HP FlexFabric 5700 series Manuals

Manuals and User Guides for HP FlexFabric 5700 series. We have 5 HP FlexFabric 5700 series manuals available for free PDF download: Security Configuration Manual, Configuration Manual

HP FlexFabric 5700 series Security Configuration Manual

HP FlexFabric 5700 series Security Configuration Manual (460 pages)

Brand: HP | Category: Switch | Size: 4.69 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Aaa13................................................................................................................................................................
Radius14................................................................................................................................................................
Hwtacacs19................................................................................................................................................................
Ldap21................................................................................................................................................................
Aaa Implementation On The Device23................................................................................................................................................................
Protocols And Standards25................................................................................................................................................................
Fips Compliance28................................................................................................................................................................
Configuring Aaa Schemes30................................................................................................................................................................
Configuring User Group Attributes33................................................................................................................................................................
Configuring Radius Schemes34................................................................................................................................................................
Configuring Hwtacacs Schemes44................................................................................................................................................................
Configuring Ldap Schemes50................................................................................................................................................................
Configuring Aaa Methods For Isp Domains53................................................................................................................................................................
Configuration Prerequisites54................................................................................................................................................................
Configuring Authentication Methods For An Isp Domain55................................................................................................................................................................
Configuring Authorization Methods For An Isp Domain56................................................................................................................................................................
Configuring Accounting Methods For An Isp Domain57................................................................................................................................................................
Enabling The Session-control Feature58................................................................................................................................................................
Setting The Maximum Number Of Concurrent Login Users59................................................................................................................................................................
Displaying And Maintaining Aaa60................................................................................................................................................................
Local Authentication, Hwtacacs Authorization, And Radius Accounting For Ssh Users61................................................................................................................................................................
Authentication And Authorization For Ssh Users By A Radius Server63................................................................................................................................................................
Authentication For Ssh Users By An Ldap Server66................................................................................................................................................................
Troubleshooting Radius71................................................................................................................................................................
Radius Accounting Error72................................................................................................................................................................
X Overview74................................................................................................................................................................
X-related Protocols75................................................................................................................................................................
Eap Over Radius76................................................................................................................................................................
X Authentication Initiation77................................................................................................................................................................
X Authentication Procedures78................................................................................................................................................................
Comparing Eap Relay And Eap Termination79................................................................................................................................................................
Eap Termination81................................................................................................................................................................
Configuring 802.1x83................................................................................................................................................................
Guest Vlan85................................................................................................................................................................
Auth-fail Vlan86................................................................................................................................................................
Critical Vlan88................................................................................................................................................................
Using 802.1x Authentication With Other Features89................................................................................................................................................................
User Profile Assignment90................................................................................................................................................................
Enabling Eap Relay Or Eap Termination92................................................................................................................................................................
Setting The Port Authorization State93................................................................................................................................................................
Setting The Maximum Number Of Authentication Request Attempts94................................................................................................................................................................
Configuring The Online User Handshake Feature95................................................................................................................................................................
Configuration Guidelines96................................................................................................................................................................
Configuring The Quiet Timer97................................................................................................................................................................
Configuring An 802.1x Guest Vlan98................................................................................................................................................................
Configuration Procedure99................................................................................................................................................................
Specifying Supported Domain Name Delimiters101................................................................................................................................................................
Displaying And Maintaining 802.1x102................................................................................................................................................................
X Guest Vlan And Authorization Vlan Configuration Example105................................................................................................................................................................
X With Acl Assignment Configuration Example107................................................................................................................................................................
X With Ead Assistant Configuration Example109................................................................................................................................................................
Troubleshooting 802.1x Ead Assistant For Web Browser Users112................................................................................................................................................................
Configuring Mac Authentication113................................................................................................................................................................
Vlan Assignment114................................................................................................................................................................
Acl Assignment116................................................................................................................................................................
Configuration Task List117................................................................................................................................................................
Specifying A Mac Authentication Domain118................................................................................................................................................................
Setting Mac Authentication Timers119................................................................................................................................................................
Enabling Mac Authentication Multi-vlan Mode On A Port120................................................................................................................................................................
Configuring A Mac Authentication Guest Vlan121................................................................................................................................................................
Configuring The Keep-online Feature122................................................................................................................................................................
Displaying And Maintaining Mac Authentication123................................................................................................................................................................
Radius-based Mac Authentication Configuration Example125................................................................................................................................................................
Acl Assignment Configuration Example127................................................................................................................................................................
Configuring Portal Authentication130................................................................................................................................................................
Interaction Between Portal System Components132................................................................................................................................................................
Portal Authentication Process133................................................................................................................................................................
Portal Configuration Task List135................................................................................................................................................................
Configuring A Portal Authentication Server136................................................................................................................................................................
Configuring A Portal Web Server137................................................................................................................................................................
Configuring An Authentication Source Subnet139................................................................................................................................................................
Configuring An Authentication Destination Subnet140................................................................................................................................................................
Setting The Maximum Number Of Portal Users141................................................................................................................................................................
Configuring Portal Detection Features142................................................................................................................................................................
Configuring Portal Authentication Server Detection143................................................................................................................................................................
Configuring Portal Web Server Detection144................................................................................................................................................................
Configuring Portal User Synchronization145................................................................................................................................................................
Configuring The Portal Fail-permit Feature146................................................................................................................................................................
Applying A Nas-id Profile To An Interface147................................................................................................................................................................
Enabling Portal Roaming148................................................................................................................................................................
Portal Configuration Examples149................................................................................................................................................................
Configuring Re-dhcp Portal Authentication157................................................................................................................................................................
Configuring Cross-subnet Portal Authentication161................................................................................................................................................................
Configuring Extended Direct Portal Authentication164................................................................................................................................................................
Configuring Extended Re-dhcp Portal Authentication167................................................................................................................................................................
Configuring Extended Cross-subnet Portal Authentication171................................................................................................................................................................
Configuring Portal Server Detection And Portal User Synchronization174................................................................................................................................................................
Troubleshooting Portal182................................................................................................................................................................
Cannot Log Out Portal Users On The Radius Server183................................................................................................................................................................
Re-dhcp Portal Authenticated Users Cannot Log In Successfully184................................................................................................................................................................
Configuring Port Security185................................................................................................................................................................
Enabling Port Security189................................................................................................................................................................
Setting The Port Security Mode190................................................................................................................................................................
Configuring Port Security Features191................................................................................................................................................................
Configuring Secure Mac Addresses192................................................................................................................................................................
Ignoring Authorization Information From The Server194................................................................................................................................................................
Applying Nas-id Profile To Port Security195................................................................................................................................................................
Enabling The Authorization-fail-offline Feature196................................................................................................................................................................
Userloginwithoui Configuration Example198................................................................................................................................................................
Configure Aaa199................................................................................................................................................................
Macaddresselseuserloginsecure Configuration Example201................................................................................................................................................................
Troubleshooting Port Security205................................................................................................................................................................
Configuring Password Control206................................................................................................................................................................
Password Updating And Expiration207................................................................................................................................................................
User Login Control208................................................................................................................................................................
Password Not Displayed In Any Form209................................................................................................................................................................
Enabling Password Control210................................................................................................................................................................
Setting User Group Password Control Parameters211................................................................................................................................................................
Setting Local User Password Control Parameters212................................................................................................................................................................
Setting Super Password Control Parameters213................................................................................................................................................................
Displaying And Maintaining Password Control214................................................................................................................................................................
Verifying The Configuration216................................................................................................................................................................
Managing Public Keys218................................................................................................................................................................
Creating A Local Key Pair219................................................................................................................................................................
Distributing A Local Host Public Key220................................................................................................................................................................
Displaying A Host Public Key221................................................................................................................................................................
Configuring A Peer Host Public Key222................................................................................................................................................................
Displaying And Maintaining Public Keys223................................................................................................................................................................
Example For Importing A Public Key From A Public Key File225................................................................................................................................................................
Configuring Pki228................................................................................................................................................................
Pki Architecture229................................................................................................................................................................
Pki Operation230................................................................................................................................................................
Configuring A Pki Entity231................................................................................................................................................................
Configuring A Pki Domain232................................................................................................................................................................
Requesting A Certificate234................................................................................................................................................................
Configuring Automatic Certificate Request235................................................................................................................................................................
Aborting A Certificate Request236................................................................................................................................................................
Verifying Certificates With Crl Checking238................................................................................................................................................................
Specifying The Storage Path For The Certificates And Crls239................................................................................................................................................................
Removing A Certificate240................................................................................................................................................................
Displaying And Maintaining Pki241................................................................................................................................................................
Pki Configuration Examples242................................................................................................................................................................
Requesting A Certificate From A Windows Server 2003 Ca Server245................................................................................................................................................................
Requesting A Certificate From An Openca Server248................................................................................................................................................................
Certificate Import And Export Configuration Example252................................................................................................................................................................
Troubleshooting Pki Configuration257................................................................................................................................................................
Failed To Request Local Certificates258................................................................................................................................................................
Failed To Obtain Crls259................................................................................................................................................................
Failed To Import The Ca Certificate260................................................................................................................................................................
Failed To Export Certificates261................................................................................................................................................................
Configuring Ipsec262................................................................................................................................................................
Security Protocols And Encapsulation Modes263................................................................................................................................................................
Security Association264................................................................................................................................................................
Authentication And Encryption265................................................................................................................................................................
Implementing Acl-based Ipsec267................................................................................................................................................................
Configuring An Acl268................................................................................................................................................................
Configuring An Ipsec Transform Set269................................................................................................................................................................
Configuring A Manual Ipsec Policy270................................................................................................................................................................
Configuring An Ike-based Ipsec Policy272................................................................................................................................................................
Applying An Ipsec Policy To An Interface276................................................................................................................................................................
Configuring The Ipsec Anti-replay Function277................................................................................................................................................................
Configuring Ipsec Anti-replay Redundancy278................................................................................................................................................................
Enabling Qos Pre-classify279................................................................................................................................................................
Enabling Logging Of Ipsec Packets280................................................................................................................................................................
Configuring Ipsec For Ipv6 Routing Protocols281................................................................................................................................................................
Configuring Snmp Notifications For Ipsec282................................................................................................................................................................
Displaying And Maintaining Ipsec283................................................................................................................................................................
Ipsec Configuration Examples284................................................................................................................................................................
Configuring An Ike-based Ipsec Tunnel For Ipv4 Packets286................................................................................................................................................................
Configuring Ipsec For Ripng289................................................................................................................................................................
Configuring Ike293................................................................................................................................................................
Ike Security Mechanism294................................................................................................................................................................
Configuring An Ike Profile296................................................................................................................................................................
Configuring An Ike Proposal298................................................................................................................................................................
Configuring An Ike Keychain299................................................................................................................................................................
Configuring The Global Identity Information300................................................................................................................................................................
Configuring The Ike Keepalive Function301................................................................................................................................................................
Configuring Ike Dpd302................................................................................................................................................................
Enabling Invalid Spi Recovery303................................................................................................................................................................
Displaying And Maintaining Ike304................................................................................................................................................................
Ike Negotiation Failed Because No Ike Proposals Or Ike Keychains Are Referenced Correctly308................................................................................................................................................................
Ipsec Sa Negotiation Failed Due To Invalid Identity Information309................................................................................................................................................................
Configuring Ssh312................................................................................................................................................................
Ssh Authentication Methods313................................................................................................................................................................
Configuring The Device As An Ssh Server315................................................................................................................................................................
Enabling The Stelnet Server316................................................................................................................................................................
Enabling The Scp Server317................................................................................................................................................................
Configuring A Client's Host Public Key318................................................................................................................................................................
Configuring An Ssh User319................................................................................................................................................................
Configuring The Ssh Management Parameters320................................................................................................................................................................
Configuring The Device As An Stelnet Client322................................................................................................................................................................
Configuring The Device As An Sftp Client324................................................................................................................................................................
Working With Sftp Directories326................................................................................................................................................................
Terminating The Connection With The Sftp Server327................................................................................................................................................................
Displaying And Maintaining Ssh329................................................................................................................................................................
Publickey Authentication Enabled Stelnet Server Configuration Example332................................................................................................................................................................
Password Authentication Enabled Stelnet Client Configuration Example337................................................................................................................................................................
Publickey Authentication Enabled Stelnet Client Configuration Example341................................................................................................................................................................
Sftp Configuration Examples343................................................................................................................................................................
Publickey Authentication Enabled Sftp Client Configuration Example346................................................................................................................................................................
Ssh Connection347................................................................................................................................................................
Scp File Transfer With Password Authentication349................................................................................................................................................................
Netconf Over Ssh Configuration Example With Password Authentication351................................................................................................................................................................
Configuring Ssl354................................................................................................................................................................
Configuring An Ssl Client Policy356................................................................................................................................................................
Displaying And Maintaining Ssl357................................................................................................................................................................
Configuring Ip Source Guard358................................................................................................................................................................
Static Ipsg Bindings359................................................................................................................................................................
Ipsg Configuration Task List360................................................................................................................................................................
Configuring A Static Ipv4sg Binding361................................................................................................................................................................
Configuring A Static Ipv6sg Binding362................................................................................................................................................................
Ipsg Configuration Examples363................................................................................................................................................................
Dynamic Ipv4sg Using Dhcp Snooping Configuration Example364................................................................................................................................................................
Dynamic Ipv4sg Using Dhcp Relay Configuration Example365................................................................................................................................................................
Static Ipv6sg Configuration Example366................................................................................................................................................................
Dynamic Ipv6sg Using Dhcpv6 Snooping Configuration Example367................................................................................................................................................................
Configuring Arp Attack Protection369................................................................................................................................................................
Configuring Arp Source Suppression370................................................................................................................................................................
Configuration Example371................................................................................................................................................................
Configuring Arp Packet Rate Limit372................................................................................................................................................................
Configuring Source Mac-based Arp Attack Detection373................................................................................................................................................................
Configuring Arp Packet Source Mac Consistency Check375................................................................................................................................................................
Configuring Authorized Arp376................................................................................................................................................................
Configuring Arp Packet Validity Check377................................................................................................................................................................
Configuring Arp Restricted Forwarding378................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example379................................................................................................................................................................
Arp Restricted Forwarding Configuration Example380................................................................................................................................................................
Configuring Arp Scanning And Fixed Arp382................................................................................................................................................................
Configuring Mff387................................................................................................................................................................
Basic Concepts388................................................................................................................................................................
Mff Working Mechanism389................................................................................................................................................................
Enabling Periodic Gateway Probe390................................................................................................................................................................
Displaying And Maintaining Mff391................................................................................................................................................................
Manual-mode Mff Configuration Example In A Ring Network392................................................................................................................................................................
Configuring Crypto Engines395................................................................................................................................................................
Configuring Fips396................................................................................................................................................................
Configuring Fips Mode397................................................................................................................................................................
Configuration Changes In Fips Mode398................................................................................................................................................................
Exiting Fips Mode399................................................................................................................................................................
Fips Self-tests400................................................................................................................................................................
Conditional Self-tests401................................................................................................................................................................
Fips Configuration Examples402................................................................................................................................................................
Entering Fips Mode Through Manual Reboot403................................................................................................................................................................
Exiting Fips Mode Through Automatic Reboot404................................................................................................................................................................
Exiting Fips Mode Through Manual Reboot405................................................................................................................................................................
Configuring User Profiles407................................................................................................................................................................
Configuring Parameters For A User Profile408................................................................................................................................................................
Configuring Attack Detection And Prevention413................................................................................................................................................................
Configuring Nd Attack Defense414................................................................................................................................................................
Support And Other Resources415................................................................................................................................................................
Conventions416................................................................................................................................................................
Index418................................................................................................................................................................

Advertisement

HP FlexFabric 5700 series Configuration Manual

HP FlexFabric 5700 series Configuration Manual (185 pages)

FCoE Configuration  
Brand: HP | Category: Switch | Size: 1.91 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Fcoe Overview8................................................................................................................................................................
Storage Area Network8................................................................................................................................................................
Fc San8................................................................................................................................................................
Fc Protocol9................................................................................................................................................................
Basic Concepts9................................................................................................................................................................
Communication Flow11................................................................................................................................................................
Vsan11................................................................................................................................................................
Fc Zone12................................................................................................................................................................
Fcoe12................................................................................................................................................................
How Fcoe Works14................................................................................................................................................................
Fcoe Modes16................................................................................................................................................................
Fcf Mode17................................................................................................................................................................
Npv Mode17................................................................................................................................................................
Transit Mode18................................................................................................................................................................
Protocols And Standards19................................................................................................................................................................
Fcoe Configuration Guidelines20................................................................................................................................................................
Configuring The Switch To Operate In Advanced Mode Or Expert Mode20................................................................................................................................................................
Configuring An Fcoe Mode20................................................................................................................................................................
Fcoe Features Supported In Different Fcoe Modes20................................................................................................................................................................
Configuring Vfc Interfaces22................................................................................................................................................................
Configuring A Vfc Interface22................................................................................................................................................................
Displaying And Maintaining Vfc Interfaces23................................................................................................................................................................
Enabling Fcoe24................................................................................................................................................................
Fcoe Enabling Configuration Task List24................................................................................................................................................................
Enabling Fcoe For A Vlan And Mapping The Vlan To A Vsan24................................................................................................................................................................
Configuration Restrictions And Guidelines24................................................................................................................................................................
Configuration Procedure24................................................................................................................................................................
Setting An Fc-map Value25................................................................................................................................................................
Setting An Fka Advertisement Interval Value25................................................................................................................................................................
Setting The Fcf Priority27................................................................................................................................................................
Setting The System Fcf Priority27................................................................................................................................................................
Setting The Vfc Interface Fcf Priority27................................................................................................................................................................
Displaying And Maintaining Fcoe27................................................................................................................................................................
Fcoe Enabling Configuration Example28................................................................................................................................................................
Network Requirements28................................................................................................................................................................
Configuring Vsans33................................................................................................................................................................
Vsan Fundamentals33................................................................................................................................................................
Creating A Vsan34................................................................................................................................................................
Configuring A Trunk Vsan34................................................................................................................................................................
Displaying And Maintaining Vsans34................................................................................................................................................................
Vsan Configuration Examples35................................................................................................................................................................
Requirements Analysis35................................................................................................................................................................
Verifying The Configuration37................................................................................................................................................................
Building A Fabric39................................................................................................................................................................
Overview39................................................................................................................................................................
Principal Switch Selection39................................................................................................................................................................
Domain Id Assignment40................................................................................................................................................................
Fc Address Assignment41................................................................................................................................................................
Fabric Building Configuration Task List41................................................................................................................................................................
Building A Fabric Statically42................................................................................................................................................................
Building A Fabric Dynamically42................................................................................................................................................................
Enabling Or Disabling The Fabric Configuration Feature43................................................................................................................................................................
Setting A Fabric Name43................................................................................................................................................................
Setting The Switch Priority43................................................................................................................................................................
Configuring An Allowed Domain Id List44................................................................................................................................................................
Configuring A Domain Id For A Switch45................................................................................................................................................................
Binding The Wwn Of An N_port To An Fc Address45................................................................................................................................................................
Setting Fabric Timers46................................................................................................................................................................
Setting Fabric Timers In System View46................................................................................................................................................................
Setting Fabric Timers In Vsan View46................................................................................................................................................................
Configuring Fabric Reconfiguration47................................................................................................................................................................
Enabling The Automatic Reconfiguration Feature47................................................................................................................................................................
Manually Initiating A Fabric Reconfiguration47................................................................................................................................................................
Configuring A Vfc Interface To Reject Incoming Rcf Requests48................................................................................................................................................................
Enabling Snmp Notifications48................................................................................................................................................................
Configuring Rscn Aggregation48................................................................................................................................................................
Rscn48................................................................................................................................................................
Rscn Aggregation49................................................................................................................................................................
Configuring And Obtaining Fc4 Information Of Nodes49................................................................................................................................................................
Enabling Scsi-fcp Information Autodiscovery50................................................................................................................................................................
Configuring The Default Fc4 Information For A Node50................................................................................................................................................................
Displaying And Maintaining A Fabric51................................................................................................................................................................
Fabric Building Configuration Examples51................................................................................................................................................................
Static Fabric Building Configuration Example51................................................................................................................................................................
Dynamic Fabric Building Configuration Example54................................................................................................................................................................
Configuring Fc Routing And Forwarding59................................................................................................................................................................
Routing Table And Fib Table59................................................................................................................................................................
Direct Routes60................................................................................................................................................................
Static Routes61................................................................................................................................................................
Fspf Routes61................................................................................................................................................................
Configuring Static Fc Routes62................................................................................................................................................................
Configuring Fspf63................................................................................................................................................................
Fspf Configuration Task List63................................................................................................................................................................
Enabling Fspf63................................................................................................................................................................
Setting The Shortest Spf Calculation Interval64................................................................................................................................................................
Setting The Minimum Lsr Arrival Interval64................................................................................................................................................................
Setting The Minimum Lsr Refresh Interval64................................................................................................................................................................
Setting The Fspf Cost For An Interface65................................................................................................................................................................
Setting The Hello Interval For An Interface65................................................................................................................................................................
Setting The Dead Interval For An Interface65................................................................................................................................................................
Setting The Lsr Retransmission Interval For An Interface66................................................................................................................................................................
Disabling Fspf For An Interface66................................................................................................................................................................
Configuring Fspf Gr66................................................................................................................................................................
Displaying And Maintaining Fc Routing And Forwarding67................................................................................................................................................................
Fc Routing Configuration Examples68................................................................................................................................................................
Static Fc Routing Configuration Example68................................................................................................................................................................
Fspf Configuration Example73................................................................................................................................................................
Configuring Fc Zones77................................................................................................................................................................
Zoning Mode77................................................................................................................................................................
Zone Database77................................................................................................................................................................
Pairwise80................................................................................................................................................................
Zone Distribution In Basic Zoning Mode80................................................................................................................................................................
Zone Distribution In Enhanced Zoning Mode82................................................................................................................................................................
Zone Merge In Basic Zoning Mode83................................................................................................................................................................
Zone Merge In Enhanced Zoning Mode85................................................................................................................................................................
Access Control86................................................................................................................................................................
Fc Zone Configuration Task List86................................................................................................................................................................
Configuring A Zoning Mode87................................................................................................................................................................
Configuring The Pairwise Feature88................................................................................................................................................................
Configuring Zone Aliases88................................................................................................................................................................
Configuring Zones89................................................................................................................................................................
Configuring Zone Sets89................................................................................................................................................................
Configuring The Default Zone Policy90................................................................................................................................................................
Setting The Zone Distribution And Merge Type90................................................................................................................................................................
Setting A Merge Control Mode90................................................................................................................................................................
Enabling Hard Zoning91................................................................................................................................................................
Activating A Zone Set And Distributing It To The Entire Fabric92................................................................................................................................................................
Triggering A Complete Distribution93................................................................................................................................................................
Renaming Zone Aliases, Zones, And Zone Sets93................................................................................................................................................................
Copying Zone Aliases, Zones, And Zone Sets94................................................................................................................................................................
Deleting The Zone Database94................................................................................................................................................................
Displaying And Maintaining Fc Zones95................................................................................................................................................................
Fc Zone Configuration Example95................................................................................................................................................................
Configuring Npv100................................................................................................................................................................
Downlink Interface And Downlink100................................................................................................................................................................
Uplink Interface And Uplink101................................................................................................................................................................
Downlink-to-uplink Interface Mappings101................................................................................................................................................................
Disruptive Load Balancing101................................................................................................................................................................
Npv Configuration Task List101................................................................................................................................................................
Configuring Uplink Interfaces And Downlink Interfaces102................................................................................................................................................................
Configuring Uplink Interfaces102................................................................................................................................................................
Configuring Downlink Interfaces102................................................................................................................................................................
Configuring Downlink-to-uplink Interface Mappings103................................................................................................................................................................
Initiating A Disruptive Load-balancing Process103................................................................................................................................................................
Displaying And Maintaining Npv103................................................................................................................................................................
Npv Configuration Examples104................................................................................................................................................................
Configuring Fip Snooping109................................................................................................................................................................
Fip Snooping Network Diagram109................................................................................................................................................................
How Fip Snooping Works110................................................................................................................................................................
Fip Snooping Configuration Task List111................................................................................................................................................................
Enabling Fip Snooping111................................................................................................................................................................
Configuring The Operating Mode Of An Ethernet Interface111................................................................................................................................................................
Setting The Fc-map Value112................................................................................................................................................................
Displaying And Maintaining Fip Snooping112................................................................................................................................................................
Fip Snooping Configuration Example112................................................................................................................................................................
Configuring Fcs116................................................................................................................................................................
Starting A Topology Discovery118................................................................................................................................................................
Stopping A Topology Discovery119................................................................................................................................................................
Displaying And Maintaining Fcs119................................................................................................................................................................
Fcs Configuration Example119................................................................................................................................................................
Configuring Fdmi123................................................................................................................................................................
Displaying And Maintaining Fdmi124................................................................................................................................................................
Configuring Fc Ping125................................................................................................................................................................
Fc Ping Configuration Examples125................................................................................................................................................................
Configuring Fc Tracert129................................................................................................................................................................
Fc Tracert Configuration Examples130................................................................................................................................................................
Comprehensive Fcoe Configuration Examples136................................................................................................................................................................
Fcoe Configuration Example (in Standalone Mode)136................................................................................................................................................................
Configuration Procedures138................................................................................................................................................................
Configuring Switch B143................................................................................................................................................................
Fcoe Configuration Example (in Irf Mode)148................................................................................................................................................................
Appendixes166................................................................................................................................................................
Appendix A Fabric Address Assignment166................................................................................................................................................................
Appendix B Well-known Fabric Addresses166................................................................................................................................................................
Support And Other Resources168................................................................................................................................................................
Contacting Hp168................................................................................................................................................................
Subscription Service168................................................................................................................................................................
Related Information168................................................................................................................................................................
Documents168................................................................................................................................................................
Websites168................................................................................................................................................................
Conventions169................................................................................................................................................................
Index171................................................................................................................................................................
HP FlexFabric 5700 series Configuration Manual

HP FlexFabric 5700 series Configuration Manual (132 pages)

Brand: HP | Category: Switch | Size: 1.5 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring Acls7................................................................................................................................................................
Overview7................................................................................................................................................................
Applications On The Switch7................................................................................................................................................................
Acl Categories7................................................................................................................................................................
Numbering And Naming Acls8................................................................................................................................................................
Match Order8................................................................................................................................................................
Rule Numbering9................................................................................................................................................................
Fragments Filtering With Acls9................................................................................................................................................................
Configuration Task List10................................................................................................................................................................
Configuring A Basic Acl10................................................................................................................................................................
Configuring An Ipv4 Basic Acl10................................................................................................................................................................
Configuring An Ipv6 Basic Acl11................................................................................................................................................................
Configuring An Advanced Acl11................................................................................................................................................................
Configuring An Ipv4 Advanced Acl12................................................................................................................................................................
Configuring An Ipv6 Advanced Acl13................................................................................................................................................................
Configuring An Ethernet Frame Header Acl14................................................................................................................................................................
Configuring A User-defined Acl15................................................................................................................................................................
Copying An Acl16................................................................................................................................................................
Configuring Packet Filtering With Acls16................................................................................................................................................................
Applying An Acl To An Interface For Packet Filtering17................................................................................................................................................................
Configuring The Applicable Scope Of Packet Filtering On A Vlan Interface17................................................................................................................................................................
Setting The Interval For Generating And Outputting Packet Filtering Logs17................................................................................................................................................................
Setting The Packet Filtering Default Action18................................................................................................................................................................
Displaying And Maintaining Acls18................................................................................................................................................................
Acl Configuration Example18................................................................................................................................................................
Network Requirements18................................................................................................................................................................
Configuration Procedure19................................................................................................................................................................
Verifying The Configuration19................................................................................................................................................................
Qos Overview21................................................................................................................................................................
Qos Service Models21................................................................................................................................................................
Best-effort Service Model21................................................................................................................................................................
Intserv Model21................................................................................................................................................................
Diffserv Model21................................................................................................................................................................
Qos Techniques Overview22................................................................................................................................................................
Deploying Qos In A Network22................................................................................................................................................................
Configuring A Qos Policy24................................................................................................................................................................
Non-mqc Approach24................................................................................................................................................................
Mqc Approach24................................................................................................................................................................
Configuration Procedure Diagram24................................................................................................................................................................
Defining A Traffic Class25................................................................................................................................................................
Configuration Guidelines25................................................................................................................................................................
Defining A Traffic Behavior26................................................................................................................................................................
Defining A Qos Policy27................................................................................................................................................................
Applying The Qos Policy27................................................................................................................................................................
Applying The Qos Policy To An Interface28................................................................................................................................................................
Applying The Qos Policy To A Vlan28................................................................................................................................................................
Applying The Qos Policy Globally29................................................................................................................................................................
Applying The Qos Policy To A Control Plane29................................................................................................................................................................
Applying The Qos Policy To A User Profile30................................................................................................................................................................
Displaying And Maintaining Qos Policies30................................................................................................................................................................
Configuring Priority Mapping32................................................................................................................................................................
Introduction To Priorities32................................................................................................................................................................
Priority Maps32................................................................................................................................................................
Priority Trust Mode On A Port33................................................................................................................................................................
Priority Mapping Process34................................................................................................................................................................
Priority Mapping Configuration Tasks35................................................................................................................................................................
Configuring A Priority Map36................................................................................................................................................................
Configuring An Interface To Trust Packet Priority For Priority Mapping36................................................................................................................................................................
Changing The Port Priority Of An Interface37................................................................................................................................................................
Displaying And Maintaining Priority Mapping37................................................................................................................................................................
Priority Trust Mode Configuration Example37................................................................................................................................................................
Priority Mapping Table And Priority Marking Configuration Example38................................................................................................................................................................
Configuring Traffic Policing, Gts, And Rate Limit42................................................................................................................................................................
Traffic Evaluation And Token Buckets42................................................................................................................................................................
Traffic Policing43................................................................................................................................................................
Gts44................................................................................................................................................................
Rate Limit45................................................................................................................................................................
Configuring Traffic Policing46................................................................................................................................................................
Configuring Gts47................................................................................................................................................................
Configuring The Rate Limit48................................................................................................................................................................
Displaying And Maintaining Traffic Policing, Gts, And Rate Limit48................................................................................................................................................................
Traffic Policing Configuration Example48................................................................................................................................................................
Configuration Procedures49................................................................................................................................................................
Configuring Congestion Management52................................................................................................................................................................
Sp Queuing52................................................................................................................................................................
Wrr Queuing53................................................................................................................................................................
Wfq Queuing55................................................................................................................................................................
Sp+wrr Queuing55................................................................................................................................................................
Sp+wfq Queuing55................................................................................................................................................................
Congestion Management Configuration Task List56................................................................................................................................................................
Configuring Queuing56................................................................................................................................................................
Configuring Sp Queuing56................................................................................................................................................................
Configuring Wrr Queuing56................................................................................................................................................................
Configuring Wfq Queuing57................................................................................................................................................................
Configuring Sp+wrr Queuing58................................................................................................................................................................
Configuring Sp+wfq Queuing59................................................................................................................................................................
Displaying And Maintaining Queuing61................................................................................................................................................................
Configuring Queue Scheduling Profiles61................................................................................................................................................................
Configuring A Queue Scheduling Profile62................................................................................................................................................................
Displaying And Maintaining Queue Scheduling Profiles62................................................................................................................................................................
Queue Scheduling Profile Configuration Example63................................................................................................................................................................
Setting The Queue Aging Time63................................................................................................................................................................
Configuring Congestion Avoidance64................................................................................................................................................................
Tail Drop64................................................................................................................................................................
Red And Wred64................................................................................................................................................................
Ecn65................................................................................................................................................................
Configuring And Applying A Wred Table65................................................................................................................................................................
Configuration Example66................................................................................................................................................................
Displaying And Maintaining Wred67................................................................................................................................................................
Configuring Traffic Filtering68................................................................................................................................................................
Configuring Priority Marking70................................................................................................................................................................
Color-based Priority Marking70................................................................................................................................................................
Packet Coloring Methods70................................................................................................................................................................
Configuring Color-based Priority Marking71................................................................................................................................................................
Priority Marking Configuration Examples72................................................................................................................................................................
Local Precedence Marking Configuration Example72................................................................................................................................................................
Local Qos Id Marking Configuration Example74................................................................................................................................................................
Configuration Considerations75................................................................................................................................................................
Configuring Nesting78................................................................................................................................................................
Configuring Traffic Redirecting81................................................................................................................................................................
Configuring Aggregate Car85................................................................................................................................................................
Displaying And Maintaining Aggregate Car85................................................................................................................................................................
Aggregate Car Configuration Example85................................................................................................................................................................
Configuring Class-based Accounting88................................................................................................................................................................
Appendixes91................................................................................................................................................................
Appendix A Default Priority Maps91................................................................................................................................................................
Appendix B Introduction To Packet Precedences92................................................................................................................................................................
Ip Precedence And Dscp Values92................................................................................................................................................................
802.1p Priority93................................................................................................................................................................
Configuring Time Ranges95................................................................................................................................................................
Displaying And Maintaining Time Ranges95................................................................................................................................................................
Time Range Configuration Example95................................................................................................................................................................
Configuring Data Buffers97................................................................................................................................................................
Enabling The Burst Function98................................................................................................................................................................
Configuring Data Buffers Manually98................................................................................................................................................................
Configuring The Total Shared-area Ratio99................................................................................................................................................................
Setting The Maximum Shared-area Ratio For A Queue99................................................................................................................................................................
Setting The Fixed-area Ratio For A Queue100................................................................................................................................................................
Applying Data Buffer Configuration100................................................................................................................................................................
Displaying And Maintaining Data Buffers100................................................................................................................................................................
Configuring Qcn101................................................................................................................................................................
Basic Concepts101................................................................................................................................................................
Qcn Message Format101................................................................................................................................................................
Data Flow Format101................................................................................................................................................................
Cnm Format102................................................................................................................................................................
How Qcn Works103................................................................................................................................................................
Qcn Algorithm104................................................................................................................................................................
Cp Algorithm104................................................................................................................................................................
Rp Algorithm104................................................................................................................................................................
Cnd105................................................................................................................................................................
Cnd Defense Mode105................................................................................................................................................................
Priority Mapping105................................................................................................................................................................
Protocols And Standards105................................................................................................................................................................
Qcn Configuration Task List106................................................................................................................................................................
Enabling Qcn Globally106................................................................................................................................................................
Configuration Prerequisites106................................................................................................................................................................
Configuring Cnd Settings106................................................................................................................................................................
Configuring Global Cnd Settings107................................................................................................................................................................
Configuring Cnd Settings For An Interface107................................................................................................................................................................
Configuring Congestion Detection Parameters108................................................................................................................................................................
Displaying And Maintaining Qcn108................................................................................................................................................................
Qcn Configuration Examples108................................................................................................................................................................
Basic Qcn Configuration Example108................................................................................................................................................................
Multicnd Qcn Configuration Example111................................................................................................................................................................
Support And Other Resources117................................................................................................................................................................
Contacting Hp117................................................................................................................................................................
Subscription Service117................................................................................................................................................................
Related Information117................................................................................................................................................................
Documents117................................................................................................................................................................
Websites117................................................................................................................................................................
Conventions118................................................................................................................................................................
Command Conventions118................................................................................................................................................................
Index120................................................................................................................................................................

Advertisement

HP FlexFabric 5700 series Configuration Manual

HP FlexFabric 5700 series Configuration Manual (125 pages)

IP Multicast  
Brand: HP | Category: Switch | Size: 1.58 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Multicast Overview6................................................................................................................................................................
Introduction To Multicast6................................................................................................................................................................
Information Transmission Techniques6................................................................................................................................................................
Multicast Features8................................................................................................................................................................
Common Notations In Multicast9................................................................................................................................................................
Multicast Benefits And Applications9................................................................................................................................................................
Multicast Models10................................................................................................................................................................
Multicast Architecture10................................................................................................................................................................
Multicast Addresses11................................................................................................................................................................
Multicast Protocols14................................................................................................................................................................
Multicast Packet Forwarding Mechanism16................................................................................................................................................................
Multicast Support For Vpns17................................................................................................................................................................
Introduction To Vpn Instances17................................................................................................................................................................
Multicast Application In Vpns17................................................................................................................................................................
Configuring Igmp Snooping19................................................................................................................................................................
Overview19................................................................................................................................................................
Basic Igmp Snooping Concepts19................................................................................................................................................................
How Igmp Snooping Works21................................................................................................................................................................
Protocols And Standards22................................................................................................................................................................
Igmp Snooping Configuration Task List22................................................................................................................................................................
Configuring Basic Igmp Snooping Features23................................................................................................................................................................
Enabling Igmp Snooping23................................................................................................................................................................
Specifying An Igmp Snooping Version24................................................................................................................................................................
Setting The Maximum Number Of Igmp Snooping Forwarding Entries25................................................................................................................................................................
Configuring Igmp Snooping Port Features25................................................................................................................................................................
Setting Aging Timers For Dynamic Ports25................................................................................................................................................................
Configuring Static Ports26................................................................................................................................................................
Configuring A Port As A Simulated Member Host27................................................................................................................................................................
Enabling Fast-leave Processing27................................................................................................................................................................
Disabling A Port From Becoming A Dynamic Router Port28................................................................................................................................................................
Configuring The Igmp Snooping Querier28................................................................................................................................................................
Configuration Prerequisites28................................................................................................................................................................
Enabling The Igmp Snooping Querier29................................................................................................................................................................
Configuring Parameters For Igmp Queries And Responses29................................................................................................................................................................
Configuring Parameters For Igmp Messages30................................................................................................................................................................
Configuring Source Ip Addresses For Igmp Messages31................................................................................................................................................................
Setting The 802.1p Priority For Igmp Messages31................................................................................................................................................................
Configuring Igmp Snooping Policies32................................................................................................................................................................
Configuring A Multicast Group Policy32................................................................................................................................................................
Configuring Multicast Source Port Filtering33................................................................................................................................................................
Enabling Dropping Unknown Multicast Data33................................................................................................................................................................
Enabling Igmp Report Suppression34................................................................................................................................................................
Setting The Maximum Number Of Multicast Groups On A Port34................................................................................................................................................................
Enabling The Multicast Group Replacement Feature34................................................................................................................................................................
Displaying And Maintaining Igmp Snooping35................................................................................................................................................................
Igmp Snooping Configuration Examples36................................................................................................................................................................
Group Policy Configuration Example36................................................................................................................................................................
Static Port Configuration Example38................................................................................................................................................................
Igmp Snooping Querier Configuration Example41................................................................................................................................................................
Troubleshooting Igmp Snooping44................................................................................................................................................................
Layer 2 Multicast Forwarding Cannot Function44................................................................................................................................................................
Multicast Group Policy Does Not Work44................................................................................................................................................................
Configuring Pim Snooping46................................................................................................................................................................
Displaying And Maintaining Pim Snooping48................................................................................................................................................................
Pim Snooping Configuration Example48................................................................................................................................................................
Troubleshooting Pim Snooping52................................................................................................................................................................
Pim Snooping Does Not Work On A Layer 2 Device52................................................................................................................................................................
Configuring Multicast Vlans53................................................................................................................................................................
Multicast Vlan Configuration Task List55................................................................................................................................................................
Configuring A Sub-vlan-based Multicast Vlan55................................................................................................................................................................
Configuration Guidelines55................................................................................................................................................................
Configuration Procedure55................................................................................................................................................................
Configuring A Port-based Multicast Vlan56................................................................................................................................................................
Configuring User Port Attributes56................................................................................................................................................................
Assigning User Ports To A Multicast Vlan57................................................................................................................................................................
Setting The Maximum Number Of Multicast Vlan Forwarding Entries57................................................................................................................................................................
Displaying And Maintaining Multicast Vlans58................................................................................................................................................................
Multicast Vlan Configuration Examples58................................................................................................................................................................
Sub-vlan-based Multicast Vlan Configuration Example58................................................................................................................................................................
Port-based Multicast Vlan Configuration Example61................................................................................................................................................................
Configuring Mld Snooping65................................................................................................................................................................
Basic Mld Snooping Concepts65................................................................................................................................................................
How Mld Snooping Works67................................................................................................................................................................
Mld Snooping Configuration Task List68................................................................................................................................................................
Configuring Basic Mld Snooping Features69................................................................................................................................................................
Enabling Mld Snooping69................................................................................................................................................................
Specifying An Mld Snooping Version70................................................................................................................................................................
Setting The Maximum Number Of Mld Snooping Forwarding Entries71................................................................................................................................................................
Configuring Mld Snooping Port Features71................................................................................................................................................................
Configuring The Mld Snooping Querier74................................................................................................................................................................
Enabling The Mld Snooping Querier75................................................................................................................................................................
Configuring Parameters For Mld Queries And Responses75................................................................................................................................................................
Configuring Parameters For Mld Messages76................................................................................................................................................................
Configuring Source Ipv6 Addresses For Mld Messages76................................................................................................................................................................
Setting The 802.1p Priority For Mld Messages77................................................................................................................................................................
Configuring Mld Snooping Policies78................................................................................................................................................................
Configuring An Ipv6 Multicast Group Policy78................................................................................................................................................................
Configuring Ipv6 Multicast Source Port Filtering79................................................................................................................................................................
Enabling Dropping Unknown Ipv6 Multicast Data79................................................................................................................................................................
Enabling Mld Report Suppression80................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Multicast Groups On A Port80................................................................................................................................................................
Enabling The Ipv6 Multicast Group Replacement Feature81................................................................................................................................................................
Displaying And Maintaining Mld Snooping81................................................................................................................................................................
Mld Snooping Configuration Examples82................................................................................................................................................................
Ipv6 Group Policy Configuration Example82................................................................................................................................................................
Mld Snooping Querier Configuration Example87................................................................................................................................................................
Troubleshooting Mld Snooping90................................................................................................................................................................
Ipv6 Multicast Group Policy Does Not Work90................................................................................................................................................................
Configuring Ipv6 Pim Snooping91................................................................................................................................................................
Displaying And Maintaining Ipv6 Pim Snooping93................................................................................................................................................................
Ipv6 Pim Snooping Configuration Example93................................................................................................................................................................
Troubleshooting Ipv6 Pim Snooping97................................................................................................................................................................
Ipv6 Pim Snooping Does Not Work On A Layer 2 Device97................................................................................................................................................................
Configuring Ipv6 Multicast Vlans98................................................................................................................................................................
Ipv6 Multicast Vlan Configuration Task List100................................................................................................................................................................
Configuring A Sub-vlan-based Ipv6 Multicast Vlan100................................................................................................................................................................
Configuring A Port-based Ipv6 Multicast Vlan101................................................................................................................................................................
Assigning User Ports To An Ipv6 Multicast Vlan102................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Multicast Vlan Forwarding Entries102................................................................................................................................................................
Displaying And Maintaining Ipv6 Multicast Vlans103................................................................................................................................................................
Ipv6 Multicast Vlan Configuration Examples103................................................................................................................................................................
Sub-vlan-based Ipv6 Multicast Vlan Configuration Example103................................................................................................................................................................
Port-based Ipv6 Multicast Vlan Configuration Example106................................................................................................................................................................
Support And Other Resources110................................................................................................................................................................
Contacting Hp110................................................................................................................................................................
Subscription Service110................................................................................................................................................................
Related Information110................................................................................................................................................................
Documents110................................................................................................................................................................
Websites110................................................................................................................................................................
Conventions111................................................................................................................................................................
Index113................................................................................................................................................................
HP FlexFabric 5700 series Configuration Manual

HP FlexFabric 5700 series Configuration Manual (63 pages)

Brand: HP | Category: Switch | Size: 0.9 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Setting Up An Irf Fabric5................................................................................................................................................................
Overview5................................................................................................................................................................
Network Topology6................................................................................................................................................................
Basic Concepts6................................................................................................................................................................
Irf Member Roles6................................................................................................................................................................
Irf Member Id6................................................................................................................................................................
Irf Port6................................................................................................................................................................
Irf Physical Interface6................................................................................................................................................................
Mad7................................................................................................................................................................
Irf Domain Id7................................................................................................................................................................
Irf Split7................................................................................................................................................................
Irf Merge8................................................................................................................................................................
Member Priority8................................................................................................................................................................
Interface Naming Conventions8................................................................................................................................................................
File System Naming Conventions9................................................................................................................................................................
Configuration Synchronization10................................................................................................................................................................
Master Election10................................................................................................................................................................
Multi-active Handling Procedure11................................................................................................................................................................
Detection11................................................................................................................................................................
Collision Handling11................................................................................................................................................................
Failure Recovery11................................................................................................................................................................
Mad Mechanisms12................................................................................................................................................................
Lacp Mad12................................................................................................................................................................
Arp Mad13................................................................................................................................................................
Nd Mad14................................................................................................................................................................
Hardware Compatibility15................................................................................................................................................................
General Restrictions And Configuration Guidelines15................................................................................................................................................................
Software Requirements16................................................................................................................................................................
Irf Physical Interface Requirements16................................................................................................................................................................
Connecting Irf Ports17................................................................................................................................................................
Feature Compatibility And Configuration Restrictions17................................................................................................................................................................
Configuration Backup18................................................................................................................................................................
Setup And Configuration Task List18................................................................................................................................................................
Planning The Irf Fabric Setup19................................................................................................................................................................
Assigning A Member Id To Each Irf Member Device19................................................................................................................................................................
Specifying A Priority For Each Member Device20................................................................................................................................................................
Connecting Irf Physical Interfaces20................................................................................................................................................................
Binding Physical Interfaces To Irf Ports21................................................................................................................................................................
Accessing The Irf Fabric23................................................................................................................................................................
Configuring A Member Device Description23................................................................................................................................................................
Configuring Irf Link Load Sharing Mode23................................................................................................................................................................
Configuration Restrictions And Guidelines23................................................................................................................................................................
Configuring The Global Load Sharing Mode24................................................................................................................................................................
Configuring A Port-specific Load Sharing Mode24................................................................................................................................................................
Configuring Irf Bridge Mac Persistence24................................................................................................................................................................
Enabling Software Auto-update For Software Image Synchronization26................................................................................................................................................................
Configuration Prerequisites26................................................................................................................................................................
Configuration Procedure26................................................................................................................................................................
Setting The Irf Link Down Report Delay27................................................................................................................................................................
Configuring Mad27................................................................................................................................................................
Configuring Lacp Mad28................................................................................................................................................................
Configuring Arp Mad28................................................................................................................................................................
Configuring Nd Mad30................................................................................................................................................................
Excluding A Port From The Shutdown Action Upon Detection Of Multi-active Collision31................................................................................................................................................................
Recovering An Irf Fabric31................................................................................................................................................................
Displaying And Maintaining An Irf Fabric33................................................................................................................................................................
Configuration Examples33................................................................................................................................................................
Lacp Mad-enabled Irf Configuration Example33................................................................................................................................................................
Arp Mad-enabled Irf Configuration Example38................................................................................................................................................................
Nd Mad-enabled Irf Configuration Example42................................................................................................................................................................
Setting Up An Eirf System48................................................................................................................................................................
Eirf Operating Mechanisms51................................................................................................................................................................
Pex Physical Interface Requirements53................................................................................................................................................................
Pex Cabling Requirements53................................................................................................................................................................
Configuring The Operating Mode Of The Device53................................................................................................................................................................
Configuring The Device As A Pex54................................................................................................................................................................
Configuring The Device As An Independent Switch54................................................................................................................................................................
Support And Other Resources55................................................................................................................................................................
Contacting Hp55................................................................................................................................................................
Subscription Service55................................................................................................................................................................
Related Information55................................................................................................................................................................
Documents55................................................................................................................................................................
Websites55................................................................................................................................................................
Conventions56................................................................................................................................................................
Index58................................................................................................................................................................

Share and save

Advertisement