Attributes
22
AAA Configuration Considerations and Task List
24
Configuring AAA Schemes
24
Configuring Local Users
28
Configuring RADIUS Schemes
39
Configuring HWTACACS Schemes
44
Configuring AAA Methods for ISP Domains
44
Configuration Prerequisites
44
Creating an ISP Domain
45
Configuring ISP Domain Attributes
46
Configuring AAA Authentication Methods for an ISP Domain
47
Configuring AAA Authorization Methods for an ISP Domain
49
Configuring AAA Accounting Methods for an ISP Domain
50
Tearing Down User Connections
50
Configuring a NAS ID-VLAN Binding
51
Configuring a Switch As a RADIUS Server
51
RADIUS Server Functions Configuration Task List
51
Configuring a RADIUS User
52
Specifying a RADIUS Client
52
Displaying and Maintaining AAA
52
AAA Configuration Examples
52
AAA for Telnet Users By an HWTACACS Server
54
AAA for Telnet Users By Separate Servers
55
Authentication/Authorization for Ssh/Telnet Users By a RADIUS Server
58
AAA for 802.1X Users By a RADIUS Server
64
Level Switching Authentication for Telnet Users By an HWTACACS Server
67
RADIUS Authentication and Authorization for Telnet Users By a Switch
69
Troubleshooting AAA
69
Troubleshooting RADIUS
70
Troubleshooting HWTACACS
71
802.1X Fundamentals
71
802.1X Architecture
71
Controlled/Uncontrolled Port and Port Authorization Status
72
802.1X-Related Protocols
72
Packet Formats
73
EAP Over RADIUS
74
Initiating 802.1X Authentication
74
802.1X Client As the Initiator
74
Access Device As the Initiator
74
802.1X Authentication Procedures
75
A Comparison of EAP Relay and EAP Termination
75
EAP Relay
78
EAP Termination
79
Configuring 802.1X
79
HP Implementation of 802.1X
79
Access Control Methods
79
Using 802.1X Authentication with Other Features
82
Configuration Prerequisites
82
802.1X Configuration Task List
82
Enabling 802.1X
83
Enabling EAP Relay or EAP Termination
83
Setting the Port Authorization State
84
Specifying an Access Control Method
84
Setting the Maximum Number of Concurrent 802.1X Users On a Port
85
Setting the Maximum Number of Authentication Request Attempts
85
Setting the 802.1X Authentication Timeout Timers
86
Configuring the Online User Handshake Function
86
Configuring the Authentication Trigger Function
87
Specifying a Mandatory Authentication Domain On a Port
88
Configuring the Quiet Timer
88
Enabling the Periodic Online User Re-Authentication Function
89
Configuring an 802.1X Guest VLAN
90
Configuring an Auth-Fail VLAN
91
Specifying Supported Domain Name Delimiters
91
Displaying and Maintaining 802.1X
91
802.1X Configuration Examples
91
802.1X Authentication Configuration Example
94
With Guest VLAN and VLAN Assignment Configuration Example
97
802.1X with ACL Assignment Configuration Example
99
Configuring EAD Fast Deployment
99
EAD Fast Deployment Implementation
99
Configuration Prerequisites
99
Configuration Procedure
100
Displaying and Maintaining EAD Fast Deployment
101
EAD Fast Deployment Configuration Example
103
Troubleshooting EAD Fast Deployment
103
Web Browser Users Cannot Be Correctly Redirected
104
Configuring MAC Authentication
104
User Account Policies
104
Authentication Approaches
105
MAC Authentication Timers
105
Using MAC Authentication with Other Features
105
VLAN Assignment
105
ACL Assignment
105
Guest VLAN
106
MAC Authentication Configuration Task List
106
Basic Configuration for MAC Authentication
106
Configuration Prerequisites
106
Configuration Procedure
107
Specifying an Authentication Domain for MAC Authentication Users
108
Configuring a MAC Authentication Guest VLAN
108
Configuration Prerequisites
108
Configuration Procedure
109
Displaying and Maintaining MAC Authentication
109
MAC Authentication Configuration Examples
109
Local MAC Authentication Configuration Example
111
Radius-Based MAC Authentication Configuration Example
113
ACL Assignment Configuration Example
115
Configuring Port Security
115
Port Security Features
115
Port Security Modes
118
Support for Guest VLAN and Auth-Fail VLAN
118
Port Security Configuration Task List
119
Enabling Port Security
119
Configuration Prerequisites
119
Configuration Procedure
119
Setting Port Security's Limit On the Number of MAC Addresses On a Port
120
Setting the Port Security Mode
120
Configuration Prerequisites
120
Configuration Procedure
121
Configuring Port Security Features
121
Configuring NTK
121
Configuring Intrusion Protection
122
Enabling Port Security Traps
122
Configuring Secure MAC Addresses
123
Configuration Prerequisites
123
Configuration Procedure
123
Ignoring Authorization Information From the Server
124
Displaying and Maintaining Port Security
124
Port Security Configuration Examples
124
Configuring the Autolearn Mode
127
Configuring the Userloginwithoui Mode
131
Configuring the Macaddresselseuserloginsecure Mode
134
Troubleshooting Port Security
134
Cannot Set the Port Security Mode
134
Cannot Configure Secure MAC Addresses
134
Cannot Change Port Security Mode When a User Is Online
136
Configuring Password Control
138
Password Control Configuration Task List
139
Enabling Password Control
139
Setting Global Password Control Parameters
140
Setting User Group Password Control Parameters
141
Setting Local User Password Control Parameters
141
Setting Super Password Control Parameters
142
Setting a Local User Password in Interactive Mode
142
Displaying and Maintaining Password Control
143
Password Control Configuration Example
146
Configuring Public Keys
146
Public Key Configuration Task List
147
Configuring a Local Asymmetric Key Pair On the Local Device
147
Creating a Local Asymmetric Key Pair
147
Displaying or Exporting the Local Host Public Key
149
Destroying a Local Asymmetric Key Pair
149
Specifying the Peer Public Key On the Local Device
150
Displaying and Maintaining Public Keys
150
Public Key Configuration Examples
150
Manually Specifying the Peer Public Key On the Local Device
152
Importing a Public Key From a Public Key File
155
Configuring PKI
155
PKI Terms
156
PKI Architecture
157
PKI Applications
157
PKI Operation
157
PKI Configuration Task List
158
Configuring an Entity DN
159
Configuring a PKI Domain
161
Submitting a PKI Certificate Request
161
Submitting a Certificate Request in Auto Mode
161
Submitting a Certificate Request in Manual Mode
162
Retrieving a Certificate Manually
163
Configuring PKI Certificate Verification
163
Configuring Crl-Checking-Enabled PKI Certificate Verification
164
Configuring Crl-Checking-Disabled PKI Certificate Verification
164
Destroying a Local RSA Key Pair
164
Deleting a Certificate
165
Configuring an Access Control Policy
165
Displaying and Maintaining PKI
166
PKI Configuration Examples
166
Requesting a Certificate From a CA Server Running RSA Keon
169
Requesting a Certificate From a CA Server Running Windows ® 2003 Server
172
Configuring a Certificate Attribute-Based Access Control Policy
174
Troubleshooting PKI
174
Failed to Retrieve a CA Certificate
174
Failed to Request a Local Certificate
175
Failed to Retrieve Crls
176
Configuring SSH2.0
176
SSH Operation
178
Configuring the Switch As an SSH Server
178
SSH Server Configuration Task List
179
Generating a DSA or RSA Key Pair
179
Enabling the SSH Server Function
179
Configuring the User Interfaces for SSH Clients
180
Configuring a Client Public Key
181
Configuring an SSH User
182
Setting the SSH Management Parameters
183
Configuring the Switch As an SSH Client
183
SSH Client Configuration Task List
183
Specifying a Source Ip Address/Interface for the SSH Client
183
Configuring Whether First-Time Authentication Is Supported
184
Establishing a Connection Between the SSH Client and Server
185
Displaying and Maintaining SSH
185
SSH Server Configuration Examples
185
When the Switch Acts As a Server for Password Authentication
187
When the Switch Acts As a Server for Publickey Authentication
192
SSH Client Configuration Examples
192
When the Switch Acts As Client for Password Authentication
195
When the Switch Acts As Client for Publickey Authentication
198
Configuring SFTP
198
Configuring the Switch As an SFTP Server
198
Configuration Prerequisites
198
Enabling the SFTP Server
198
Configuring the SFTP Connection Idle Timeout Period
199
Configuring the Switch As an SFTP Client
199
Specifying a Source IP Address or Interface for the SFTP Client
199
Establishing a Connection to the SFTP Server
199
Working with SFTP Directories
200
Working with SFTP Files
201
Displaying Help Information
201
Terminating the Connection to the Remote SFTP Server
201
SFTP Client Configuration Example
205
SFTP Server Configuration Example
208
Configuring SSL
208
SSL Security Mechanism
208
SSL Protocol Stack
209
SSL Configuration Task List
209
Configuring an SSL Server Policy
209
Configuration Prerequisites
209
Configuration Procedure
210
SSL Server Policy Configuration Example
212
Configuring an SSL Client Policy
212
Configuration Prerequisites
212
Configuration Procedure
213
Displaying and Maintaining SSL
213
Troubleshooting SSL
213
SSL Handshake Failure
Advertisement
HP A5830 Series Command Reference Manual (249 pages)
Layer 2 - LAN Switching
Brand:
HP
| Category:
Switch
| Size: 2.23 MB
Table of Contents
1
Command Reference
3
Table of Contents
8
Ethernet Interface Configuration Commands
8
General Ethernet Interface Configuration Commands
8
Default
8
Description
9
Display Counters
10
Display Counters Rate
12
Display Interface
21
Display Packet-Drop Interface
22
Display Packet-Drop Summary
23
Display Port Combo
23
Duplex
24
Flow-Interval
25
Interface
25
Jumboframe Enable
26
Link-Delay
27
Loopback
27
Port Link-Mode
28
Port Link-Mode Interface-List
29
Reset Counters Interface
30
Reset Packet-Drop Interface
30
Shutdown
31
Speed
32
Layer 2 Ethernet Interface Configuration Commands
32
Broadcast-Suppression
33
Display Loopback-Detection
34
Display Port-Group Manual
35
Group-Member
36
Loopback-Detection Action
37
Loopback-Detection Control Enable
37
Loopback-Detection Enable
38
Loopback-Detection Interval-Time
39
Loopback-Detection Per-Vlan Enable
40
MDI
40
Multicast-Suppression
42
Port Auto-Power-Down
42
Port-Group Manual
43
Speed Auto
44
Unicast-Suppression
45
Virtual-Cable-Test
46
Layer 3 Ethernet Interface Configuration Commands
46
Mtu
47
Loopback and Null Interface Configuration Commands
47
Default
47
Description
48
Display Interface Loopback
51
Display Interface Null
53
Interface Loopback
53
Interface Null
54
Reset Counters Interface Loopback
54
Reset Counters Interface Null
55
Shutdown
56
MAC Address Table Configuration Commands
56
Display Mac-Address
57
Display Mac-Address Aging-Time
58
Display Mac-Address Statistics
59
Mac-Address (Interface View)
60
Mac-Address (System View)
61
Mac-Address Mac-Learning Disable
62
Mac-Address Max-Mac-Count
63
Mac-Address Timer
65
MAC Information Configuration Commands
65
Mac-Address Information Enable (Ethernet Interface View)
65
Mac-Address Information Enable (System View)
66
Mac-Address Information Interval
67
Mac-Address Information Mode
67
Mac-Address Information Queue-Length
69
Ethernet Link Aggregation Configuration Commands
69
Default
69
Description
70
Display Interface
73
Display Lacp System-ID
74
Display Link-Aggregation Load-Sharing Mode
76
Display Link-Aggregation Member-Port
78
Display Link-Aggregation Summary
80
Display Link-Aggregation Verbose
82
Enable Snmp Trap Updown
83
Interface Bridge-Aggregation
84
Lacp Period Short
84
Lacp System-Priority
85
Link-Aggregation Lacp Traffic-Redirect-Notification Enable
85
Link-Aggregation Load-Sharing Mode
87
Link-Aggregation Load-Sharing Mode Local-First
88
Link-Aggregation Mode
88
Link-Aggregation Port-Priority
89
Port Link-Aggregation Group
89
Reset Counters Interface
90
Reset Lacp Statistics
91
Shutdown
92
Port Isolation Configuration Commands
92
Display Port-Isolate Group
93
Port-Isolate Enable
95
Spanning Tree Configuration Commands
95
Active Region-Configuration
95
Bpdu-Drop Any
96
Check Region-Configuration
97
Display Stp
106
Display Stp Abnormal-Port
107
Display Stp Bpdu-Statistics
110
Display Stp Down-Port
111
Display Stp History
113
Display Stp Ignored-Vlan
114
Display Stp Region-Configuration
115
Display Stp Root
116
Display Stp Tc
118
Instance
119
Region-Name
119
Reset Stp
120
Revision-Level
121
Stp Bpdu-Protection
121
Stp Bridge-Diameter
122
Stp Compliance
123
Stp Config-Digest-Snooping
124
Stp Cost
125
Stp Edged-Port
126
Stp Enable
128
Stp Ignored Vlan
128
Stp Loop-Protection
129
Stp Max-Hops
130
Stp Mcheck
131
Stp Mode
131
Stp No-Agreement-Check
132
Stp Pathcost-Standard
133
Stp Point-To-Point
134
Stp Port Priority
135
Stp Port-Log
136
Stp Priority
137
Stp Region-Configuration
137
Stp Root Primary
138
Stp Root Secondary
139
Stp Root-Protection
140
Stp Tc-Protection
141
Stp Tc-Protection Threshold
141
Stp Timer Forward-Delay
142
Stp Timer Hello
143
Stp Timer Max-Age
144
Stp Timer-Factor
145
Stp Transmit-Limit
146
Vlan-Mapping Modulo
147
BPDU Tunneling Configuration Commands
147
Bpdu-Tunnel Dot1Q
148
Bpdu-Tunnel Tunnel-Dmac
150
VLAN Configuration Commands
150
Default
150
Description
151
Display Interface Vlan-Interface
154
Display Vlan
156
Interface Vlan-Interface
157
Ip Address
158
Mtu
158
Name
159
Reset Counters Interface Vlan-Interface
160
Shutdown
160
Vlan
161
Port-Based VLAN Configuration Commands
161
Display Port
162
Port
163
Port Access Vlan
164
Port Hybrid Pvid
165
Port Hybrid Vlan
167
Port Link-Type
168
Port Trunk Permit Vlan
169
Port Trunk Pvid
170
Mac-Based VLAN Configuration Commands
170
Display Mac-Vlan
172
Display Mac-Vlan Interface
173
Mac-Vlan Enable
173
Mac-Vlan Mac-Address
174
Mac-Vlan Trigger Enable
175
Port Pvid Disable
176
Vlan Precedence
176
Protocol-Based VLAN Configuration Commands
176
Display Protocol-Vlan Interface
177
Display Protocol-Vlan Vlan
178
Port Hybrid Protocol-Vlan
180
Protocol-Vlan
182
IP Subnet-Based VLAN Configuration Commands
182
Display Ip-Subnet-Vlan Interface
183
Display Ip-Subnet-Vlan Vlan
184
Ip-Subnet-Vlan
184
Port Hybrid Ip-Subnet-Vlan
187
Isolate-User-Vlan Configuration Commands
187
Display Isolate-User-Vlan
189
Isolate-User-Vlan
190
Isolate-User-Vlan Enable
190
Isolated-Vlan Enable
191
Port Isolate-User-Vlan Promiscuous
194
Port Isolate-User-Vlan Host
HP A5830 Series Configuration Manual (246 pages)
Layer 2 LAN Switching
Brand:
HP
| Category:
Switch
| Size: 2.1 MB
Table of Contents
1
Configuration Guide
3
Table of Contents
8
Configuring the Ethernet Interface
8
Naming the Ethernet Interfaces
8
Understanding the General Configuration
8
Configuring the Management Ethernet Interface
9
Configuring a Combo Interface
9
Configuring Basic Settings of an Ethernet Interface
10
Shutting Down an Ethernet Interface
11
Configuring Link-Down Event Suppression On an Ethernet Interface
11
Configuring Loopback Testing On an Ethernet Interface
12
Configuring the Link Mode of an Ethernet Interface
12
Configuring Jumbo Frame Support
13
Configuring a Layer 2 Ethernet Interface
13
Using the Layer 2 Ethernet Interface Configuration Task List
13
Configuring a Port Group
14
Enabling Ethernet Interface Auto Power-Down Function
14
Setting Ethernet Interface Speed Options for Auto Negotiation
15
Setting Storm Suppression
16
Setting the Statistics Polling Interval
16
Enabling Ethernet Interface Loopback Detection
18
Setting an Ethernet Interface MDI Mode
19
Testing an Ethernet Interface Cable Connection
19
Setting a Layer 3 Ethernet Interface MTU
20
Displaying and Maintaining an Ethernet Interface
21
Configuring the Loopback and Null Interface
21
Configuring a Loopback Interface
22
Configuring the Null Interface
22
Displaying and Maintaining Loopback and Null Interfaces
24
Configuring the MAC Address Table
24
Creating a MAC Address Table Entry
24
Using MAC Address Table Entries
25
Forwarding a MAC Address Table-Based Frame
25
Configuring the MAC Address Table
25
Configuring Static, Dynamic, and Blackhole MAC Address Table Entries
26
Disabling MAC Address Learning
27
Configuring the Aging Timer for Dynamic MAC Address Entries
28
Configuring the MAC Learning Limit On Ports
28
Displaying MAC Address Tables
28
Setting a MAC Address Table Configuration
30
Configuring MAC Information
30
Enabling MAC Information
30
Enabling MAC Information Globally
30
Enabling MAC Information On an Interface
30
Configuring MAC Information Mode
31
Configuring the Interval for Sending Syslog or Trap Messages
31
Configuring the MAC Information Queue Length
31
Setting a MAC Information Configuration
31
Network Requirements
32
Configuration Procedure
33
Configuring Ethernet Link-Aggregation
33
Basic Concepts
36
Using Aggregating Links in Static Mode
37
Using Aggregating Links in Dynamic Mode
39
Using Load-Sharing Criteria for Link-Aggregation Groups
39
Using the Ethernet Link-Aggregation Configuration Task List
39
Configuring an Aggregation Group
40
Configuring a Layer 2 Static Aggregation Group
41
Configuring a Layer 2 Dynamic Aggregation Group
42
Configuring an Aggregate Interface
42
Configuring the Description of an Aggregate Interface
42
Enabling Link State Traps for an Aggregate Interface
43
Shutting Down an Aggregate Interface
43
Restoring the Default Settings for an Aggregate Interface
43
Configuring Load Sharing for Link-Aggregation Groups
43
Configuring Load-Sharing Criteria for Link-Aggregation Groups
45
Enabling Local-First Load Sharing for Link-Aggregation
45
Enabling Link-Aggregation Traffic Redirection
46
Displaying and Maintaining Ethernet Link-Aggregation
46
Configuring Ethernet Link-Aggregation
47
Setting an Example Layer 2 Static Aggregation Configuration
49
Setting an Example Layer 2 Dynamic Aggregation Configuration
51
Configuring Port Isolation
51
Configuring an Isolation Group
51
Assigning a Port to the Isolation Group
51
Displaying Isolation Groups
52
Using a Port Isolation Configuration
53
Configuring the Spanning Tree
53
Using STP Protocol Packets
53
Outlining the Basic Concepts in STP
54
Performing the Calculation Process of the STP Algorithm
60
Using RSTP
60
Using PVST
60
Using MSTP
60
Limitations of STP, RSTP, and PVST
61
MSTP Features
61
MSTP Basic Concepts
65
Using MSTP
65
Implementing MSTP On Devices
65
Protocols and Standards
66
Configuration Task Lists
70
Configuring the Spanning Tree
70
Setting the Spanning Tree Mode
71
Configuring an MST Region
72
Configuring the Root Bridge or a Secondary Root Bridge
73
Configuring the Device Priority
73
Configuring the Maximum Hops of an MST Region
74
Configuring the Network Diameter of a Switched Network
74
Configuring Spanning Tree Timers
75
Configuring the Timeout Factor
76
Configuring the Maximum Port Rate
76
Configuring Edge Ports
77
Configuring Port Path Costs
79
Configuring Port Priority
80
Configuring the Port Link Type
80
Configuring Port Mode Used to Recognize/Send MSTP Packets
81
Enabling Port State Transition Information Output
82
Enabling the Spanning Tree Feature
83
Performing Mcheck
83
Configuring the VLAN Ignore Feature
85
Configuring Digest Snooping
87
Configuring No Agreement Check
89
Configuring Protection Functions
92
Displaying and Maintaining the Spanning Tree
93
Spanning Tree Configuration Examples
93
Setting the MSTP Configuration
97
Setting the PVST Configuration
101
Configuring BPDU Tunneling
102
Implementing BPDU Tunneling
103
Configuring BPDU Tunneling
103
Performing Configuration Prerequisites
103
Enabling BPDU Tunneling
104
Configuring Destination Multicast MAC Address for Bpdus
104
BPDU Tunneling Configuration Examples
104
Configuring BPDU Tunneling for the STP Configuration
106
Setting BPDU Tunneling for the PVST Configuration
108
Configuring VLAN
108
VLAN Fundamentals
109
Implementing the VLAN Types
110
Protocols and Standards
110
Configuring Basic VLAN Settings
111
Configuring VLAN Interface Basic Settings
111
Configuration Procedure
111
Configuring a VLAN Interface
113
Configuring Port-Based VLAN
113
Port Link Type
114
Pvid
115
Assigning a VLAN Access Port
116
Assigning a VLAN Trunk Port
117
Assigning a VLAN Hybrid Port
118
Configuring Port-Based VLAN
120
Configuring Mac-Based VLAN
120
Static Mac-Based VLAN Assignment
120
Dynamic Mac-Based VLAN Assignment
122
Dynamic Mac-Based VLAN
122
Configuring Mac-Based VLAN
124
Configuring Mac-Based VLAN
127
Configuring Protocol-Based VLAN
128
Configuring Protocol-Based VLAN
131
Configuring IP Subnet-Based VLAN
132
Setting the IP Subnet-Based VLAN Configuration
134
Displaying and Maintaining VLAN
135
Configuring Isolate-User-Vlan
135
Configuring Primary Isolate-User-Vlan
137
Configuring Secondary Vlans
138
Associating Secondary Vlans with an Isolate-User-Vlan
138
Displaying Isolate-User-Vlan
138
Setting an Example Isolate-User-Vlan Configuration
141
Configuring GVRP
144
Using GVRP
144
GVRP Registration Modes
144
Protocols and Standards
144
Configuration Task List
145
Configuring GVRP Functions
146
Configuring GARP Timers
147
Displaying and Maintaining GVRP
147
Setting the GVRP Configuration
147
Setting GVRP Normal Registration Mode Configuration
149
Setting the GVRP Fixed Registration Mode Configuration
150
Setting the GVRP Forbidden Registration Mode Configuration
152
Configuring Qinq
152
Operation
153
Frame Structure
153
Implementing Qinq
154
Modifying the TPID in a VLAN Tag
155
Protocols and Standards
155
Configuration Task List
155
Configuring Basic Qinq
155
Enabling Basic Qinq
156
Configuring VLAN Transparent Transmission
156
Configuring Selective Qinq
156
Configuring an SVLAN Tagging Policy
157
Configuring an Inner-Outer VLAN 802.1P Priority Mapping
158
Configuring CVLAN ID Substitution
159
Configuring the TPID Value in VLAN Tags
160
Qinq Configuration Examples
160
Setting Basic Qinq Configuration
162
Setting the VLAN Transparent Transmission Configuration
164
Setting Simple Selective Qinq Configuration
166
Setting the Comprehensive Selective Qinq Configuration
Advertisement
HP A5830 Series Configuration Manual (207 pages)
High Availability
Brand:
HP
| Category:
Switch
| Size: 1.72 MB
Table of Contents
1
Configuration Guide
1
High Availability
3
Table of Contents
7
High Availability Overview
7
Availability Requirements
7
Availability Evaluation
8
High Availability Technologies
8
Fault Detection Technologies
9
Protection Switchover Technologies
11
Ethernet OAM Configuration
11
Ethernet OAM Overview
11
Background
11
Major Functions of Ethernet OAM
11
Ethernet Oampdus
12
How Ethernet OAM Works
15
Standards and Protocols
15
Ethernet OAM Configuration Task List
15
Configuring Basic Ethernet OAM Functions
15
Configuring the Ethernet OAM Connection Detection Timers
16
Configuring Link Monitoring
16
Configuring Errored Symbol Event Detection
16
Configuring Errored Frame Event Detection
17
Configuring Errored Frame Period Event Detection
17
Configuring Errored Frame Seconds Event Detection
17
Displaying and Maintaining Ethernet OAM Configuration
18
Ethernet OAM Configuration Example
21
CFD Configuration
21
CFD Overview
21
Basic Concepts in CFD
23
CFD Functions
24
Protocols and Standards
24
CFD Configuration Task List
25
Configuring Basic CFD Settings
25
Enabling CFD
25
Configuring the CFD Protocol Version
25
Configuring Service Instances
26
Configuring Meps
27
Configuring MIP Generation Rules
28
Configuring CFD Functions
28
Configuration Prerequisites
28
Configuring CC On Meps
29
Configuring LB On Meps
29
Configuring LT On Meps
29
Displaying and Maintaining CFD
30
CFD Configuration Example
35
DLDP Configuration
35
DLDP Overview
35
Background
36
How DLDP Works
42
DLDP Configuration Task List
42
Configuring the Duplex Mode and Speed of an Ethernet Interface
43
Enabling DLDP
43
Setting DLDP Mode
43
Setting the Interval to Send Advertisement Packets
44
Setting the Delaydown Timer
44
Setting the Port Shutdown Mode
45
Configuring DLDP Authentication
45
Resetting DLDP State
46
Displaying and Maintaining DLDP
46
DLDP Configuration Examples
46
Automatically Shutting Down Unidirectional Links
50
Manually Shutting Down Unidirectional Links
53
Troubleshooting DLDP
54
RRPP Configuration
54
Background
54
Basic Concepts in RRPP
56
Rrppdus
57
RRPP Timers
57
How RRPP Works
59
Typical RRPP Networking
62
Protocols and Standards
62
RRPP Configuration Task List
63
Creating an RRPP Domain
63
Configuring Control Vlans
64
Configuring Protected Vlans
65
Configuring RRPP Rings
65
Configuring RRPP Ports
65
Configuring RRPP Nodes
67
Activating an RRPP Domain
67
Configuring RRPP Timers
68
Configuring an RRPP Ring Group
68
Displaying and Maintaining RRPP
69
RRPP Configuration Examples
69
Single Ring Configuration Example
71
Intersecting Ring Configuration Example
77
Dual Homed Rings Configuration Example
86
Intersecting-Ring Load Balancing Configuration Example
94
Troubleshooting
95
Smart Link Configuration
95
Smart Link Overview
95
Background
96
Terminology
97
How Smart Link Works
97
Smart Link Collaboration Mechanisms
98
Smart Link Configuration Task List
98
Configuring a Smart Link Device
98
Configuration Prerequisites
98
Configuring Protected Vlans for a Smart Link Group
99
Configuring Member Ports for a Smart Link Group
100
Configuring Role Preemption for a Smart Link Group
100
Enabling the Sending of Flush Messages
101
Configuring an Associated Device
101
Configuration Prerequisites
101
Enabling the Receiving of Flush Messages
101
Displaying and Maintaining Smart Link
102
Smart Link Configuration Examples
102
Single Smart Link Group Configuration Example
106
Multiple Smart Link Groups Load Sharing Configuration Example
111
Monitor Link Configuration
111
Monitor Link Overview
111
Terminology
112
How Monitor Link Works
112
Configuring Monitor Link
112
Configuration Prerequisites
112
Creating a Monitor Link Group
112
Configuring Monitor Link Group Member Ports
113
Displaying and Maintaining Monitor Link
113
Monitor Link Configuration Example
117
VRRP Configuration
117
VRRP Overview
118
VRRP Standard Protocol Mode
118
Introduction to VRRP Group
119
VRRP Timers
120
Packet Format
121
Principles of VRRP
121
VRRP Tracking
122
VRRP Application (Taking Ipv4-Based VRRP for Example)
123
Configuring VRRP for Ipv4
123
VRRP for Ipv4 Configuration Task List
124
Specifying the Type of MAC Addresses Mapped to Virtual IP Addresses
124
Creating a VRRP Group and Configuring Virtual IP Address
125
Configuring Router Priority, Preemptive Mode and Tracking Function
126
Configuring VRRP Packet Attributes
127
Enabling the Trap Function for VRRP
128
Displaying and Maintaining VRRP for Ipv4
128
Configuring VRRP for Ipv6
128
VRRP for Ipv6 Configuration Task List
128
Specifying the Type of MAC Addresses Mapped to Virtual Ipv6 Addresses
129
Creating a VRRP Group and Configuring a Virtual Ipv6 Address
130
Configuring Router Priority, Preemptive Mode and Tracking Function
131
Configuring VRRP Packet Attributes
132
Displaying and Maintaining VRRP for Ipv6
132
Ipv4-Based VRRP Configuration Examples
132
Single VRRP Group Configuration Example
135
VRRP Interface Tracking Configuration Example
138
VRRP with Multiple Vlans Configuration Example
141
Ipv6-Based VRRP Configuration Examples
141
Single VRRP Group Configuration Example
145
VRRP Interface Tracking Configuration Example
148
VRRP with Multiple Vlans Configuration Example
152
Troubleshooting VRRP
HP A5830 Series Configuration Manual (152 pages)
Brand:
HP
| Category:
Network Router
| Size: 1.56 MB
Table of Contents
1
Configuration Guide
3
Table of Contents
8
Configuring CLI
8
Entering the CLI
8
Undo Form of a Command
8
CLI Views
9
Entering System View
9
Exiting the Current View
10
Returning to User View
10
Using the CLI Online Help
11
Entering and Editing Commands
11
Entering Incomplete Keywords
12
Configuring Command Aliases
12
Configuring CLI Hotkeys
14
Redisplaying Commands Previously Entered but Not Submitted
14
Checking Command-Line Errors
14
Using Command History
15
Accessing History Commands
15
Configuring the History Buffer Size
16
Controlling the CLI Display
16
Filtering Output Information
19
Configuring User Privilege and Command Levels
19
Configuring a User Privilege Level
22
Switching User Privilege Level
25
Modifying the Level of a Command
25
Saving the Current Configuration
26
Displaying CLI
27
Login Methods
28
User Interface Overview
28
Users and User Interfaces
28
Numbering User Interfaces
30
CLI Login
30
Overview
30
Logging in Through the Console Port
30
Configuration Requirements
31
Login Procedure
33
Console Login Authentication Modes
34
Configuring None Authentication for Console Login
35
Configuring Password Authentication for Console Login
36
Configuring Scheme Authentication for Console Login
39
Configuring Optional Common Settings for Console Login
41
Logging in Through Telnet
42
Telnet Login Authentication Modes
43
Configuring None Authentication for Telnet Login
44
Configuring Password Authentication for Telnet Login
45
Configuring Scheme Authentication for Telnet Login
49
Configuring Common Settings for VTY User Interfaces (Optional)
50
Configuring the Device to Log in to a Telnet Server As a Telnet Client
51
Logging in Through SSH
52
Configuring the SSH Server
55
Configuring the SSH Client to Log in to the SSH Server
55
Displaying and Maintaining CLI Login
57
Web Login
57
Overview
57
Configuring HTTP Login
58
Configuring HTTPS Login
60
Displaying Web Login
60
Web Login Example
60
HTTP Login Example
62
HTTPS Login Example
65
NMS Login
65
Overview
65
Configuring NMS Login
67
NMS Login Example
70
User Login Control
70
User Login Control Overview
70
Configuring Login Control Over Telnet Users
70
Configuring Source Ip-Based Login Control Over Telnet Users
71
Configuring Source and Destination Ip-Based Login Control Over Telnet Users
71
Configuring Source Mac-Based Login Control Over Telnet Users
72
Source Mac-Based Login Control Configuration Example
73
Configuring Source Ip-Based Login Control Over NMS Users
73
Source Ip-Based Login Control Over NMS Users Configuration Example
74
Configuring Source Ip-Based Login Control Over Web Users
75
Logging Off Online Web Users
75
Source Ip-Based Login Control Over Web Users Configuration Example
77
Configuring FTP
77
Overview
77
Operation Mode
78
Configuring the FTP Client
78
Establishing an FTP Connection
80
Managing Directories On the FTP Server
80
Operating the Files On the FTP Server
81
Using Another Username to Log in to the FTP Server
81
Maintaining and Debugging the FTP Connection
82
Terminating an FTP Connection
82
FTP Client Configuration Example
84
Configuring the FTP Server
84
Configuring FTP Server Operating Parameters
85
Configuring Authentication and Authorization On the FTP Server
86
FTP Server Configuration Example
88
Displaying FTP
89
Configuring TFTP
89
Overview
89
Operation Mode
90
Configuring the TFTP Client
91
Displaying the TFTP Client
91
TFTP Client Configuration Example
93
File Management
93
Filename Formats
93
Performing File Operations
94
Displaying File Information
94
Displaying the Contents of a File
94
Renaming a File
94
Copying a File
94
Moving a File
95
Deleting a File
95
Restoring a File From the Recycle Bin
95
Emptying the Recycle Bin
95
Performing Directory Operations
95
Displaying Directory Information
96
Displaying the Current Working Directory
96
Changing the Current Working Directory
96
Creating a Directory
96
Removing a Directory
97
Performing Storage Media Operations
97
Managing Storage Media Space
97
Performing Batch Operations
98
Setting Prompt Modes
98
Example for File Operations
99
Configuration File Management
99
Overview
99
Configuration Types
100
Format and Content of a Configuration File
100
Coexistence of Multiple Configuration Files
100
Startup with the Configuration File
101
Saving the Running Configuration
101
Enabling Configuration File Auto-Save
101
Selecting the Modes for Saving the Configuration File
102
Setting Configuration Rollback
103
Configuration Task List
103
Configuring Parameters for Saving the Current Running Configuration
104
Enabling Automatic Saving of the Running Configuration
104
Manually Saving the Running Configuration
105
Setting Configuration Rollback
105
Specifying a Startup Configuration File
106
Backing Up the Startup Configuration File
106
Deleting a Startup Configuration File
107
Restoring a Startup Configuration File
107
Displaying a Configuration File
Share and save
Advertisement
Related Products
HP A5820X-24XG-SFP+
HP A5800-48G
HP A5810-48G
HP A5820X Series
HP A5800 Series
HP A5500 SI Switch Series
HP A5500 HI Series
HP A5500-24G-4SFP HI
HP A5120-24G EI TAA
HP A5120-16G SI
HP Categories
Desktop
Laptop
Server
Switch
Monitor
More HP Manuals
×
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
×
Upload manual
Upload from disk
Upload from URL