HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

HP 5500 EI & 5500 SI Switch Series Configuration Guides Software version: Release 2215 Document version: 6W100-20120428

Legal and notice information © Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Pa ckard Development Company, L.P. The information contained herein is subject to change without notice. HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Pa ckard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for tech nical or editorial errors or omissions contained herein.

About the HP 5500 EI & 5500 SI configuration guides-Release 2215 The HP 5500 EI & 5500 SI configuration guides describe the software features for the HP 5500 EI & 5500 SI Switch Series, software release train 2215, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios. Configuration guide Content 01 Fundamentals Configuration Guide Describes how to use the command line interface of the switch, log in to and set up the switch. This guide includes: • CLI (command line interface overview and how to use the CLI) • Login methods • CLI login • We b l o g i n • NMS login • User login control • FTP • TFTP • File system management • Configuration file management • Software upgrade • ISSU • ISSU configuration example • Device management • Automatic configuration 02 IRF Configuration Guide Describes the HP proprietar y IRF technology, IRF fabric setup and configuration procedure, restrictions and guidelines, and IRF fabric configuration procedure. 03 Layer 2 – LAN Switching Configuration Guide Covers Layer 2 technologies and features used on a LAN switched network, including VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domain s, remove Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, impl ement VLAN VPNs over the Internet, and so on. This guide includes: • Ethernet interface • Loopback and null interfaces • Bulking configuring interfaces • MAC address table • MAC Information • Ethernet link aggregation • Po r t i s o l a t i o n • Spanning tree • BPDU tunneling • VLAN

Configuration guide Content • Super VLAN • Isolate-user-VLAN • Voic e V L A N • GVRP • QinQ • VLAN mapping • LLDP • Service loopback group • MVRP 04 Layer 3 – IP Services Configuration Guide Describes IP addressing (including static and dynamic IPv4 and IPv6 address assignment), IRDP, UDP helper, DNS, ne twork performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes: • ARP • Gratuitous ARP • Proxy ARP • ARP snooping • IP addressing • DHCP overview • DHCP server • DHCP relay agent • DHCP client • DHCP snooping • BOOTP client • IPv4 DNS • IRDP • IP performance optimization • UDP helper • IPv6 basics • DHCPv6 overview • DHCPv6 server • DHCPv6 relay agent • DHCPv6 client • DHCPv6 snooping • IPv6 DNS • Tunneling 05 Layer 3 – IP Routing Configuration Guide Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route contro l, and policy based routing. This guide includes: • IP routing basics • Static routing • RIP • OSPF • IS-IS • BGP • IPv6 static routing • RIPng • OSPFv3 • IPv6 IS-IS • IPv6 BGP

Configuration guide Content • Routing policy • Po l i c y - b a s e d ro u t i n g • MCE • IPv6 MCE 06 IP Multicast Configuration Guide Covers Layer 3 IPv4 multicast protocols (IGMP, PIM, MSDP, and MBGP), Layer 3 IPv6 multicast protocols (MLD, IPv6 PIM, and IPv6 MBGP), Layer 2 IPv4 multicast protocols (IGMP snooping, PI M snooping, and multicast VLAN), and Layer 2 IPv6 multicast protocols (MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN). This guide includes: • Mulitcast overview • IGMP snooping • PIM snooping • Multicast VLAN • Multicast routing and forwarding • IGMP • PIM • MSDP • MBGP • MLD snooping • IPv6 PIM snooping • IPv6 multicast VLAN • IPv6 multicast routing and forwarding • MLD • IPv6 PIM • IPv6 MBGP 07 ACL and QoS Configuration Guide Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technolo gies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This guide includes: • ACL • QoS overview • QoS configuration approaches • Priority mapping • Traffic policing, traffic shaping, and line rate • Congestion management • Congestion avoidance • Traffic filtering • Priority marking • Traffic redirecting • Class-based accounting • Data buffer • Appendix

Configuration guide Content 08 Security Configuration Guide Covers security features. The major secu rity features available on the switch include identity authentication ( AAA), access security (802.1X, MAC authentication, portal, and port security), secure management (SSH), and attack protection (IP source guard, ARP atta ck protection, and URPF). This guide includes: • AAA • 802.1X fundamentals • 802.1X • EAD fast deployment • MAC authentication • Po r t a l • Triple authentication • Po r t s e cu ri t y • User profile • Password control • HABP • Public key • PKI • IPsec • SSH2.0 • SFTP • SCP • SSL • TCP attack protection • IP source guard • ARP attack protection • ND attack defense • URPF • SAVI • Blacklist 09 High Availability Configuration Guide Describes high availability technologies and features av ailable on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover techno logies focus on network recovery. This guide includes: • High availability overview • Ethernet OAM • CFD • DLDP • RRPP • Smart Link • Monitor Link • VRRP • Stateful failover • BFD • Tra ck

Configuration guide Content 10 Network Management and Monitoring Configuration Guide Describes features that help you ma nage and monitor your network, for example, manage system events, sample packets, assess network performance, synchronize the clock for all devices with the clock in the network, supply power for attached devices by using PoE, and test network connectivity. This guide includes: • System maintenance and debugging • NTP • Information center • SNMP • RMON • Port mirroring • Tra f fic m i rro ri n g • NQA • sFlow • IPC • Po E • Cluster managementCWMP • Stack

i Contents Using the CLI ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ··········· 1 Logging in to the CLI ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··················\ ············ 1 Command conventions ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ··················\ ······ 1 Using the undo form of a command ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··············· 2 CLI views ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ ··················\ · 2 Entering system view from user view ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 3 Returning to the upper-level view from any view ··················\ ··················\ ··················\ ··················\ ······· ··················\ · 3 Returning to user view from any other view ··················\ ··················\ ··················\ ··················\ ············ ··················\ ···· 4 Accessing the CLI online help ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ··················\ ····· 4 Entering a command ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ········ 5 Editing a command line ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 5 Entering a STRING type value for an argument··················\ ··················\ ··················\ ··················\ ··········· ················· 5 Abbreviating commands··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ·············· 6 Configuring and using co mmand keyword aliases ··················\ ··················\ ··················\ ··················\ ········· ············· 6 Configuring and using hotkeys ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ············ 6 Enabling redisplaying entered- but-not-submitted commands ··················\ ··················\ ··················\ ················ ········· 8 Understanding command- line error messages ··················\ ··················\ ··················\ ··················\ ············· ··················\ ········ 8 Using the command hi story function ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ················· 9 Viewing history commands ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············· 9 Setting the command history buffe r size for user interfaces ··················\ ··················\ ··················\ ············· ············· 9 Controlling the CLI output ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ ······ 10 Pausing between screens of output ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······ 10 Filtering the output fr om a display command ··················\ ··················\ ··················\ ··················\ ··········· ··················\ 10 Configuring user privileg e and command levels ··················\ ··················\ ··················\ ··················\ ········· ··················\ ····· 13 Configuring a user privilege level ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ········· 13 Switching the user privilege level ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ·········· 17 Changing the leve l of a command ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ····· 19 Saving the running configuration ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················· 19 Displaying and maintaining CLI ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ················· 19 Login overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ ······· 21 Login methods at a glance ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ ··· 21 User interfaces ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ············· 22 User interface assignment ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······· 22 User interface numbering ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············· 22 Logging in to the CLI ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··················\ ····· 23 Logging in through the console port for the first time ··················\ ··················\ ··················\ ··················\ ··················\ ······· 23 Configuring console login control settings ··················\ ··················\ ··················\ ··················\ ··················\ ················ 25 Configuring none authentication for console login ··················\ ··················\ ··················\ ··················\ ····· ·············· 26 Configuring password authenti cation for console login ··················\ ··················\ ··················\ ··················\ · ·········· 27 Configuring scheme authenti cation for console login ··················\ ··················\ ··················\ ··················\ ··· ············ 28 Configuring common console lo gin settings (optional) ··················\ ··················\ ··················\ ··················\ ·· ··········· 30 Logging in through Telnet ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················ 32 Configuring none authentication for Telnet login ··················\ ··················\ ··················\ ··················\ ······ ················ 33 Configuring password authenti cation for Telnet login ··················\ ··················\ ··················\ ··················\ ·· ············ 34 Configuring scheme authenti cation for Telnet login ··················\ ··················\ ··················\ ··················\ ···· ·············· 35 Configuring common settings for VTY user interfaces (optional) ··················\ ··················\ ··················\ ················ 37 Using the device to log in to a Telnet server ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··· 39 Setting the DSCP value for IP to use for outgoing Telnet packets ··················\ ··················\ ··················\ ········ ······ 40

ii Logging in through SSH ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ···· 40 Configuring the SSH server on the device ··················\ ··················\ ··················\ ··················\ ··················\ ················ 40 Using the device as an SSH client to log in to the SSH server ··················\ ··················\ ··················\ ··········· ········ 43 Modem dial-in through the console port ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 43 Setting up the configuration environment ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··· 44 Configuring none authentication for mode m dial-in ··················\ ··················\ ··················\ ··················\ ····· ············· 47 Configuring password authentication for modem dial-in ··················\ ··················\ ··················\ ··················\ ·········· 47 Configuring scheme authentication for modem dial-in ··················\ ··················\ ··················\ ··················\ ·············· 48 Configuring common settings for modem dial-in (optional) ··················\ ··················\ ··················\ ··················\ ······ 51 Displaying and maintaining CLI login ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 53 Logging in to the Web inte rface ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ·············· 54 Configuring HTTP login ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ····· 54 Configuring HTTPS login ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ···· 55 Displaying and maintaining Web login ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 57 HTTP login configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··············· 57 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 57 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 57 HTTPS login configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ·············· 59 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 59 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 59 Logging in through NMS ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ················· 61 Configuring SNMP login ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ··· 61 Prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ······ 61 Configuring SNMPv3 settings ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ········· 61 Configuring SNMPv1 or SNMPv2c settings ··················\ ··················\ ··················\ ··················\ ··················\ ············· 62 NMS login example··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ ····· 63 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 63 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 63 Controlling user logins ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ···· 65 Controlling Telnet logins ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ ······· 65 Configuring source IP-based Telnet login control ··················\ ··················\ ··················\ ··················\ ··················\ ····· 65 Configuring source/destination IP-based Telnet login control ··················\ ··················\ ··················\ ··················\ ·· 66 Configuring source MAC-based Telnet login control ··················\ ··················\ ··················\ ··················\ ····· ··········· 66 Telnet login control co nfiguration example ··················\ ··················\ ··················\ ··················\ ············ ··················\ ·· 66 Configuring source IP-based SNMP login control ··················\ ··················\ ··················\ ··················\ ········ ··················\ ···· 67 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 67 SNMP login control configuration example ··················\ ··················\ ··················\ ··················\ ·············· ················· 68 Configuring Web login control ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ················· 69 Configuring source IP-bas ed Web login control ··················\ ··················\ ··················\ ··················\ ········· ··············· 69 Logging off online Web users ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ·········· 69 Web login control configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ················ 69 Configuring FTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ······· 71 Using the device as an FTP client ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ 71 Establishing an FTP connection ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ·········· 71 Setting the DSCP value for IP to use for outgoing FTP packets ··················\ ··················\ ··················\ ··················\ · 72 Managing directories on the FTP server ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··· 73 Working with the files on the FTP server ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 73 Switching to another user account ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······· 74 Maintaining and troublesho oting the FTP connection ··················\ ··················\ ··················\ ··················\ ···· ··········· 74 Terminating the FT P connection ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ········· 74 FTP client configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········· 75 Using the device as an FTP server ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· 76

iii Configuring basic parameters ··················\ ··················\ ··················\ ··················\ ··················\ ··························\ ········· 76 Configuring authenticati on and authorization ··················\ ··················\ ··················\ ··················\ ·········· ················· 77 FTP server configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 78 Displaying and maintaining FTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 80 Configuring TFTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ ······ 81 Prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ··············· 81 Using the device as a TFTP client ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ 81 Displaying and maintain ing the TFTP client ··················\ ··················\ ··················\ ··················\ ············ ··················\ ·········· 82 TFTP client config uration example ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ················· 82 Managing the file system ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··················\ 84 Managing files ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ ··········· 84 Displaying file information ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ·············· 85 Displaying file contents ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ················· 85 Renaming a file ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ····· 85 Copying a file ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······················\ ··················\ ···· 85 Moving a file ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ········· 86 Deleting/restoring a file ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ················ 86 Emptying the recycle bin ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ·············· 86 Managing directories ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··················\ ······ 86 Displaying directory information ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········· 86 Displaying the current working directory ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ 87 Changing the current working directory ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··· 87 Creating a directory ·················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ··················\ 87 Removing a directory ·················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ················ 87 Managing storage media ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ · 87 Managing storage medium space ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 87 Performing batch operations ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 88 Setting the file system operation mode ··················\ ··················\ ··················\ ··················\ ················ ··················\ ·············· 88 File system manage ment examples ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ············· 88 Managing configuration files ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ················ 90 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 90 Configuration types ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ··················\ 90 Configuration file format and content ··················\ ··················\ ··················\ ··················\ ················· ··················\ ······ 91 Coexistence of multiple configuration files ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ···· 91 Startup with a configuration file ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··········· 91 Saving the running configuration ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················· 91 Enabling configuration file auto-update ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ····· 92 Saving running configuration in fast mode or safe mode ··················\ ··················\ ··················\ ··················\ ········· 92 Configuring configuration rollback ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ················ 93 Configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ 93 Configuring configuratio n archive parameters ··················\ ··················\ ··················\ ··················\ ·········· ················ 93 Enabling automatic configuration archiving ··················\ ··················\ ··················\ ··················\ ··················\ ············· 95 Manually archiving running configuration ··················\ ··················\ ··················\ ··················\ ·············· ··················\ · 95 Performing config uration rollback ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ········ 95 Specifying a configuration file for the next startup ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 96 Backing up the next-startup configuration file to a TFTP server ··················\ ··················\ ··················\ ········· ··················\ 96 Deleting the next-startup configuration file ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ·············· 97 Restoring the next-startup configura tion file from a TFTP server ··················\ ··················\ ··················\ ········ ··················\ 97 Displaying and maintainin g a configuration file ··················\ ··················\ ··················\ ··················\ ······· ··················\ ······· 98 Upgrading software ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 99 Software upgrade methods ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··················\ · 99 Upgrading software through a system reboot ··················\ ··················\ ··················\ ··················\ ············ ··················\ ···· 100