Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.

Page 2051

 386 
SAVI configuration in DHCPv6+SLAAC address 
assignment scenario 
Network requirements 
Figure 142 Network diagram 
 
 
As shown in Figure 142, Switch B connects to the DHCPv6 server through interface GigabitEthernet 
1/0/1 and connects to the DHCPv6 client through interface GigabitEthernet 1/0/3. Host A and Host B 
access Gateway (Switch A) through Switch B. Interfaces GigabitEthernet 1/0/1 through GigabitEthernet 
1/0/5 on Switch B belong to VLAN 2. The hosts  can obtain IP addresses through...

Page 2052

 387 
binding entries; and checks the IPv6 data packets from the hosts against dynamic binding entries 
(including ND snooping entries and DHCPv6 snooping entries) applied on the interfaces connected to 
the hosts and against static binding entries. The items to be examined include MAC address, IPv6 
address, VLAN information, and ingress port. 
Configuration procedure 
# Enable SAVI. 
 system-view 
[SwitchB] ipv6 savi strict 
# Enable IPv6. 
[SwitchB] ipv6 
# Enable DHCPv6 snooping. 
[SwitchB] ipv6 dhcp...

Page 2053

 388 
Configuring blacklist 
Overview 
The blacklist feature is an attack prevention mechanism that filters packets based on the source IP address. 
Compared with ACL-based packet filtering, the blacklist  feature is easier to configure and fast in filtering 
packets sourced from particular IP addresses.  
The device can dynamically add and remove blacklist entries by cooperating with the login user 
authentication feature. When the device detects that a user tried to use FTP, Telnet, SSH, SSL, or web to...

Page 2054

 389 
Blacklist configuration example 
Network requirements 
As shown in Figure 143, Ho st A, Host B, and Host C are internal users, and external user Host D is 
considered an attacker. 
Configure Device to always filter packets from Host  D, and to prevent internal users from guessing 
passwords. 
Figure 143  Network diagram 
 
 
Configuration procedure 
# Assign IP addresses to the interfaces of Device. (Details not shown.) 
# Enable the blacklist feature. 
 system-view 
[Device] blacklist enable 
#...

Page 2055

 390 
Host D and Host C are on the blacklist. Host C will stay on the list for 10 minutes, and will then be able 
to try to log in again. The entry for Host D will never age out. When you do not consider Host D an 
attacker anymore, you can use the undo blacklist ip 5.5.5.5 command to remove the entry.  

Page 2056

 391 
Index 
A B C D E H I L M N O P R S T U  
A 
AAA configuration considerations and task list,15 
AAA co

nfiguration examples, 50 
AAA o

verview, 1 
A

pplying a QoS policy, 228 
AR

P attack protection configuration task list, 351 
B 
Ba

sic configuration for MAC authentication, 118  
Blac

klist configuration example, 389 
C 
C

onfiguration prerequisites, 111 
C

onfiguration prerequisites, 92 
C

onfiguration prerequisites, 141 
Co

nfiguration task list, 335 
Co

nfiguration task list, 118...

Page 2057

 392 
Controlled/uncontrolled port and port authorization 
status,78 
C

ontrolling access of portal users, 14 9 
Cr

eating a local asymmetric key pair, 246 
Cr

eating a user profile, 227 
D 
D

eleting a certificate, 263 
D

estroying a local asymmetric key pair, 248 
D

estroying a local RSA key pair, 263 
Displa

ying and maintaining 802.1X, 10 3 
Dis

playing and maintaining AAA, 50 
Displa

ying and maintaining EAD fast deployment, 112  
Displa

ying and maintaining HABP, 242 
Displa

ying and...

Page 2058

 393 
S 
SAVI configuration in DHCPv6+SLAAC address 
assignment scenario,386 
S

AVI configuration in DHCPv6-only address 
assignment scenario, 382 
S

AVI configuration in SLAAC-only address assignment 
scenario, 384 
SA

VI over view, 381 
S

etting port securitys limit on the number of MAC 
addresses on a port, 209 
S

etting the 802.1X authentication timeout timers, 96 
S

etting the EAD rule timer, 112  
S

etting the maximum number of authentication request 
attempts, 96 
S

etting the maximum...

Page 2059

i 
Contents 
High availability overview ··················\
··················\
··················\
··················\
··················\
··················\
··················\
·············  1 
Availability requirements ··················\
··················\
··················\
··················\
··················\
··········· ··················\
··················\
········· 1 
Availability evaluation ··················\
··················\
··················\
··················\...

Page 2060

ii 
CFD configuration example ··················\
··················\
··················\
··················\
··················\
··········· ··················\
··················\
· 29 
Configuring DLDP ··················\
··················\
··················\
··················\
··················\
··················\
·· ··················\
··················\
····· 35 
DLDP overview ··················\
··················\
··················\
··················\
··················\...
Start reading HP 5500 Ei 5500 Si Switch Series Configuration Guide

Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide

All HP manuals