HP HP ProCurve Series 6600 Manuals

Manuals and User Guides for HP HP ProCurve Series 6600. We have 9 HP HP ProCurve Series 6600 manuals available for free PDF download: Security Configuration Manual, Command Reference Manual, User Manual, Configuration Manual, Owner's Manual, Quickspecs

HP HP ProCurve Series 6600 Security Configuration Manual

HP HP ProCurve Series 6600 Security Configuration Manual (559 pages)

Brand: HP | Category: Network Router | Size: 8.59 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Security Overview15................................................................................................................................................................
Access Security16................................................................................................................................................................
Data Security17................................................................................................................................................................
Attack Detection And Protection18................................................................................................................................................................
Other Security Technologies19................................................................................................................................................................
Configuring Aaa21................................................................................................................................................................
Radius22................................................................................................................................................................
Hwtacacs27................................................................................................................................................................
Domain-based User Management29................................................................................................................................................................
Aaa For Mpls L3vpns30................................................................................................................................................................
Radius Attributes31................................................................................................................................................................
Aaa Configuration Considerations And Task List34................................................................................................................................................................
Configuring Aaa Schemes35................................................................................................................................................................
Configuring Radius Schemes40................................................................................................................................................................
Configuring Hwtacacs Schemes53................................................................................................................................................................
Creating An Isp Domain59................................................................................................................................................................
Configuring Isp Domain Attributes60................................................................................................................................................................
Configuring Authentication Methods For An Isp Domain61................................................................................................................................................................
Configuring Authorization Methods For An Isp Domain63................................................................................................................................................................
Configuring Accounting Methods For An Isp Domain65................................................................................................................................................................
Tearing Down User Connections67................................................................................................................................................................
Displaying And Maintaining Aaa68................................................................................................................................................................
Aaa Configuration Examples68................................................................................................................................................................
Local Authentication/authorization For Telnet/ftp Users72................................................................................................................................................................
Aaa For Ppp Users By An Hwtacacs Server73................................................................................................................................................................
Level Switching Authentication For Telnet Users By A Radius Server75................................................................................................................................................................
Aaa For Portal Users By A Radius Server79................................................................................................................................................................
Troubleshooting Aaa85................................................................................................................................................................
Troubleshooting Radius85................................................................................................................................................................
Troubleshooting Hwtacacs87................................................................................................................................................................
X Overview88................................................................................................................................................................
X-related Protocols89................................................................................................................................................................
Eap Over Radius91................................................................................................................................................................
X Authentication Procedures92................................................................................................................................................................
A Comparison Of Eap Relay And Eap Termination93................................................................................................................................................................
Eap Termination95................................................................................................................................................................
Configuring 802.1x97................................................................................................................................................................
Configuration Prerequisites101................................................................................................................................................................
Enabling 802.1x102................................................................................................................................................................
Enabling Eap Relay Or Eap Termination103................................................................................................................................................................
Specifying An Access Control Method104................................................................................................................................................................
Setting The Maximum Number Of Authentication Request Attempts105................................................................................................................................................................
Configuring The Online User Handshake Function106................................................................................................................................................................
Enabling The Proxy Detection Function107................................................................................................................................................................
Configuration Guidelines108................................................................................................................................................................
Configuring The Quiet Timer109................................................................................................................................................................
Configuring An 802.1x Guest Vlan110................................................................................................................................................................
Configuring An 802.1x Critical Vlan111................................................................................................................................................................
Specifying Supported Domain Name Delimiters112................................................................................................................................................................
Displaying And Maintaining 802.1x113................................................................................................................................................................
Verifying The Configuration115................................................................................................................................................................
Configuration Procedure116................................................................................................................................................................
X With Acl Assignment Configuration Example118................................................................................................................................................................
Configuring Ead Fast Deployment120................................................................................................................................................................
Displaying And Maintaining Ead Fast Deployment121................................................................................................................................................................
Ead Fast Deployment Configuration Example (1)122................................................................................................................................................................
Ead Fast Deployment Configuration Example (2)124................................................................................................................................................................
Troubleshooting Ead Fast Deployment126................................................................................................................................................................
Configuring Mac Authentication127................................................................................................................................................................
Authentication Methods127................................................................................................................................................................
Mac Authentication Timers128................................................................................................................................................................
Basic Configuration For Mac Authentication129................................................................................................................................................................
Configuring Mac Authentication On A Port130................................................................................................................................................................
Displaying And Maintaining Mac Authentication131................................................................................................................................................................
Mac Authentication Configuration Examples131................................................................................................................................................................
Local Mac Authentication Configuration Example131................................................................................................................................................................
Radius-based Mac Authentication Configuration Example133................................................................................................................................................................
Acl Assignment Configuration Example135................................................................................................................................................................
Portal System Components137................................................................................................................................................................
Portal Authentication Modes139................................................................................................................................................................
Portal Support For Eap140................................................................................................................................................................
Portal Stateful Failover144................................................................................................................................................................
Portal Authentication Across Vpns145................................................................................................................................................................
Portal Configuration Task List146................................................................................................................................................................
Specifying A Portal Server For Layer 3 Portal Authentication147................................................................................................................................................................
Controlling Access Of Portal Users148................................................................................................................................................................
Configuring An Authentication Source Subnet149................................................................................................................................................................
Configuring An Authentication Destination Subnet150................................................................................................................................................................
Specifying An Authentication Domain For Portal Users151................................................................................................................................................................
Specifying Nas-port-type For An Interface152................................................................................................................................................................
Specifying A Nas Id Profile For An Interface153................................................................................................................................................................
Specifying A Source Ip Address For Outgoing Portal Packets154................................................................................................................................................................
Specifying An Autoredirection Url For Authenticated Portal Users156................................................................................................................................................................
Configuring The Portal Server Detection Function157................................................................................................................................................................
Configuring Portal User Information Synchronization159................................................................................................................................................................
Displaying And Maintaining Portal160................................................................................................................................................................
Portal Configuration Examples161................................................................................................................................................................
Configuring Re-dhcp Portal Authentication165................................................................................................................................................................
Configuring Cross-subnet Portal Authentication167................................................................................................................................................................
Configuring Direct Portal Authentication With Extended Functions169................................................................................................................................................................
Configuring Re-dhcp Portal Authentication With Extended Functions171................................................................................................................................................................
Configuring Cross-subnet Portal Authentication With Extended Functions174................................................................................................................................................................
Configuring Portal Stateful Failover(6600/hsr6600)176................................................................................................................................................................
Configuring Portal Server Detection And Portal User Information Synchronization183................................................................................................................................................................
Cross-subnet Portal Authentication Across Vans188................................................................................................................................................................
Troubleshooting Portal190................................................................................................................................................................
Inconsistent Keys On The Access Device And The Portal Server190................................................................................................................................................................
Incorrect Server Port Number On The Access Device191................................................................................................................................................................
Configuring Port Security192................................................................................................................................................................
Port Security Modes193................................................................................................................................................................
Working With Guest Vlan And Auth-fail Vlan195................................................................................................................................................................
Enabling Port Security196................................................................................................................................................................
Setting The Port Security Mode197................................................................................................................................................................
Configuring Port Security Features198................................................................................................................................................................
Configuring Ntk198................................................................................................................................................................
Configuring Intrusion Protection198................................................................................................................................................................
Configuring Secure Mac Addresses199................................................................................................................................................................
Ignoring Authorization Information From The Server201................................................................................................................................................................
Displaying And Maintaining Port Security202................................................................................................................................................................
Port Security Configuration Examples202................................................................................................................................................................
Configuring The Userloginwithoui Mode204................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode209................................................................................................................................................................
Troubleshooting Port Security212................................................................................................................................................................
Cannot Set The Port Security Mode212................................................................................................................................................................
Cannot Configure Secure Mac Addresses212................................................................................................................................................................
Cannot Change Port Security Mode When A User Is Online213................................................................................................................................................................
Configuring A User Profile214................................................................................................................................................................
Creating A User Profile214................................................................................................................................................................
Performing Configurations In User Profile View215................................................................................................................................................................
Configuring Password Control216................................................................................................................................................................
Fips Compliance218................................................................................................................................................................
Enabling Password Control219................................................................................................................................................................
Setting Global Password Control Parameters220................................................................................................................................................................
Setting User Group Password Control Parameters221................................................................................................................................................................
Setting Local User Password Control Parameters222................................................................................................................................................................
Setting A Local User Password In Interactive Mode223................................................................................................................................................................
Password Control Configuration Example224................................................................................................................................................................
Configuring Rsh227................................................................................................................................................................
Rsh Configuration Example227................................................................................................................................................................
Managing Public Keys230................................................................................................................................................................
Creating A Local Asymmetric Key Pair231................................................................................................................................................................
Displaying Or Exporting The Local Host Public Key232................................................................................................................................................................
Exporting The Host Public Key In A Specific Format To A File233................................................................................................................................................................
Displaying Public Keys234................................................................................................................................................................
Public Key Configuration Examples235................................................................................................................................................................
Importing A Public Key From A Public Key File237................................................................................................................................................................
Configuring Pki240................................................................................................................................................................
Pki Architecture241................................................................................................................................................................
Pki Configuration Task List242................................................................................................................................................................
Configuring A Pki Entity243................................................................................................................................................................
Configuring A Pki Domain244................................................................................................................................................................
Requesting A Certificate246................................................................................................................................................................
Obtaining Certificates247................................................................................................................................................................
Verifying Pki Certificates248................................................................................................................................................................
Removing A Certificate249................................................................................................................................................................
Configuring An Access Control Policy250................................................................................................................................................................
Displaying And Maintaining Pki250................................................................................................................................................................
Pki Configuration Examples251................................................................................................................................................................
Certificate Request From A Windows 2003 Ca Server254................................................................................................................................................................
Ike Negotiation With Rsa Digital Signature257................................................................................................................................................................
Certificate Access Control Policy Configuration259................................................................................................................................................................
Troubleshooting Pki261................................................................................................................................................................
Failed To Request A Local Certificate261................................................................................................................................................................
Failed To Obtain Crls262................................................................................................................................................................
Configuring Ipsec263................................................................................................................................................................
Basic Concepts263................................................................................................................................................................
Ipsec Tunnel Interface266................................................................................................................................................................
Ipsec For Ipv6 Routing Protocols267................................................................................................................................................................
Protocols And Standards268................................................................................................................................................................
Configuring An Acl269................................................................................................................................................................
Configuring An Ipsec Transform Set272................................................................................................................................................................
Configuring An Ipsec Policy273................................................................................................................................................................
Applying An Ipsec Policy Group To An Interface279................................................................................................................................................................
Enabling The Encryption Engine279................................................................................................................................................................
Enabling Acl Checking Of De-encapsulated Ipsec Packets280................................................................................................................................................................
Configuring Packet Information Pre-extraction281................................................................................................................................................................
Configuring Ipsec Rri282................................................................................................................................................................
Enabling Ipsec Packet Fragmentation Before/after Encryption283................................................................................................................................................................
Configuring An Ipsec Profile284................................................................................................................................................................
Configuring An Ipsec Tunnel Interface286................................................................................................................................................................
Enabling Packet Information Pre-extraction On The Ipsec Tunnel Interface288................................................................................................................................................................
Displaying And Maintaining Ipsec289................................................................................................................................................................
Ipsec Configuration Examples290................................................................................................................................................................
Configuring An Ike-based Ipsec Tunnel For Ipv4 Packets292................................................................................................................................................................
Configuring Ike-based Ipsec Tunnel For Ipv6 Packets294................................................................................................................................................................
Configuring Ipsec With Ipsec Tunnel Interfaces296................................................................................................................................................................
Configuring Ipsec For Ripng300................................................................................................................................................................
Configuring Ike308................................................................................................................................................................
Ike Functions309................................................................................................................................................................
Relationship Between Ike And Ipsec310................................................................................................................................................................
Ike Configuration Task List310................................................................................................................................................................
Configuring A Name For The Local Security Gateway311................................................................................................................................................................
Configuring An Ike Proposal311................................................................................................................................................................
Configuring An Ike Peer312................................................................................................................................................................
Setting The Nat Keepalive Timer315................................................................................................................................................................
Disabling Next Payload Field Checking316................................................................................................................................................................
Displaying And Maintaining Ike316................................................................................................................................................................
Ike Configuration Examples317................................................................................................................................................................
Configuring Aggressive Mode Ike With Nat Traversal321................................................................................................................................................................
Troubleshooting Ike324................................................................................................................................................................
Proposal Mismatch325................................................................................................................................................................
Acl Configuration Error326................................................................................................................................................................
Configuring Ssh327................................................................................................................................................................
How Ssh Works327................................................................................................................................................................
Ssh Authentication328................................................................................................................................................................
Configuring The Device As An Ssh Server329................................................................................................................................................................
Ssh Server Configuration Task List330................................................................................................................................................................
Configuring The User Interfaces For Ssh Clients331................................................................................................................................................................
Configuring A Client's Host Public Key332................................................................................................................................................................
Configuring An Ssh User333................................................................................................................................................................
Setting The Ssh Management Parameters334................................................................................................................................................................
Configuring The Device As An Stelnet Client335................................................................................................................................................................
Specifying A Source Ip Address Or Source Interface For The Stelnet Client336................................................................................................................................................................
Establishing A Connection To An Stelnet Server337................................................................................................................................................................
Configuring The Device As An Sftp Client338................................................................................................................................................................
Establishing A Connection To An Sftp Server339................................................................................................................................................................
Working With Sftp Files340................................................................................................................................................................
Displaying Help Information341................................................................................................................................................................
Scp Client Configuration Task List342................................................................................................................................................................
Displaying And Maintaining Ssh343................................................................................................................................................................
Publickey Authentication Enabled Stelnet Server Configuration Example345................................................................................................................................................................
Password Authentication Enabled Stelnet Client Configuration Example350................................................................................................................................................................
Publickey Authentication Enabled Stelnet Client Configuration Example353................................................................................................................................................................
Sftp Configuration Examples355................................................................................................................................................................
Publickey Authentication Enabled Sftp Client Configuration Example357................................................................................................................................................................
Scp File Transfer With Password Authentication360................................................................................................................................................................
Network Requirements361................................................................................................................................................................
Configuring Ssl363................................................................................................................................................................
Configuring An Ssl Server Policy364................................................................................................................................................................
Configuring An Ssl Client Policy366................................................................................................................................................................
Displaying And Maintaining Ssl367................................................................................................................................................................
Troubleshooting Ssl367................................................................................................................................................................
Ssl Handshake Failure367................................................................................................................................................................
Configuring Ssl Vpn369................................................................................................................................................................
Advantages Of Ssl Vpn370................................................................................................................................................................
Ssl Vpn Configuration Example At The Cli371................................................................................................................................................................
Configuring Ssl Vpn In The Web Interface373................................................................................................................................................................
Configuring The Ssl Vpn Service385................................................................................................................................................................
Configuring Web Proxy Server Resources386................................................................................................................................................................
Configuring Tcp Application Resources389................................................................................................................................................................
Configuring Ip Network Resources395................................................................................................................................................................
Configuring Global Parameters396................................................................................................................................................................
Configuring A Resource Group401................................................................................................................................................................
Configuring Local Users402................................................................................................................................................................
Configuring A User Group405................................................................................................................................................................
Viewing User Information407................................................................................................................................................................
Performing Basic Configurations For The Ssl Vpn Domain408................................................................................................................................................................
Configuring Authentication Policies411................................................................................................................................................................
Configuring A Security Policy422................................................................................................................................................................
Customizing The Ssl Vpn User Interface425................................................................................................................................................................
User Access To Ssl Vpn429................................................................................................................................................................
Logging In To The Ssl Vpn Service Interface430................................................................................................................................................................
Accessing Ssl Vpn Resources431................................................................................................................................................................
Getting Help Information432................................................................................................................................................................
Changing The Login Password433................................................................................................................................................................
Configuring Firewall451................................................................................................................................................................
Configuring A Packet-filter Firewall454................................................................................................................................................................
Configuring Packet Filtering On An Interface455................................................................................................................................................................
Displaying And Maintaining A Packet-filter Firewall456................................................................................................................................................................
Configuring An Aspf458................................................................................................................................................................
Configuring An Aspf Policy458................................................................................................................................................................
Applying An Aspf Policy To An Interface459................................................................................................................................................................
Configuring Port Mapping459................................................................................................................................................................
Aspf Configuration Example460................................................................................................................................................................
Configuring Alg462................................................................................................................................................................
Enabling Alg464................................................................................................................................................................
Sip/h.323 Alg Configuration Example465................................................................................................................................................................
Managing Sessions467................................................................................................................................................................
Session Management Task List468................................................................................................................................................................
Configuring Session Aging Time Based On Application Layer Protocol Type469................................................................................................................................................................
Enabling Checksum Verification470................................................................................................................................................................
Specifying The Persistent Session Rule471................................................................................................................................................................
Configuring Session Logging472................................................................................................................................................................
Configuring Session Log Export473................................................................................................................................................................
Configuring Connection Limits475................................................................................................................................................................
Applying The Connection Limit Policy476................................................................................................................................................................
Troubleshooting Connection Limiting478................................................................................................................................................................
Configuring Web Filtering480................................................................................................................................................................
Url Parameter Filtering481................................................................................................................................................................
Activex Blocking482................................................................................................................................................................
Configuring Url Parameter Filtering483................................................................................................................................................................
Configuring Activex Blocking484................................................................................................................................................................
Url Address Filtering Configuration Example485................................................................................................................................................................
Url Parameter Filtering Configuration Example486................................................................................................................................................................
Java Blocking Configuration Example487................................................................................................................................................................
Troubleshooting Web Filtering488................................................................................................................................................................
Invalid Characters Are Present In The Configured Parameter489................................................................................................................................................................
Invalid Blocking Suffix490................................................................................................................................................................
Unable To Access The Http Server By Ip Address491................................................................................................................................................................
Configuring Attack Detection And Protection492................................................................................................................................................................
Blacklist Function494................................................................................................................................................................
Tcp Proxy495................................................................................................................................................................
Attack Detection And Protection Configuration Task List497................................................................................................................................................................
Configuring Attack Protection Functions For An Interface498................................................................................................................................................................
Applying An Attack Protection Policy To An Interface501................................................................................................................................................................
Configuring Tcp Proxy502................................................................................................................................................................
Enabling Traffic Statistics On An Interface503................................................................................................................................................................
Attack Detection And Protection Configuration Examples504................................................................................................................................................................
Blacklist Configuration Example506................................................................................................................................................................
Traffic Statistics Configuration Example507................................................................................................................................................................
Tcp Proxy Configuration Example509................................................................................................................................................................
Enabling The Syn Cookie Feature511................................................................................................................................................................
Enabling Protection Against Naptha Attacks512................................................................................................................................................................
Configuring Ip Source Guard513................................................................................................................................................................
Dynamic Ip Source Guard Entries514................................................................................................................................................................
Configuring A Static Ipv4 Source Guard Entry515................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Entries516................................................................................................................................................................
Static Ipv4 Source Guard Entry Configuration Example517................................................................................................................................................................
Dynamic Ipv4 Source Guard By Dhcp Snooping Configuration Example519................................................................................................................................................................
Dynamic Ipv4 Source Guard By Dhcp Relay Configuration Example520................................................................................................................................................................
Troubleshooting Ip Source Guard521................................................................................................................................................................
Configuring Arp Attack Protection522................................................................................................................................................................
Configuring Arp Source Suppression523................................................................................................................................................................
Displaying And Maintaining Arp Source Suppression524................................................................................................................................................................
Configuring Arp Packet Rate Limit525................................................................................................................................................................
Configuring Authorized Arp526................................................................................................................................................................
Configuration Example (on A Dhcp Server)527................................................................................................................................................................
Authorized Arp Configuration Example (on A Dhcp Relay Agent)528................................................................................................................................................................
Configuring Arp Detection529................................................................................................................................................................
Configuring User Validity Check530................................................................................................................................................................
Configuring Arp Packet Validity Check531................................................................................................................................................................
Displaying And Maintaining Arp Detection532................................................................................................................................................................
User Validity Check And Arp Packet Validity Check Configuration Example534................................................................................................................................................................
Arp Restricted Forwarding Configuration Example535................................................................................................................................................................
Configuring Arp Automatic Scanning And Fixed Arp537................................................................................................................................................................
Arp Gateway Protection Configuration Example539................................................................................................................................................................
Arp Filtering Configuration Example540................................................................................................................................................................
Configuring Nd Attack Defense541................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets542................................................................................................................................................................
Configuring Urpf543................................................................................................................................................................
Urpf Work Flow544................................................................................................................................................................
Network Application546................................................................................................................................................................
Urpf Configuration Example547................................................................................................................................................................
Configuring Fips548................................................................................................................................................................
Conditional Self-tests549................................................................................................................................................................
Enabling Fips Mode550................................................................................................................................................................
Support And Other Resources553................................................................................................................................................................
Subscription Service553................................................................................................................................................................
Related Information553................................................................................................................................................................
Command Conventions554................................................................................................................................................................
Index556................................................................................................................................................................

Advertising

HP HP ProCurve Series 6600 Command Reference Manual

HP HP ProCurve Series 6600 Command Reference Manual (542 pages)

Brand: HP | Category: Network Router | Size: 2.41 MB
Table of contents
Command Reference1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Aaa Configuration Commands14................................................................................................................................................................
Accounting Command15................................................................................................................................................................
Accounting Default16................................................................................................................................................................
Accounting Dvpn17................................................................................................................................................................
Accounting Lan-access18................................................................................................................................................................
Accounting Login19................................................................................................................................................................
Accounting Optional20................................................................................................................................................................
Accounting Ppp21................................................................................................................................................................
Accounting Ssl-vpn22................................................................................................................................................................
Authentication Default23................................................................................................................................................................
Authentication Dvpn24................................................................................................................................................................
Authentication Lan-access25................................................................................................................................................................
Authentication Login26................................................................................................................................................................
Authentication Portal27................................................................................................................................................................
Authentication Ppp28................................................................................................................................................................
Authentication Ssl-vpn29................................................................................................................................................................
Authorization Command30................................................................................................................................................................
Authorization Default31................................................................................................................................................................
Authorization Dvpn32................................................................................................................................................................
Authorization Lan-access33................................................................................................................................................................
Authorization Login34................................................................................................................................................................
Authorization Portal35................................................................................................................................................................
Authorization Ppp36................................................................................................................................................................
Authorization Ssl-vpn37................................................................................................................................................................
Authorization-attribute User-profile38................................................................................................................................................................
Cut Connection39................................................................................................................................................................
Display Connection40................................................................................................................................................................
Display Domain44................................................................................................................................................................
Domain46................................................................................................................................................................
Domain Default Enable47................................................................................................................................................................
Idle-cut Enable48................................................................................................................................................................
Nas Device-id50................................................................................................................................................................
Nas-id Bind Vlan51................................................................................................................................................................
Self-service-url Enable52................................................................................................................................................................
State (isp Domain View)53................................................................................................................................................................
Local User Configuration Commands54................................................................................................................................................................
Authorization-attribute55................................................................................................................................................................
Bind-attribute56................................................................................................................................................................
Display Local-user57................................................................................................................................................................
Display User-group61................................................................................................................................................................
Expiration-date62................................................................................................................................................................
Group63................................................................................................................................................................
Group-attribute Allow-guest64................................................................................................................................................................
Password65................................................................................................................................................................
Service-type67................................................................................................................................................................
State (local User View)68................................................................................................................................................................
Validity-date69................................................................................................................................................................
Radius Configuration Commands70................................................................................................................................................................
Attribute 25 Car71................................................................................................................................................................
Display Radius Scheme72................................................................................................................................................................
Display Radius Statistics75................................................................................................................................................................
Display Stop-accounting-buffer (for Radius)81................................................................................................................................................................
Key (radius Scheme View)83................................................................................................................................................................
Nas-backup-ip84................................................................................................................................................................
Nas-ip (radius Scheme View)85................................................................................................................................................................
Primary Accounting (radius Scheme View)86................................................................................................................................................................
Primary Authentication (radius Scheme View)87................................................................................................................................................................
Radius Client89................................................................................................................................................................
Radius Nas-backup-ip90................................................................................................................................................................
Radius Nas-ip91................................................................................................................................................................
Radius Scheme92................................................................................................................................................................
Radius Trap93................................................................................................................................................................
Reset Radius Statistics94................................................................................................................................................................
Retry95................................................................................................................................................................
Retry Realtime-accounting96................................................................................................................................................................
Retry Stop-accounting (radius Scheme View)97................................................................................................................................................................
Secondary Accounting (radius Scheme View)98................................................................................................................................................................
Secondary Authentication (radius Scheme View)100................................................................................................................................................................
Security-policy-server102................................................................................................................................................................
Server-type103................................................................................................................................................................
State Primary104................................................................................................................................................................
Stop-accounting-buffer Enable (radius Scheme View)105................................................................................................................................................................
Timer Quiet (radius Scheme View)106................................................................................................................................................................
Timer Realtime-accounting (radius Scheme View)107................................................................................................................................................................
Timer Response-timeout (radius Scheme View)108................................................................................................................................................................
User-name-format (radius Scheme View)109................................................................................................................................................................
Vpn-instance (radius Scheme View)110................................................................................................................................................................
Display Hwtacacs111................................................................................................................................................................
Hwtacacs Scheme114................................................................................................................................................................
Display Stop-accounting-buffer (for Hwtacacs)115................................................................................................................................................................
Hwtacacs Nas-ip116................................................................................................................................................................
Nas-ip (hwtacacs Scheme View)118................................................................................................................................................................
Primary Accounting (hwtacacs Scheme View)119................................................................................................................................................................
Primary Authentication (hwtacacs Scheme View)120................................................................................................................................................................
Primary Authorization121................................................................................................................................................................
Reset Hwtacacs Statistics122................................................................................................................................................................
Reset Stop-accounting-buffer (for Hwtacacs)123................................................................................................................................................................
Retry Stop-accounting (hwtacacs Scheme View)124................................................................................................................................................................
Secondary Accounting (hwtacacs Scheme View)125................................................................................................................................................................
Secondary Authentication (hwtacacs Scheme View)126................................................................................................................................................................
Secondary Authorization127................................................................................................................................................................
Stop-accounting-buffer Enable (hwtacacs Scheme View)128................................................................................................................................................................
Timer Realtime-accounting (hwtacacs Scheme View)129................................................................................................................................................................
Timer Response-timeout (hwtacacs Scheme View)130................................................................................................................................................................
User-name-format (hwtacacs Scheme View)131................................................................................................................................................................
X Commands133................................................................................................................................................................
Dot1x137................................................................................................................................................................
Dot1x Authentication-method138................................................................................................................................................................
Dot1x Auth-fail Vlan139................................................................................................................................................................
Dot1x Critical Vlan140................................................................................................................................................................
Dot1x Critical Recovery-action141................................................................................................................................................................
Dot1x Domain-delimiter142................................................................................................................................................................
Dot1x Guest-vlan143................................................................................................................................................................
Dot1x Handshake144................................................................................................................................................................
Dot1x Handshake Secure145................................................................................................................................................................
Dot1x Max-user146................................................................................................................................................................
Dot1x Multicast-trigger148................................................................................................................................................................
Dot1x Port-method149................................................................................................................................................................
Dot1x Quiet-period151................................................................................................................................................................
Dot1x Retry152................................................................................................................................................................
Dot1x Supp-proxy-check153................................................................................................................................................................
Dot1x Timer154................................................................................................................................................................
Dot1x Unicast-trigger155................................................................................................................................................................
Reset Dot1x Statistics156................................................................................................................................................................
Ead Fast Deployment Commands158................................................................................................................................................................
Dot1x Url159................................................................................................................................................................
Mac Authentication Configuration Commands161................................................................................................................................................................
Mac-authentication163................................................................................................................................................................
Mac-authentication Domain164................................................................................................................................................................
Mac-authentication Max-user165................................................................................................................................................................
Mac-authentication Timer166................................................................................................................................................................
Reset Mac-authentication Statistics168................................................................................................................................................................
Portal Configuration Commands169................................................................................................................................................................
Display Portal Acl170................................................................................................................................................................
Display Portal Connection Statistics172................................................................................................................................................................
Display Portal Free-rule175................................................................................................................................................................
Display Portal Interface177................................................................................................................................................................
Display Portal Server178................................................................................................................................................................
Display Portal Server Statistics179................................................................................................................................................................
Display Portal Tcp-cheat Statistics182................................................................................................................................................................
Display Portal User183................................................................................................................................................................
Portal Auth-network185................................................................................................................................................................
Portal Auth-network Destination186................................................................................................................................................................
Portal Backup-group187................................................................................................................................................................
Portal Delete-user188................................................................................................................................................................
Portal Free-rule189................................................................................................................................................................
Portal Max-user190................................................................................................................................................................
Portal Nas-id191................................................................................................................................................................
Portal Nas-id-profile192................................................................................................................................................................
Portal Nas-ip193................................................................................................................................................................
Portal Nas-port-type194................................................................................................................................................................
Portal Redirect-url195................................................................................................................................................................
Portal Server Method197................................................................................................................................................................
Portal Server Server-detect198................................................................................................................................................................
Portal Server User-sync200................................................................................................................................................................
Reset Portal Connection Statistics201................................................................................................................................................................
Reset Portal Tcp-cheat Statistics202................................................................................................................................................................
Port Security Configuration Commands203................................................................................................................................................................
Display Port-security Mac-address Block206................................................................................................................................................................
Display Port-security Mac-address Security208................................................................................................................................................................
Port-security Authorization Ignore209................................................................................................................................................................
Port-security Enable210................................................................................................................................................................
Port-security Intrusion-mode211................................................................................................................................................................
Port-security Mac-address Aging-type Inactivity212................................................................................................................................................................
Port-security Mac-address Dynamic213................................................................................................................................................................
Port-security Max-mac-count215................................................................................................................................................................
Port-security Ntk-mode216................................................................................................................................................................
Port-security Oui217................................................................................................................................................................
Port-security Port-mode218................................................................................................................................................................
Port-security Timer Autolearn Aging220................................................................................................................................................................
Port-security Trap221................................................................................................................................................................
User Profile Configuration Commands223................................................................................................................................................................
User-profile224................................................................................................................................................................
Password Control Configuration Commands226................................................................................................................................................................
Display Password-control Blacklist227................................................................................................................................................................
Password-control { Aging | Composition | History | Length } Enable229................................................................................................................................................................
Password-control Aging230................................................................................................................................................................
Password-control Alert-before-expire231................................................................................................................................................................
Password-control Authentication-timeout232................................................................................................................................................................
Password-control Complexity233................................................................................................................................................................
Password-control Enable235................................................................................................................................................................
Password-control History236................................................................................................................................................................
Password-control Login Idle-time238................................................................................................................................................................
Password-control Password Update Interval240................................................................................................................................................................
Password-control Super Composition241................................................................................................................................................................
Password-control Super Length242................................................................................................................................................................
Reset Password-control Blacklist243................................................................................................................................................................
Rsh Configuration Commands245................................................................................................................................................................
Public Key Configuration Commands247................................................................................................................................................................
Display Public-key Peer248................................................................................................................................................................
Peer-public-key End250................................................................................................................................................................
Public-key-code Begin251................................................................................................................................................................
Public-key Local Create252................................................................................................................................................................
Public-key Local Destroy253................................................................................................................................................................
Public-key Local Export Dsa254................................................................................................................................................................
Public-key Local Export Rsa255................................................................................................................................................................
Public-key Peer256................................................................................................................................................................
Public-key Peer Import Sshkey257................................................................................................................................................................
Pki Configuration Commands259................................................................................................................................................................
Ca Identifier260................................................................................................................................................................
Certificate Request From261................................................................................................................................................................
Certificate Request Mode262................................................................................................................................................................
Certificate Request Polling263................................................................................................................................................................
Common-name264................................................................................................................................................................
Country265................................................................................................................................................................
Crl Update-period266................................................................................................................................................................
Display Pki Certificate267................................................................................................................................................................
Display Pki Certificate Access-control-policy269................................................................................................................................................................
Display Pki Certificate Attribute-group270................................................................................................................................................................
Display Pki Crl Domain271................................................................................................................................................................
Fqdn272................................................................................................................................................................
Ip (pki Entity View)273................................................................................................................................................................
Locality274................................................................................................................................................................
Organization275................................................................................................................................................................
Pki Certificate Access-control-policy276................................................................................................................................................................
Pki Delete-certificate277................................................................................................................................................................
Pki Entity278................................................................................................................................................................
Pki Import-certificate279................................................................................................................................................................
Pki Retrieval-certificate280................................................................................................................................................................
Pki Retrieval-crl Domain281................................................................................................................................................................
Root-certificate Fingerprint282................................................................................................................................................................
Rule (pki Cert Acp View)283................................................................................................................................................................
Ipsec Configuration Commands285................................................................................................................................................................
Connection-name286................................................................................................................................................................
Display Ipsec Policy287................................................................................................................................................................
Display Ipsec Policy-template291................................................................................................................................................................
Display Ipsec Profile293................................................................................................................................................................
Display Ipsec Sa295................................................................................................................................................................
Display Ipsec Statistics300................................................................................................................................................................
Display Ipsec Transform-set302................................................................................................................................................................
Display Ipsec Tunnel303................................................................................................................................................................
Encapsulation-mode305................................................................................................................................................................
Esp Encryption-algorithm306................................................................................................................................................................
Ike-peer (ipsec Policy View/ipsec Policy Template View/ipsec Profile View)307................................................................................................................................................................
Ipsec Anti-replay Check308................................................................................................................................................................
Ipsec Decrypt Check309................................................................................................................................................................
Ipsec Fragmentation Before-encryption310................................................................................................................................................................
Ipsec Policy (interface View)311................................................................................................................................................................
Ipsec Policy (system View)312................................................................................................................................................................
Ipsec Policy Isakmp Template313................................................................................................................................................................
Ipsec Policy-template314................................................................................................................................................................
Ipsec Profile (tunnel Interface View)315................................................................................................................................................................
Ipsec Sa Global-duration316................................................................................................................................................................
Ipsec Transform-set317................................................................................................................................................................
Policy Enable319................................................................................................................................................................
Reset Ipsec Sa320................................................................................................................................................................
Reset Ipsec Statistics321................................................................................................................................................................
Reverse-route Preference325................................................................................................................................................................
Reverse-route Tag326................................................................................................................................................................
Sa Duration328................................................................................................................................................................
Sa Encryption-hex329................................................................................................................................................................
Sa String-key331................................................................................................................................................................
Security Acl332................................................................................................................................................................
Transform334................................................................................................................................................................
Tunnel Local335................................................................................................................................................................
Tunnel Remote336................................................................................................................................................................
Ike Configuration Commands338................................................................................................................................................................
Certificate Domain339................................................................................................................................................................
Display Ike Dpd340................................................................................................................................................................
Display Ike Peer341................................................................................................................................................................
Display Ike Proposal342................................................................................................................................................................
Display Ike Sa344................................................................................................................................................................
Encryption-algorithm348................................................................................................................................................................
Exchange-mode349................................................................................................................................................................
Ike Local-name351................................................................................................................................................................
Ike Next-payload Check Disabled352................................................................................................................................................................
Ike Peer (system View)353................................................................................................................................................................
Ike Sa Keepalive-timer Interval354................................................................................................................................................................
Ike Sa Keepalive-timer Timeout355................................................................................................................................................................
Interval-time356................................................................................................................................................................
Local-address357................................................................................................................................................................
Local-name358................................................................................................................................................................
Peer359................................................................................................................................................................
Pre-shared-key360................................................................................................................................................................
Remote-address361................................................................................................................................................................
Remote-name362................................................................................................................................................................
Reset Ike Sa363................................................................................................................................................................
Ssh Configuration Commands366................................................................................................................................................................
Display Ssh User-information368................................................................................................................................................................
Sftp Server Enable369................................................................................................................................................................
Ssh Server Authentication-retries370................................................................................................................................................................
Ssh Server Authentication-timeout371................................................................................................................................................................
Ssh Server Enable372................................................................................................................................................................
Ssh User373................................................................................................................................................................
Ssh Client Configuration Commands375................................................................................................................................................................
Cdup376................................................................................................................................................................
Display Sftp Client Source378................................................................................................................................................................
Display Ssh Server-info379................................................................................................................................................................
Exit380................................................................................................................................................................
Help381................................................................................................................................................................
Mkdir382................................................................................................................................................................
Quit384................................................................................................................................................................
Rename385................................................................................................................................................................
Sftp387................................................................................................................................................................
Sftp Client Ipv6 Source389................................................................................................................................................................
Sftp Client Source390................................................................................................................................................................
Sftp Ipv6391................................................................................................................................................................
Ssh Client Authentication Server393................................................................................................................................................................
Ssh Client First-time Enable394................................................................................................................................................................
Ssh Client Source395................................................................................................................................................................
Ssh2396................................................................................................................................................................
Ssh2 Ipv6398................................................................................................................................................................
Ssl Configuration Commands401................................................................................................................................................................
Client-verify Enable402................................................................................................................................................................
Client-verify Weaken403................................................................................................................................................................
Close-mode Wait404................................................................................................................................................................
Display Ssl Server-policy405................................................................................................................................................................
Handshake Timeout406................................................................................................................................................................
Pki-domain407................................................................................................................................................................
Prefer-cipher408................................................................................................................................................................
Server-verify Enable409................................................................................................................................................................
Session410................................................................................................................................................................
Ssl Server-policy411................................................................................................................................................................
Version412................................................................................................................................................................
Ssl Vpn Configuration Commands413................................................................................................................................................................
Firewall Configuration Commands415................................................................................................................................................................
Display Firewall-statistics416................................................................................................................................................................
Firewall Default417................................................................................................................................................................
Firewall Ipv6 Default418................................................................................................................................................................
Firewall Ipv6 Enable419................................................................................................................................................................
Firewall Packet-filter Ipv6420................................................................................................................................................................
Reset Firewall Ipv6 Statistics421................................................................................................................................................................
Aspf Configuration Commands422................................................................................................................................................................
Display Aspf Interface423................................................................................................................................................................
Display Aspf Policy424................................................................................................................................................................
Display Port-mapping425................................................................................................................................................................
Firewall Aspf426................................................................................................................................................................
Icmp-error Drop427................................................................................................................................................................
Tcp Syn-check428................................................................................................................................................................
Alg Configuration Commands429................................................................................................................................................................
Session Management Commands431................................................................................................................................................................
Display Application Aging-time432................................................................................................................................................................
Display Session Hardware433................................................................................................................................................................
Display Session Relation-table434................................................................................................................................................................
Display Session Statistics436................................................................................................................................................................
Display Session Table438................................................................................................................................................................
Reset Session440................................................................................................................................................................
Reset Session Statistics441................................................................................................................................................................
Session Aging-time442................................................................................................................................................................
Session Checksum443................................................................................................................................................................
Session Early-ageout444................................................................................................................................................................
Session Log Bytes-active445................................................................................................................................................................
Session Log Packets-active446................................................................................................................................................................
Session Log Time-active447................................................................................................................................................................
Session Persist Acl448................................................................................................................................................................
Connection Limit Configuration Commands450................................................................................................................................................................
Display Connection-limit Policy451................................................................................................................................................................
Limit452................................................................................................................................................................
Web Filtering Configuration Commands454................................................................................................................................................................
Display Firewall Http Java-blocking455................................................................................................................................................................
Display Firewall Http Url-filter Host456................................................................................................................................................................
Display Firewall Http Url-filter Parameter458................................................................................................................................................................
Firewall Http Activex-blocking Acl459................................................................................................................................................................
Firewall Http Activex-blocking Enable460................................................................................................................................................................
Firewall Http Java-blocking Acl461................................................................................................................................................................
Firewall Http Java-blocking Enable462................................................................................................................................................................
Firewall Http Url-filter Host Acl463................................................................................................................................................................
Firewall Http Url-filter Host Default464................................................................................................................................................................
Firewall Http Url-filter Host Ip-address465................................................................................................................................................................
Firewall Http Url-filter Host Url-address466................................................................................................................................................................
Firewall Http Url-filter Parameter467................................................................................................................................................................
Firewall Http Url-filter Parameter Enable468................................................................................................................................................................
Reset Firewall Http469................................................................................................................................................................
Attack Detection And Protection Configuration Commands470................................................................................................................................................................
Attack-defense Policy471................................................................................................................................................................
Blacklist Enable472................................................................................................................................................................
Defense Icmp-flood Action Drop-packet473................................................................................................................................................................
Defense Icmp-flood Enable474................................................................................................................................................................
Defense Icmp-flood Rate-threshold475................................................................................................................................................................
Defense Scan Add-to-blacklist476................................................................................................................................................................
Defense Scan Blacklist-timeout478................................................................................................................................................................
Defense Scan Max-rate479................................................................................................................................................................
Defense Syn-flood Action480................................................................................................................................................................
Defense Syn-flood Enable481................................................................................................................................................................
Defense Syn-flood Rate-threshold482................................................................................................................................................................
Defense Udp-flood Action Drop-packet483................................................................................................................................................................
Defense Udp-flood Enable484................................................................................................................................................................
Defense Udp-flood Rate-threshold486................................................................................................................................................................
Display Attack-defense Policy487................................................................................................................................................................
Display Attack-defense Statistics Interface490................................................................................................................................................................
Display Blacklist492................................................................................................................................................................
Display Flow-statistics Statistics494................................................................................................................................................................
Display Flow-statistics Statistics Interface495................................................................................................................................................................
Display Tcp-proxy Protected-ip497................................................................................................................................................................
Flow-statistics Enable498................................................................................................................................................................
Reset Attack-defense Statistics Interface499................................................................................................................................................................
Signature-detect Action Drop-packet500................................................................................................................................................................
Tcp-proxy Enable501................................................................................................................................................................
Tcp-proxy Mode502................................................................................................................................................................
Tcp Attack Protection Configuration Commands504................................................................................................................................................................
Tcp State505................................................................................................................................................................
Tcp Syn-cookie Enable506................................................................................................................................................................
Ip Source Guard Configuration Commands508................................................................................................................................................................
Ip Source Binding509................................................................................................................................................................
Ip Verify Source510................................................................................................................................................................
Ip Verify Source Max-entries511................................................................................................................................................................
Arp Attack Protection Configuration Commands513................................................................................................................................................................
Arp Source-suppression Limit514................................................................................................................................................................
Arp Packet Rate Limit Configuration Commands515................................................................................................................................................................
Arp Packet Source Mac Consistency Check Configuration Commands516................................................................................................................................................................
Arp Active Acknowledgement Configuration Commands517................................................................................................................................................................
Arp Detection Configuration Commands518................................................................................................................................................................
Arp Detection Enable519................................................................................................................................................................
Arp Detection Trust520................................................................................................................................................................
Arp Restricted-forwarding Enable521................................................................................................................................................................
Display Arp Detection Statistics522................................................................................................................................................................
Reset Arp Detection Statistics523................................................................................................................................................................
Arp Scan524................................................................................................................................................................
Arp Gateway Protection Configuration Commands525................................................................................................................................................................
Arp Filtering Configuration Commands526................................................................................................................................................................
Nd Attack Defense Configuration Commands528................................................................................................................................................................
Urpf Configuration Commands529................................................................................................................................................................
Fips Configuration Commands530................................................................................................................................................................
Fips Self-test531................................................................................................................................................................
Support And Other Resources533................................................................................................................................................................
Conventions534................................................................................................................................................................
Index536................................................................................................................................................................
HP HP ProCurve Series 6600 Command Reference Manual

HP HP ProCurve Series 6600 Command Reference Manual (286 pages)

Brand: HP | Category: Network Router | Size: 1.33 MB
Table of contents
Command Reference1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Ethernet Interface Configuration Commands10................................................................................................................................................................
Default11................................................................................................................................................................
Description12................................................................................................................................................................
Display Counters13................................................................................................................................................................
Display Counters Rate14................................................................................................................................................................
Display Interface15................................................................................................................................................................
Display Packet-drop Interface27................................................................................................................................................................
Display Packet-drop Summary28................................................................................................................................................................
Duplex29................................................................................................................................................................
Flow-interval30................................................................................................................................................................
Interface31................................................................................................................................................................
Link-delay32................................................................................................................................................................
Port Link-mode33................................................................................................................................................................
Port Link-mode Interface-list34................................................................................................................................................................
Port-mode35................................................................................................................................................................
Reset Counters Interface36................................................................................................................................................................
Shutdown37................................................................................................................................................................
Speed38................................................................................................................................................................
Sub-interface Rate-statistic39................................................................................................................................................................
Display Loopback-detection41................................................................................................................................................................
Display Storm-constrain43................................................................................................................................................................
Group-member45................................................................................................................................................................
Loopback-detection Action46................................................................................................................................................................
Loopback-detection Control Enable47................................................................................................................................................................
Loopback-detection Enable48................................................................................................................................................................
Loopback-detection Interval-time49................................................................................................................................................................
Loopback-detection Multi-port-mode Enable50................................................................................................................................................................
Loopback-detection Per-vlan Enable51................................................................................................................................................................
Multicast-suppression52................................................................................................................................................................
Port-group Manual53................................................................................................................................................................
Speed Auto54................................................................................................................................................................
Storm-constrain Control56................................................................................................................................................................
Storm-constrain Enable Trap57................................................................................................................................................................
Unicast-suppression58................................................................................................................................................................
Virtual-cable-test59................................................................................................................................................................
Layer 3 Ethernet Interface And Subinterface Configuration Commands60................................................................................................................................................................
Promiscuous62................................................................................................................................................................
Atm Interface Configuration Commands63................................................................................................................................................................
Display Interface Atm65................................................................................................................................................................
Interface Atm67................................................................................................................................................................
Reset Atm Interface68................................................................................................................................................................
Clock70................................................................................................................................................................
Clock-change Auto71................................................................................................................................................................
Frame-format72................................................................................................................................................................
Loopback73................................................................................................................................................................
Scramble74................................................................................................................................................................
Wan Interface Configuration Commands78................................................................................................................................................................
Serial Interface Configuration Commands81................................................................................................................................................................
Code83................................................................................................................................................................
Detect85................................................................................................................................................................
Idle-mark89................................................................................................................................................................
Invert Receive-clock90................................................................................................................................................................
Reverse-rts94................................................................................................................................................................
Timer Hold95................................................................................................................................................................
Basic Ce1 Interface Configuration Commands96................................................................................................................................................................
Cable (ce1 Interface)97................................................................................................................................................................
Clock (ce1 Interface)98................................................................................................................................................................
Code (ce1 Interface)100................................................................................................................................................................
Data-coding (ce1 Interface)102................................................................................................................................................................
Display Controller E1103................................................................................................................................................................
Error-diffusion Restraint Config104................................................................................................................................................................
Error-diffusion Restraint Enable105................................................................................................................................................................
Frame-format (ce1 Interface)106................................................................................................................................................................
Itf (ce1 Interface)107................................................................................................................................................................
Loopback (ce1 Interface)108................................................................................................................................................................
Using (ce1 Interface)109................................................................................................................................................................
Basic Ct1 Interface Configuration Commands110................................................................................................................................................................
Bert (ct1 Interface)111................................................................................................................................................................
Cable (ct1 Interface)112................................................................................................................................................................
Channel-set (ct1 Interface)113................................................................................................................................................................
Clock (ct1 Interface)114................................................................................................................................................................
Code (ct1 Interface)115................................................................................................................................................................
Data-coding (ct1 Interface)116................................................................................................................................................................
Display Controller T1117................................................................................................................................................................
Frame-format (ct1 Interface)122................................................................................................................................................................
Idlecode (ct1 Interface)123................................................................................................................................................................
Itf (ct1 Interface)124................................................................................................................................................................
Loopback (ct1 Interface)125................................................................................................................................................................
Sendloopcode126................................................................................................................................................................
E1-f Interface Configuration Commands127................................................................................................................................................................
Display Fe1128................................................................................................................................................................
Fe1 Cable132................................................................................................................................................................
Fe1 Code133................................................................................................................................................................
Fe1 Data-coding134................................................................................................................................................................
Fe1 Frame-format135................................................................................................................................................................
Fe1 Idlecode136................................................................................................................................................................
Fe1 Loopback137................................................................................................................................................................
Fe1 Timeslot-list138................................................................................................................................................................
Fe1 Unframed139................................................................................................................................................................
Display Ft1140................................................................................................................................................................
Ft1 Alarm145................................................................................................................................................................
Ft1 Bert146................................................................................................................................................................
Ft1 Cable147................................................................................................................................................................
Ft1 Clock148................................................................................................................................................................
Ft1 Code149................................................................................................................................................................
Ft1 Frame-format151................................................................................................................................................................
Ft1 Idlecode152................................................................................................................................................................
Ft1 Loopback153................................................................................................................................................................
Ft1 Sendloopcode154................................................................................................................................................................
Ft1 Timeslot-list155................................................................................................................................................................
Basic Ce3 Interface Configuration Commands156................................................................................................................................................................
Clock (ce3 Interface)157................................................................................................................................................................
Related Commands158................................................................................................................................................................
Display Controller E3159................................................................................................................................................................
E1 Channel-set162................................................................................................................................................................
E1 Set Clock163................................................................................................................................................................
E1 Set Frame-format164................................................................................................................................................................
E1 Shutdown165................................................................................................................................................................
E1 Unframed166................................................................................................................................................................
Loopback (ce3 Interface)167................................................................................................................................................................
National-bit168................................................................................................................................................................
Reset Counters Controller E3169................................................................................................................................................................
Basic Ct3 Interface Configuration Commands170................................................................................................................................................................
Bert (ct3 Interface)171................................................................................................................................................................
Cable (ct3 Interface)172................................................................................................................................................................
Clock (ct3 Interface)173................................................................................................................................................................
Display Controller T3175................................................................................................................................................................
Feac179................................................................................................................................................................
Frame-format (ct3 Interface)180................................................................................................................................................................
Loopback (ct3 Interface)183................................................................................................................................................................
Reset Counters Controller T3185................................................................................................................................................................
T1 Channel-set187................................................................................................................................................................
T1 Sendloopcode188................................................................................................................................................................
T1 Set Clock189................................................................................................................................................................
T1 Set Frame-format190................................................................................................................................................................
T1 Set Loopback191................................................................................................................................................................
T1 Shutdown193................................................................................................................................................................
T1 Unframed194................................................................................................................................................................
Using (ct3 Interface)195................................................................................................................................................................
Pos Interface Configuration Commands196................................................................................................................................................................
Display Interface Pos199................................................................................................................................................................
Display Ip Interface Pos202................................................................................................................................................................
Display Ipv6 Interface Pos203................................................................................................................................................................
Flag205................................................................................................................................................................
Flag J1 Ignore206................................................................................................................................................................
Link-protocol208................................................................................................................................................................
Cpos Interface Configuration Commands214................................................................................................................................................................
Controller Cpos215................................................................................................................................................................
Display Controller Cpos217................................................................................................................................................................
Display Controller Cpos E1219................................................................................................................................................................
Display Controller Cpos E3221................................................................................................................................................................
Display Controller Cpos T1223................................................................................................................................................................
Display Controller Cpos T3224................................................................................................................................................................
E3 Set Clock231................................................................................................................................................................
E3 Set National-bit232................................................................................................................................................................
E3 Shutdown233................................................................................................................................................................
Flag Vc-3236................................................................................................................................................................
Flag Vc-4237................................................................................................................................................................
Multiplex Mode241................................................................................................................................................................
Ppp Mp Soft-binding242................................................................................................................................................................
T3 Set Alarm249................................................................................................................................................................
T3 Set Bert Pattern250................................................................................................................................................................
T3 Set Clock251................................................................................................................................................................
T3 Set Frame-format253................................................................................................................................................................
T3 Set Loopback254................................................................................................................................................................
Threshold256................................................................................................................................................................
Using T3257................................................................................................................................................................
E-cpos Interace Configuration Commands259................................................................................................................................................................
Controller E-cpos260................................................................................................................................................................
Display Controller E-cpos262................................................................................................................................................................
Oc-12266................................................................................................................................................................
Using { Oc-12 | Oc-12c }268................................................................................................................................................................
Using { Oc-3 | Oc-3c }269................................................................................................................................................................
Loopback And Null Interface Configuration Commands271................................................................................................................................................................
Display Interface Loopback273................................................................................................................................................................
Display Interface Null275................................................................................................................................................................
Interface Loopback277................................................................................................................................................................
Reset Counters Interface Loopback278................................................................................................................................................................
Support And Other Resources280................................................................................................................................................................
Conventions281................................................................................................................................................................
Index283................................................................................................................................................................

Advertising

HP HP ProCurve Series 6600 User Manual

HP HP ProCurve Series 6600 User Manual (283 pages)

HP Switch User Manual  
Brand: HP | Category: Printer | Size: 6.58 MB
Table of contents
Internet Connections32................................................................................................................................................................
Software Installation40................................................................................................................................................................
General Information46................................................................................................................................................................
Dialog Box68................................................................................................................................................................
Installation Instructions187................................................................................................................................................................
Cleaning Instructions195................................................................................................................................................................
HP HP ProCurve Series 6600 Configuration Manual

HP HP ProCurve Series 6600 Configuration Manual (236 pages)

Brand: HP | Category: Network Router | Size: 2.62 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Configuring The Mac Address Table10................................................................................................................................................................
Types Of Mac Address Table Entries11................................................................................................................................................................
Adding Or Modifying A Static Or Dynamic Mac Address Table Entry In Interface View12................................................................................................................................................................
Disabling Mac Address Learning On Ports13................................................................................................................................................................
Configuring The Mac Learning Limit On Ports14................................................................................................................................................................
Mac Address Table Configuration Example15................................................................................................................................................................
Configuring Mac Information17................................................................................................................................................................
Configuring Mac Information Mode18................................................................................................................................................................
Configuration Procedure19................................................................................................................................................................
Configuring Ethernet Link Aggregation20................................................................................................................................................................
Operational Key21................................................................................................................................................................
Aggregating Links In Static Mode23................................................................................................................................................................
Aggregating Links In Dynamic Mode24................................................................................................................................................................
Load-sharing Criteria For Link Aggregation Groups26................................................................................................................................................................
Configuring An Aggregation Group27................................................................................................................................................................
Configuring A Layer 3 Static Aggregation Group28................................................................................................................................................................
Configuring A Layer 2 Dynamic Aggregation Group29................................................................................................................................................................
Configuring A Layer 3 Dynamic Aggregation Group30................................................................................................................................................................
Configuring An Aggregate Interface31................................................................................................................................................................
Configuring The Mtu Of A Layer 3 Aggregate Interface Or Subinterface32................................................................................................................................................................
Enabling Link State Traps For An Aggregate Interface33................................................................................................................................................................
Shutting Down An Aggregate Interface34................................................................................................................................................................
Configuring Load-sharing Criteria For Link Aggregation Groups35................................................................................................................................................................
Displaying And Maintaining Ethernet Link Aggregation36................................................................................................................................................................
Layer 2 Static Aggregation Configuration Example37................................................................................................................................................................
Layer 2 Dynamic Aggregation Configuration Example38................................................................................................................................................................
Layer 2 Aggregation Load Sharing Configuration Example40................................................................................................................................................................
Layer 3 Static Aggregation Configuration Example43................................................................................................................................................................
Layer 3 Dynamic Aggregation Configuration Example44................................................................................................................................................................
Layer 3 Aggregation Load Sharing Configuration Example45................................................................................................................................................................
Configuring Port Isolation48................................................................................................................................................................
Port Isolation Configuration Example49................................................................................................................................................................
Configuring Spanning Tree Protocols50................................................................................................................................................................
Basic Concepts In Stp51................................................................................................................................................................
Stp Algorithm52................................................................................................................................................................
Rstp57................................................................................................................................................................
Mst Region58................................................................................................................................................................
How Mstp Works61................................................................................................................................................................
Protocols And Standards62................................................................................................................................................................
Stp Configuration Task List63................................................................................................................................................................
Mstp Configuration Task List64................................................................................................................................................................
Setting The Spanning Tree Mode66................................................................................................................................................................
Configuring The Root Bridge Or A Secondary Root Bridge67................................................................................................................................................................
Configuring The Current Device As A Secondary Root Bridge Of A Specific Spanning Tree68................................................................................................................................................................
Configuring The Network Diameter Of A Switched Network69................................................................................................................................................................
Configuration Guidelines70................................................................................................................................................................
Configuring The Maximum Port Rate71................................................................................................................................................................
Configuration Restrictions And Guidelines72................................................................................................................................................................
Configuring Path Costs Of Ports74................................................................................................................................................................
Configuring The Port Link Type75................................................................................................................................................................
Configuring The Mode A Port Uses To Recognize And Send Mstp Packets76................................................................................................................................................................
Enabling The Spanning Tree Feature77................................................................................................................................................................
Performing Mcheck Globally78................................................................................................................................................................
Configuring No Agreement Check80................................................................................................................................................................
Configuration Prerequisites81................................................................................................................................................................
No Agreement Check Configuration Example82................................................................................................................................................................
Enabling Bpdu Guard83................................................................................................................................................................
Enabling Loop Guard84................................................................................................................................................................
Displaying And Maintaining The Spanning Tree85................................................................................................................................................................
Mstp Configuration Example86................................................................................................................................................................
Configuring Bpdu Tunneling90................................................................................................................................................................
Bpdu Tunneling Implementation91................................................................................................................................................................
Enabling Bpdu Tunneling93................................................................................................................................................................
Configuring Destination Multicast Mac Address For Bpdus94................................................................................................................................................................
Configuring Vlans97................................................................................................................................................................
Vlan Frame Encapsulation98................................................................................................................................................................
Vlan Types99................................................................................................................................................................
Configuring Basic Settings Of A Vlan Interface100................................................................................................................................................................
Vlan Interface Configuration Example101................................................................................................................................................................
Configuring Port-based Vlans102................................................................................................................................................................
Assigning An Access Port To A Vlan104................................................................................................................................................................
Assigning A Trunk Port To A Vlan105................................................................................................................................................................
Assigning A Hybrid Port To A Vlan106................................................................................................................................................................
Port-based Vlan Configuration Example107................................................................................................................................................................
Configuring Mac-based Vlans108................................................................................................................................................................
Mac-based Vlan Configuration Example112................................................................................................................................................................
Configuring Protocol-based Vlans115................................................................................................................................................................
Protocol-based Vlan Configuration Example116................................................................................................................................................................
Configuring Ip Subnet-based Vlans118................................................................................................................................................................
Displaying And Maintaining Vlan121................................................................................................................................................................
Configuring Super Vlans123................................................................................................................................................................
Configuring A Vlan Interface For The Super Vlan124................................................................................................................................................................
Displaying And Maintaining Super Vlan125................................................................................................................................................................
Configuring A Voice Vlan128................................................................................................................................................................
Security Mode And Normal Mode Of Voice Vlans130................................................................................................................................................................
Configuring A Port To Operate In Automatic Voice Vlan Assignment Mode132................................................................................................................................................................
Configuring A Port To Operate In Manual Voice Vlan Assignment Mode133................................................................................................................................................................
Displaying And Maintaining Voice Vlan134................................................................................................................................................................
Manual Voice Vlan Assignment Mode Configuration Example136................................................................................................................................................................
Configuring Gvrp139................................................................................................................................................................
Gvrp142................................................................................................................................................................
Configuring Basic Gvrp Functions143................................................................................................................................................................
Configuring The Garp Timers144................................................................................................................................................................
Gvrp Configuration Examples146................................................................................................................................................................
Gvrp Fixed Registration Mode Configuration Example147................................................................................................................................................................
Gvrp Forbidden Registration Mode Configuration Example149................................................................................................................................................................
Configuring Qinq151................................................................................................................................................................
Qinq Frame Structure152................................................................................................................................................................
Implementations Of Qinq153................................................................................................................................................................
Configuring Basic Qinq155................................................................................................................................................................
Configuring Selective Qinq156................................................................................................................................................................
Configuring An Inner-outer Vlan 802.1p Priority Mapping157................................................................................................................................................................
Configuring Inner Vlan Id Substitution158................................................................................................................................................................
Configuring The Tpid Value In Vlan Tags159................................................................................................................................................................
Qinq Configuration Examples160................................................................................................................................................................
Selective Qinq Configuration Example163................................................................................................................................................................
Vlan Transparent Transmission Configuration Example166................................................................................................................................................................
Configuring Vlan Termination168................................................................................................................................................................
Vlan Termination Configuration Task List169................................................................................................................................................................
Configuring Dot1q Termination170................................................................................................................................................................
Configuring Ambiguous Dot1q Termination171................................................................................................................................................................
Configuring Unambiguous Qinq Termination172................................................................................................................................................................
Enabling A Vlan Termination-enabled Interface To Transmit Broadcasts And Multicasts173................................................................................................................................................................
Unambiguous Dot1q Termination Configuration Example174................................................................................................................................................................
Ambiguous Dot1q Termination Configuration Example176................................................................................................................................................................
Configuration Example For Dot1q Termination Supporting Pppoe Server178................................................................................................................................................................
Unambiguous Qinq Termination Configuration Example179................................................................................................................................................................
Ambiguous Qinq Termination Configuration Example180................................................................................................................................................................
Configuration Example For Qinq Termination Supporting Pppoe Server182................................................................................................................................................................
Configuring Vlan Mapping187................................................................................................................................................................
Application Scenario Of One-to-two And Two-to-two Vlan Mapping188................................................................................................................................................................
Concepts And Terms189................................................................................................................................................................
Vlan Mapping Implementations190................................................................................................................................................................
Vlan Mapping Configuration Tasks192................................................................................................................................................................
Configuring One-to-one Vlan Mapping193................................................................................................................................................................
Configuring A Downlink Policy194................................................................................................................................................................
Configuring The Network-side Port195................................................................................................................................................................
Configuring An Uplink Policy197................................................................................................................................................................
Configuring One-to-two Vlan Mapping199................................................................................................................................................................
Configuring The Customer-side Port200................................................................................................................................................................
Configuring Two-to-two Vlan Mapping201................................................................................................................................................................
Configuring An Uplink Policy For The Network-side Port202................................................................................................................................................................
Configuring A Downlink Policy For The Customer-side Port203................................................................................................................................................................
Vlan Mapping Configuration Examples205................................................................................................................................................................
One-to-two And Two-to-two Vlan Mapping Configuration Example211................................................................................................................................................................
Configuring Lldp215................................................................................................................................................................
Work Mechanism219................................................................................................................................................................
Setting The Lldp Operating Mode221................................................................................................................................................................
Enabling Lldp Polling222................................................................................................................................................................
Configuring The Management Address And Its Encoding Format223................................................................................................................................................................
Setting Other Lldp Parameters224................................................................................................................................................................
Configuring Cdp Compatibility225................................................................................................................................................................
Displaying And Maintaining Lldp227................................................................................................................................................................
Cdp-compatible Lldp Configuration Example230................................................................................................................................................................
Support And Other Resources232................................................................................................................................................................
Conventions233................................................................................................................................................................
Index235................................................................................................................................................................
HP HP ProCurve Series 6600 Owner's Manual

HP HP ProCurve Series 6600 Owner's Manual (170 pages)

Hewlett-Packard Printer Owner's Manual  
Brand: HP | Category: Printer | Size: 2.52 MB
Table of contents
Special Features2................................................................................................................................................................
Getting Started3................................................................................................................................................................
Printer Features3................................................................................................................................................................
Table Of Contents4................................................................................................................................................................
Buttons And Lights5................................................................................................................................................................
Print Cartridge Status Lights7................................................................................................................................................................
Paper Trays8................................................................................................................................................................
Photo/envelope Feeder10................................................................................................................................................................
Print Cartridges13................................................................................................................................................................
Ink-backup Mode15................................................................................................................................................................
Automatic Paper-type Sensor15................................................................................................................................................................
Connecting To The Printer17................................................................................................................................................................
Wired Ethernet Networking17................................................................................................................................................................
Networking Glossary30................................................................................................................................................................
Pictbridge Printing33................................................................................................................................................................
Pictbridge Problems35................................................................................................................................................................
Hp Digital Photography Options39................................................................................................................................................................
Maximum Dpi40................................................................................................................................................................
Exif Print41................................................................................................................................................................
Printing Borderless Photos42................................................................................................................................................................
Photo Print Cartridge43................................................................................................................................................................
Using Advanced Color Settings44................................................................................................................................................................
Color Management45................................................................................................................................................................
Gray Photo Print Cartridge46................................................................................................................................................................
Storing And Handling Photo Paper48................................................................................................................................................................
Saving Money When Printing Photos49................................................................................................................................................................
Small Photos With A White Border54................................................................................................................................................................
Large Photos With A White Border56................................................................................................................................................................
Printing Other Documents59................................................................................................................................................................
Greeting Cards66................................................................................................................................................................
Index Cards And Other Small Media70................................................................................................................................................................
Iron-on Transfers76................................................................................................................................................................
Printing Tips78................................................................................................................................................................
Printing Shortcuts78................................................................................................................................................................
General Everyday Printing79................................................................................................................................................................
Presentation Printing80................................................................................................................................................................
Print Task Quick Sets81................................................................................................................................................................
Printing In Grayscale83................................................................................................................................................................
Setting The Page Order84................................................................................................................................................................
Printing Collated Copies85................................................................................................................................................................
Print Preview94................................................................................................................................................................
Selecting A Paper Type95................................................................................................................................................................
Selecting A Print Quality96................................................................................................................................................................
Resizing A Document96................................................................................................................................................................
Printing A Different First Page101................................................................................................................................................................
Setting A Custom Paper Size103................................................................................................................................................................
Selecting A Paper Source104................................................................................................................................................................
Printer Software106................................................................................................................................................................
Printer Properties Dialog Box106................................................................................................................................................................
Device Status Window107................................................................................................................................................................
Installing Print Cartridges109................................................................................................................................................................
Aligning Print Cartridges113................................................................................................................................................................
Calibrating Color113................................................................................................................................................................
Automatically Cleaning Print Cartridges113................................................................................................................................................................
Printing A Test Page115................................................................................................................................................................
View Estimated Ink Levels115................................................................................................................................................................
Maintaining Print Cartridges116................................................................................................................................................................
Maintaining The Printer Body117................................................................................................................................................................
Printer Toolbox117................................................................................................................................................................
Troubleshooting119................................................................................................................................................................
Ethernet Problems119................................................................................................................................................................
Printer Is Not Printing121................................................................................................................................................................
Paper Jam122................................................................................................................................................................
Paper Problems123................................................................................................................................................................
Print Quality Is Poor124................................................................................................................................................................
Document Is Misprinted126................................................................................................................................................................
Photos Are Not Printing Correctly127................................................................................................................................................................
Banners Are Not Printing Correctly129................................................................................................................................................................
Borderless Printing Problems129................................................................................................................................................................
Error Messages134................................................................................................................................................................
Printer Lights Are On Or Flashing134................................................................................................................................................................
Document Prints Slowly136................................................................................................................................................................
If You Continue To Have Problems137................................................................................................................................................................
Optional Accessories138................................................................................................................................................................
Paper Tray152................................................................................................................................................................
Specifications162................................................................................................................................................................
Usb Cables164................................................................................................................................................................
Printer Specifications165................................................................................................................................................................
Environmental Statement165................................................................................................................................................................
Print Cartridge Recovery166................................................................................................................................................................
Terms And Conventions168................................................................................................................................................................
HP HP ProCurve Series 6600 Quickspecs

HP HP ProCurve Series 6600 Quickspecs (57 pages)

6600 series  
Brand: HP | Category: Network Router | Size: 4.03 MB
Table of contents
Product Overview1................................................................................................................................................................
Key Features4................................................................................................................................................................
Features And Benefits4................................................................................................................................................................
Technical Specifications32................................................................................................................................................................
HP HP ProCurve Series 6600 Quickspecs

HP HP ProCurve Series 6600 Quickspecs (52 pages)

HP 6600 Switch Series  
Brand: HP | Category: Switch | Size: 0.87 MB
HP HP ProCurve Series 6600 User Manual

HP HP ProCurve Series 6600 User Manual (28 pages)

AC1200 & DC1200 Power Modules  
Brand: HP | Category: Network Router | Size: 1.47 MB
Table of contents
User Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Power Module Overview4................................................................................................................................................................
Front Panel5................................................................................................................................................................
Technical Specifications7................................................................................................................................................................
Status Led7................................................................................................................................................................
Power Module Configuration10................................................................................................................................................................
Installing A Power Module11................................................................................................................................................................
Installing The Ac Power Module13................................................................................................................................................................
Connecting The Ac Power Cord15................................................................................................................................................................
Installing A Dc Power Module And Connecting The Power Cord16................................................................................................................................................................
Connecting The Dc Power Cords17................................................................................................................................................................
Replacing A Power Module20................................................................................................................................................................
Remove The Dc Power Cords21................................................................................................................................................................
Remove The Dc Power Module22................................................................................................................................................................
Support And Other Resources24................................................................................................................................................................
Subscription Service24................................................................................................................................................................
Related Information25................................................................................................................................................................

Share and save

Advertising