HP FlexNetwork NJ5000 Manuals

Manuals and User Guides for HP FlexNetwork NJ5000. We have 2 HP FlexNetwork NJ5000 manuals available for free PDF download: User Manual, Quick Start Manual

HP FlexNetwork NJ5000 User Manual

HP FlexNetwork NJ5000 User Manual (475 pages)

5G PoE+ Walljack  
Brand: HP | Category: Switch | Size: 9.47 MB
Table of contents
User Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Overview13................................................................................................................................................................
Logging In To The Web Interface For The First Time16................................................................................................................................................................
Logging Out Of The Web Interface17................................................................................................................................................................
Using The Web Interface18................................................................................................................................................................
Page Display Function19................................................................................................................................................................
Sort Function21................................................................................................................................................................
Feature Summary22................................................................................................................................................................
Device Menu23................................................................................................................................................................
Network Menu25................................................................................................................................................................
Authentication Menu28................................................................................................................................................................
Security Menu29................................................................................................................................................................
Poe Menu31................................................................................................................................................................
Manage-mode32................................................................................................................................................................
Poe Legacy Enable33................................................................................................................................................................
Configuration Wizard35................................................................................................................................................................
Configuring Management Ip Address36................................................................................................................................................................
Finishing Configuration Wizard38................................................................................................................................................................
Displaying System And Device Information40................................................................................................................................................................
Displaying The System Resource State41................................................................................................................................................................
Configuring Basic Device Settings43................................................................................................................................................................
Maintaining Devices44................................................................................................................................................................
Device Reboot45................................................................................................................................................................
Diagnostic Information46................................................................................................................................................................
Configuring System Time47................................................................................................................................................................
Configuring System Time By Using Ntp48................................................................................................................................................................
Configuring The Time Zone And Daylight Saving Time49................................................................................................................................................................
System Time Configuration Example50................................................................................................................................................................
Verifying The Configuration51................................................................................................................................................................
Configuring Syslog52................................................................................................................................................................
Setting The Log Host53................................................................................................................................................................
Setting Buffer Capacity And Refresh Interval54................................................................................................................................................................
Managing The Configuration55................................................................................................................................................................
Saving The Configuration56................................................................................................................................................................
Resetting The Configuration57................................................................................................................................................................
Managing Files58................................................................................................................................................................
Uploading A File59................................................................................................................................................................
Managing Ports60................................................................................................................................................................
Displaying Port Operation Parameters63................................................................................................................................................................
Port Management Configuration Example64................................................................................................................................................................
Configuring The Switch65................................................................................................................................................................
Configuring Port Mirroring68................................................................................................................................................................
Configuration Restrictions And Guidelines69................................................................................................................................................................
Configuring A Mirroring Group70................................................................................................................................................................
Local Port Mirroring Configuration Example71................................................................................................................................................................
Configuration Procedure72................................................................................................................................................................
Managing Users74................................................................................................................................................................
Setting The Super Password75................................................................................................................................................................
Switching To The Management Level76................................................................................................................................................................
Configuring A Loopback Test77................................................................................................................................................................
Configuring Vct79................................................................................................................................................................
Configuring The Flow Interval80................................................................................................................................................................
Configuring Rmon81................................................................................................................................................................
Rmon Configuration Task List82................................................................................................................................................................
Configuring A Statistics Entry84................................................................................................................................................................
Configuring A History Entry85................................................................................................................................................................
Configuring An Event Entry86................................................................................................................................................................
Configuring An Alarm Entry87................................................................................................................................................................
Displaying Rmon Statistics89................................................................................................................................................................
Displaying Rmon History Sampling Information90................................................................................................................................................................
Displaying Rmon Event Logs92................................................................................................................................................................
Configuring Energy Saving96................................................................................................................................................................
Configuring Snmp97................................................................................................................................................................
Snmp Protocol Versions98................................................................................................................................................................
Enabling Snmp Agent99................................................................................................................................................................
Configuring An Snmp View101................................................................................................................................................................
Adding Rules To An Snmp View102................................................................................................................................................................
Configuring An Snmp Community103................................................................................................................................................................
Configuring An Snmp Group104................................................................................................................................................................
Configuring An Snmp User105................................................................................................................................................................
Configuring Snmp Trap Function107................................................................................................................................................................
Displaying Snmp Packet Statistics108................................................................................................................................................................
Snmpv1/v2c Configuration Example109................................................................................................................................................................
Snmpv3 Configuration Example112................................................................................................................................................................
Displaying Interface Statistics117................................................................................................................................................................
Configuring Vlans118................................................................................................................................................................
Vlan Types119................................................................................................................................................................
Restrictions And Guidelines121................................................................................................................................................................
Recommended Configuration Procedure For Assigning A Trunk Port To A Vlan122................................................................................................................................................................
Recommended Configuration Procedure For Assigning A Hybrid Port To A Vlan123................................................................................................................................................................
Creating Vlans124................................................................................................................................................................
Setting The Pvid For A Port125................................................................................................................................................................
Selecting Vlans126................................................................................................................................................................
Modifying A Vlan127................................................................................................................................................................
Modifying Ports128................................................................................................................................................................
Vlan Configuration Example129................................................................................................................................................................
Configuring Switch B133................................................................................................................................................................
Configuring Vlan Interfaces134................................................................................................................................................................
Modifying A Vlan Interface135................................................................................................................................................................
Deleting A Vlan Interface137................................................................................................................................................................
Configuration Guidelines138................................................................................................................................................................
Configuring A Voice Vlan139................................................................................................................................................................
Security Mode And Normal Mode Of Voice Vlans141................................................................................................................................................................
Recommended Voice Vlan Configuration Procedure142................................................................................................................................................................
Configuring Voice Vlan Globally143................................................................................................................................................................
Configuring Voice Vlan On Ports144................................................................................................................................................................
Voice Vlan Configuration Examples145................................................................................................................................................................
Configuring A Voice Vlan On A Port In Manual Voice Vlan Assignment Mode149................................................................................................................................................................
Configuring The Mac Address Table155................................................................................................................................................................
Displaying And Configuring Mac Address Entries156................................................................................................................................................................
Setting The Aging Time Of Mac Address Entries157................................................................................................................................................................
Configuring Mstp159................................................................................................................................................................
Basic Concepts In Stp160................................................................................................................................................................
Calculation Process Of The Stp Algorithm161................................................................................................................................................................
Introduction To Rstp166................................................................................................................................................................
How Mstp Works170................................................................................................................................................................
Protocols And Standards171................................................................................................................................................................
Configuring Mstp Globally172................................................................................................................................................................
Configuring Mstp On A Port175................................................................................................................................................................
Displaying Mstp Information Of A Port176................................................................................................................................................................
Mstp Configuration Example178................................................................................................................................................................
Configuring Lldp184................................................................................................................................................................
Lldp Operating Modes188................................................................................................................................................................
Recommended Lldp Configuration Procedure189................................................................................................................................................................
Setting Lldp Parameters On Ports190................................................................................................................................................................
Setting Lldp Parameters For Ports In Batch192................................................................................................................................................................
Configuring Lldp Globally193................................................................................................................................................................
Displaying Lldp Information For A Port195................................................................................................................................................................
Displaying Global Lldp Information199................................................................................................................................................................
Displaying Lldp Information Received From Lldp Neighbors200................................................................................................................................................................
Lldp Configuration Example201................................................................................................................................................................
Lldp Configuration Guidelines205................................................................................................................................................................
Configuring Arp206................................................................................................................................................................
Arp Table207................................................................................................................................................................
Gratuitous Arp208................................................................................................................................................................
Removing Arp Entries209................................................................................................................................................................
Static Arp Configuration Example210................................................................................................................................................................
Configuring Arp Attack Protection214................................................................................................................................................................
Configuring Igmp Snooping216................................................................................................................................................................
How Igmp Snooping Works218................................................................................................................................................................
Enabling Igmp Snooping Globally220................................................................................................................................................................
Configuring Igmp Snooping In A Vlan221................................................................................................................................................................
Configuring Igmp Snooping Port Functions222................................................................................................................................................................
Displaying Igmp Snooping Multicast Forwarding Entries223................................................................................................................................................................
Igmp Snooping Configuration Example224................................................................................................................................................................
Configuring Mld Snooping228................................................................................................................................................................
How Mld Snooping Works230................................................................................................................................................................
Enabling Mld Snooping Globally232................................................................................................................................................................
Configuring Mld Snooping In A Vlan233................................................................................................................................................................
Configuring Mld Snooping Port Functions234................................................................................................................................................................
Displaying Mld Snooping Multicast Forwarding Entries235................................................................................................................................................................
Mld Snooping Configuration Example236................................................................................................................................................................
Configuring Ipv4 Or Ipv6 Static Routes240................................................................................................................................................................
Displaying The Ipv4 Active Route Table241................................................................................................................................................................
Displaying The Ipv6 Active Route Table242................................................................................................................................................................
Dhcp Overview244................................................................................................................................................................
Ip Address Allocation Process245................................................................................................................................................................
Dhcp Message Format246................................................................................................................................................................
Common Dhcp Options247................................................................................................................................................................
Configuring Dhcp Snooping249................................................................................................................................................................
Dhcp Snooping Support For Option 82250................................................................................................................................................................
Recommended Configuration Procedure251................................................................................................................................................................
Configuring Dhcp Snooping Functions On An Interface252................................................................................................................................................................
Dhcp Snooping Configuration Example253................................................................................................................................................................
Managing Services256................................................................................................................................................................
Using Diagnostic Tools259................................................................................................................................................................
Ping Operation260................................................................................................................................................................
Configuring Ipv6 Ping261................................................................................................................................................................
Configuring Ipv6 Traceroute262................................................................................................................................................................
Configuring 802.1x264................................................................................................................................................................
Controlled/uncontrolled Port And Port Authorization Status265................................................................................................................................................................
Eap Over Radius266................................................................................................................................................................
Initiating 802.1x Authentication267................................................................................................................................................................
X Timers271................................................................................................................................................................
Configuration Prerequisites273................................................................................................................................................................
Configuring 802.1x On A Port275................................................................................................................................................................
Configuring An 802.1x Guest Vlan277................................................................................................................................................................
Configuring An Auth-fail Vlan278................................................................................................................................................................
X With Acl Assignment Configuration Example285................................................................................................................................................................
Configuring Aaa294................................................................................................................................................................
Domain-based User Management295................................................................................................................................................................
Configuring An Isp Domain296................................................................................................................................................................
Configuring Authorization Methods For The Isp Domain298................................................................................................................................................................
Configuring Accounting Methods For The Isp Domain299................................................................................................................................................................
Aaa Configuration Example300................................................................................................................................................................
Configuring Radius305................................................................................................................................................................
Basic Radius Message Exchange Process306................................................................................................................................................................
Extended Radius Attributes309................................................................................................................................................................
Configuring A Radius Scheme310................................................................................................................................................................
Configuring Common Parameters311................................................................................................................................................................
Adding Radius Servers314................................................................................................................................................................
Radius Configuration Example315................................................................................................................................................................
Configuring Hwtacacs321................................................................................................................................................................
Configuring Hwtacacs Servers For The Scheme322................................................................................................................................................................
Configuring Hwtacacs Communication Parameters For The Scheme323................................................................................................................................................................
Hwtacacs Configuration Example326................................................................................................................................................................
Configuring Users333................................................................................................................................................................
Configuring A User Group335................................................................................................................................................................
Managing Certificates337................................................................................................................................................................
How Pki Works338................................................................................................................................................................
Pki Applications339................................................................................................................................................................
Recommended Configuration Procedure For Automatic Request341................................................................................................................................................................
Creating A Pki Domain342................................................................................................................................................................
Generating An Rsa Key Pair345................................................................................................................................................................
Destroying The Rsa Key Pair346................................................................................................................................................................
Requesting A Local Certificate348................................................................................................................................................................
Retrieving And Displaying A Crl349................................................................................................................................................................
Pki Configuration Example350................................................................................................................................................................
Configuring Mac Authentication355................................................................................................................................................................
Using Mac Authentication With Other Features356................................................................................................................................................................
Configuring Mac Authentication On A Port358................................................................................................................................................................
Mac Authentication Configuration Examples359................................................................................................................................................................
Acl Assignment Configuration Example362................................................................................................................................................................
Configuring Port Security370................................................................................................................................................................
Configuring Global Settings For Port Security373................................................................................................................................................................
Configuring Basic Port Security Control374................................................................................................................................................................
Configuring Secure Mac Addresses375................................................................................................................................................................
Configuring Advanced Port Security Control376................................................................................................................................................................
Configuring Permitted Ouis378................................................................................................................................................................
Advanced Port Security Mode Configuration Example381................................................................................................................................................................
Configuring Port Isolation387................................................................................................................................................................
Port Isolation Configuration Example388................................................................................................................................................................
Configuring Authorized Ip390................................................................................................................................................................
Authorized Ip Configuration Example391................................................................................................................................................................
Configuring Loopback Detection393................................................................................................................................................................
Configuring Loopback Detection On A Port394................................................................................................................................................................
Configuring Acls395................................................................................................................................................................
Implementing Time-based Acl Rules396................................................................................................................................................................
Ipv4 Fragments Filtering With Acls397................................................................................................................................................................
Configuring A Time Range398................................................................................................................................................................
Adding An Ipv4 Acl399................................................................................................................................................................
Configuring A Rule For An Advanced Ipv4 Acl401................................................................................................................................................................
Configuring A Rule For An Ethernet Frame Header Acl403................................................................................................................................................................
Adding An Ipv6 Acl405................................................................................................................................................................
Configuring A Rule For A Basic Ipv6 Acl406................................................................................................................................................................
Configuring A Rule For An Advanced Ipv6 Acl407................................................................................................................................................................
Configuring Qos410................................................................................................................................................................
End-to-end Qos412................................................................................................................................................................
Packet Precedences413................................................................................................................................................................
Queue Scheduling415................................................................................................................................................................
Rate Limit417................................................................................................................................................................
Priority Mapping418................................................................................................................................................................
Introduction To Priority Mapping Tables419................................................................................................................................................................
Adding A Class421................................................................................................................................................................
Configuring Classification Rules422................................................................................................................................................................
Adding A Traffic Behavior424................................................................................................................................................................
Configuring Other Actions For A Traffic Behavior425................................................................................................................................................................
Adding A Policy427................................................................................................................................................................
Applying A Policy To A Port428................................................................................................................................................................
Configuring Queue Scheduling On A Port429................................................................................................................................................................
Configuring Gts On Ports430................................................................................................................................................................
Configuring Priority Mapping Tables431................................................................................................................................................................
Configuring Priority Trust Mode On A Port432................................................................................................................................................................
Acl And Qos Configuration Example434................................................................................................................................................................
Configuring Poe442................................................................................................................................................................
Configuring Non-standard Pd Detection444................................................................................................................................................................
Poe Configuration Example445................................................................................................................................................................
Document Conventions And Icons447................................................................................................................................................................
Network Topology Icons448................................................................................................................................................................
Support And Other Resources449................................................................................................................................................................
Websites450................................................................................................................................................................

Advertising

HPE FlexNetwork NJ5000 Quick Start Manual

HPE FlexNetwork NJ5000 Quick Start Manual (16 pages)

Brand: HPE | Category: Switch | Size: 0.63 MB
Table of contents
Quick Start Guide1................................................................................................................................................................
Package Contents2................................................................................................................................................................
Reset Button3................................................................................................................................................................
Installing The Switch5................................................................................................................................................................
Restrictions And Guidelines5................................................................................................................................................................
Powering The Switch10................................................................................................................................................................
Accessing The Switch For The First Time11................................................................................................................................................................
Setting Terminal Parameters14................................................................................................................................................................
Setting The Operation Mode15................................................................................................................................................................
Setting Up Configuration Environment16................................................................................................................................................................

Share and save

Advertising