HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
228 VRID : 1 Adver Timer : 1 Admin Status : Up State : Master Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time : 0 Auth Type : None Virtual IP : 10.1.1.10 Virtual MAC : 0000-5e00-0101 Master IP : 10.1.1.1 VRRP Track Information: Track Object : 1 State : Positive Pri Reduced : 3\ 0 # Display detailed information about VRRP group 1 on Switch B. [SwitchB-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID : 1 Adver Timer : 1 Admin Status : Up State : Backup Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time : 0 Become Master : 2200ms left Auth Type : None Virtual IP : 10.1.1.10 Master IP : 10.1.1.1 The output shows that in VRRP group 1, Switch A is the master, and Switch B is a backup. Packets from Host A to Host B are forwarded through Switch A. # Shut down the uplink interface VLAN-interface 3 on Switch A. [SwitchA-Vlan-interface2] interface vlan-interface 3 [SwitchA-Vlan-interface3] shutdown After shutting down the uplink interface on Switch A, you can still successfully ping Host B on Host A. Use the display vrrp command to view information about VRRP group 1. # After shutting down the uplink interface on Sw itch A, display detailed information about VRRP group 1 on Switch A. [SwitchA-Vlan-interface3] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID : 1 Adver Timer : 1 Admin Status : Up State : Backup Config Pri : 110 Running Pri : 80 Preempt Mode : Yes Delay Time : 0 Become Master : 2200ms left Auth Type : None Virtual IP : 10.1.1.10 Master IP : 10.1.1.2
229 VRRP Track Information: Track Object : 1 State : Negative Pri Reduced : 3\ 0 # After shutting down the uplink interface on Switch A, display detailed information about VRRP group 1 on Switch B. [SwitchB-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID : 1 Adver Timer : 1 Admin Status : Up State : Master Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time : 0 Auth Type : None Virtual IP : 10.1.1.10 Virtual MAC : 0000-5e00-0101 Master IP : 10.1.1.2 The output shows that when the uplink interface on Switch A is shut down, the priority of Switch A decreases to 80. Switch A becomes the backup, and Switch B becomes the master. Packets from Host A to Host B are forwarded through Switch B.
230 Index A B C D E H I M R S T V A Activating an RRPP domain,67 As sociating the track module with a detection module, 202 As sociating the track module with an application module, 204 A vailability evaluation, 1 A vailability requirements, 1 B BFD o verview, 19 3 C CFD c onfiguration example, 29 CFD conf iguration task list, 20 CFD o verview, 16 C onfiguration guidelines, 19 2 C onfiguring a Smart Link device,10 0 C onfiguring an associated device,10 4 C onfiguring an RRPP ring group, 68 Co nfiguring basic CFD settings, 21 C onfiguring basic Ethernet OAM functions, 9 C onfiguring BFD basic functions, 19 8 C onfiguring CFD functions, 24 Co nfiguring control VLANs, 63 C onfiguring DLDP authentication,45 C onfiguring Ethernet OAM remote loopback, 11 C onfiguring link monitoring, 10 C onfiguring Monitor Link, 12 0 C onfiguring protected VLANs, 64 C onfiguring RRPP rings, 65 Co nfiguring RRPP timers, 68 C onfiguring the backup VLAN, 19 0 C onfiguring the duplex mode and speed of an Ethernet interface, 42 C onfiguring the Ethernet OAM connection detection timers, 9 Co nfiguring VRRP for IPv4, 13 6 Co nfiguring VRRP for IPv6, 14 3 Cr eating an RRPP domain, 63 D Displa ying and maintaining BFD, 19 9 Displa ying and maintaining CFD, 28 Displa ying and maintaining DLDP, 46 Displa ying and maintaining Ethernet OAM configuration, 13 Displa ying and maintaining Monitor Link, 121 Displa ying and maintaining RRPP, 69 Displa ying and maintaining Smart Link, 10 4 Displa ying and maintaining stateful failover, 191 Displa ying and maintaining track entries, 208 D LDP configuration examples, 46 DLDP co nfiguration task list, 42 DLDP o verview, 35 E E nabling DLDP, 43 Ena bling stateful failover, 19 0 Ether net OAM configuration example, 13 Ether net OAM configuration task list, 8 Ether net OAM overview, 5 H H igh availability technologies, 2 I In troduction to stateful failover configuration, 18 9 I Pv4-based VRRP configuration examples, 14 8 I Pv6 -based VRRP configuration examples, 16 7 M Monit or Link configuration example, 121 Mo nitor Link overview, 119 R R esetting DLDP state, 45 R RPP configuration examples,69 RRP P configuration task list, 62 RR PP overview, 54
231 S Setting DLDP mode,43 S etting the delaydown timer, 44 S etting the interval to send advertisement packets, 43 S etting the port shutdown mode, 44 Smar t Link configuration examples, 10 5 Smar t Link configuration task list, 10 0 Smar t Link overview, 97 S tateful failover configuration example, 191 St ateful failover overview, 18 8 T T rack configuration examples, 208 T rack configuration task list,201 Tr ack ove r view, 200 Tr ou b l es ho o ti n g, 96 T roubleshooting DLDP, 53 T roubleshooting VRRP, 18 7 V VR RP load balancing mode, 131 VRRP o verview, 12 5 VR RP standard protocol mode, 12 6
i Contents Using ping, tracert, an d system debugging ··················\ ··················\ ··················\ ··················\ ············· ··················\ ········ 1 Ping ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ··················\ 1 Using a ping command to test network connectivity ··················\ ··················\ ··················\ ··················\ ···················· 1 Ping example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ ······ 1 Tracert ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ ··················\ ··· 3 Prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ········· 4 Using a tracert command to identify failed or all nodes in a path ··················\ ··················\ ··················\ ······· ········ 5 System debugging ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ ·········· 5 Debugging information control switches··················\ ··················\ ··················\ ··················\ ················· ··················\ ····· 5 Debugging a feat ure module ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ············ 6 Ping and tracert example ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··················\ ······· 7 Configuring NTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ······· 8 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ········· 8 NTP application ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·····················\ ··················\ ····· 8 NTP advantages ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ ··· 8 How NTP works ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ··· 9 NTP message format ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 10 Operation modes ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ················· 11 NTP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 13 Configuring NTP operation modes ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ············· 13 Configuring the clie nt/server mode ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ······ 14 Configuring the symmetric peers mode ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· 14 Configuring the broadcast mode ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 15 Configuring the multicast mode ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ········· 16 Configuring option al parameters ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ················ 17 Specifying the source inte rface for NTP messages ··················\ ··················\ ··················\ ··················\ ······ ·············· 17 Disabling an interface from receiving NTP messages ··················\ ··················\ ··················\ ··················\ ···· ··········· 17 Configuring the allowed maximum number of dynamic sessions ··················\ ··················\ ··················\ ·············· 18 Configuring the DSCP value for NTP messages ··················\ ··················\ ··················\ ··················\ ··················\ ······· 18 Configuring access-control rights ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ 18 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ············· 19 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 19 Configuring NTP authentication ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ················· 19 Configuring NTP authentication in client/server mode ··················\ ··················\ ··················\ ··················\ ·· ··········· 19 Displaying and maintaining NTP ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··············· 21 NTP configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ · 21 Configuring the client/server mode ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ······ 21 Configuring the NTP symmetric mode ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ·· 22 Configuring NTP broadcast mode ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 24 Configuring NTP multicast mode ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ······· 25 Configuring NTP client/server mode with authentication ··················\ ··················\ ··················\ ··················\ ········· 28 Configuring NTP broadcast mo de with authentication ··················\ ··················\ ··················\ ··················\ ···· ········· 29 Configuring the information center ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ············· 33 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 33 Classification of system information ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 34 System informat ion levels ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ·············· 34 System information channels and output destinations ··················\ ··················\ ··················\ ··················\ ··· ············ 34 Outputting system inform ation by source module ··················\ ··················\ ··················\ ··················\ ········ ·············· 35
ii Default output rules of system information ··················\ ··················\ ··················\ ··················\ ············ ··················\ ···· 35 System informat ion format ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ············· 36 Information center conf iguration task list ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··············· 39 Outputting system inform ation to the console ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ········· 40 Configuring a system informatio n output rule for the console ··················\ ··················\ ··················\ ············ ········ 40 Enabling system information output to the console ··················\ ··················\ ··················\ ··················\ ··················\ ·· 40 Outputting system information to the monitor terminal ··················\ ··················\ ··················\ ··················\ · ··················\ ··· 41 Configuring a system information outp ut rule for the monitor terminal ··················\ ··················\ ··················\ ··· ·· 41 Enabling system information outp ut to the monitor terminal ··················\ ··················\ ··················\ ·············· ········· 42 Outputting system inform ation to a log host ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ·········· 42 Outputting system informat ion to the trap buffer ··················\ ··················\ ··················\ ··················\ ······ ··················\ ········ 43 Outputting system information to the log buffer ··················\ ··················\ ··················\ ··················\ ··················\ ················ 43 Outputting system information to the SNMP module ··················\ ··················\ ··················\ ··················\ ······ ··················\ · 44 Outputting system information to the Web interface ··················\ ··················\ ··················\ ··················\ ··················\ ········ 45 Saving security logs into the security log file ··················\ ··················\ ··················\ ··················\ ······· ··················\ ············· 45 Saving security logs into the security log file ··················\ ··················\ ··················\ ··················\ ··················\ ············ 46 Managing the security log file ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··········· 47 Configuring synchronous information output ··················\ ··················\ ··················\ ··················\ ············ ················· 49 Disabling an interface from generating link up/down logging information ··················\ ··················\ ··················\ · ···· 49 Displaying and maintaining information center ··················\ ··················\ ··················\ ··················\ ········· ··················\ ······ 50 Information center conf iguration examples ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·········· 50 Outputting log informatio n to a UNIX log host ··················\ ··················\ ··················\ ··················\ ········· ················· 50 Outputting log information to a Linux log host ··················\ ··················\ ··················\ ··················\ ··················\ ········· 51 Outputting log information to the console ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··· 53 Saving security logs into the security log file ··················\ ··················\ ··················\ ··················\ ··················\ ············ 54 Configuring SNMP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ···· 57 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 57 SNMP framework ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······················\ ················ 57 MIB and view-based MIB access control ··················\ ··················\ ··················\ ··················\ ················· ··················\ · 57 SNMP operations ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ················· 58 SNMP protocol versions ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ············· 58 SNMP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 58 Configuring SNMP basic parameters ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··········· 58 Configuring SNMPv3 basic parameters ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ 58 Configuring SNMPv1 or SNMPv2c basic parameters ··················\ ··················\ ··················\ ··················\ ·············· 60 Switching the NM-specific interface index format ··················\ ··················\ ··················\ ··················\ ··················\ ············ 62 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ·············· 62 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 62 Configuring SNMP logging ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··················\ 63 Configuring SNMP traps ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ··· 63 Enabling SNMP traps ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ·············· 63 Configuring the SNMP agent to send traps to a host ··················\ ··················\ ··················\ ··················\ ···· ··········· 64 Displaying and ma intaining SNMP ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ············ 65 SNMP configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················ 66 SNMPv1/SNMPv2c configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ············ 66 SNMPv3 configuration example··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ····· 67 SNMP logging config uration example ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ · 69 Configuring RMON ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ · 71 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 71 Working mechanism ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ·············· 71 RMON groups ·················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ 71 Configuring the RMON statistics function ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··········· 73 Configuring the RMON Ethernet statistics function ··················\ ··················\ ··················\ ··················\ ··················\ ·· 73
iii Configuring the RMON histor y statistics function ··················\ ··················\ ··················\ ··················\ ······ ················ 73 Configuring the RMON alarm function ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ·········· 74 Displaying and ma intaining RMON ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··········· 75 Ethernet statistics grou p configuration example ··················\ ··················\ ··················\ ··················\ ······· ··················\ ········ 76 History group config uration example ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ············· 76 Alarm group configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ············· 78 Configuring port mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ 81 Introduction to port mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ ···· 81 Terminologies of port mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ·········· 81 Port mirroring classificati on and implementation ··················\ ··················\ ··················\ ··················\ ······ ················· 82 Configuring local port mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ 84 Local port mirroring conf iguration task list ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ····· 84 Creating a local mirroring group ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········ 84 Configuring source ports for the local mirroring group ··················\ ··················\ ··················\ ··················\ ············ 84 Configuring the monitor port for the local mirroring group ··················\ ··················\ ··················\ ··················\ ······ 85 Using the remote probe VLAN to enable local mi rroring to support multiple monitor ports ··················\ ······· 86 Configuring Layer 2 remote port mirroring ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·········· 87 Layer 2 remote port mirroring configuration task list ··················\ ··················\ ··················\ ··················\ · ··············· 87 Configuring a remote source gr oup (on the source device) ··················\ ··················\ ··················\ ················ ······· 88 Configuring a remote destination group (on the destination device) ··················\ ··················\ ··················\ ······ ·· 90 Displaying and maintaining port mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 92 Port mirroring configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 92 Local port mirroring configuration example ··················\ ··················\ ··················\ ··················\ ············ ··················\ · 92 Local port mirroring with multiple monitor ports configuration example ··················\ ··················\ ··················\ ··· 93 Layer 2 remote port mirroring configuration example ··················\ ··················\ ··················\ ··················\ ··· ··········· 94 Configuring tra ffic mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ··················\ 97 Introduction to traffic mirroring ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ···· 97 Traffic mirroring configuration task list ··················\ ··················\ ··················\ ··················\ ············· ··················\ ················· 97 Configuring match criteria ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ ···· 97 Configuring traffic mirrori ng of different types ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··········· 98 Mirroring traffic to a port ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················ 98 Mirroring traffic to the CPU ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ·············· 98 Configuring a QoS policy ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 98 Applying a QoS policy ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··················\ ···· 99 Apply a QoS policy to a port ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ·········· 99 Apply a QoS policy to a VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ······· 99 Apply a QoS poli cy globally ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ········ 100 Apply a QoS policy to the control plane ··················\ ··················\ ··················\ ··················\ ··················\ ················ 100 Displaying and maintaining traffic mirroring ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ········ 100 Traffic mirroring configuration example ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··········· 101 Traffic mirroring configuration example ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ·· 101 Configuring NQA ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ 103 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 103 NQA features ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ························\ ··················\ 103 NQA concepts ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ················· 105 NQA probe operation procedure ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ·· 106 NQA configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ · 106 Configuring the NQA server ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ················ 107 Enabling the NQA client ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ·· 107 Creating an NQA test group ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ················ 108 Configuring an NQA test group ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ············· 108 Configuring ICMP echo tests ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ 108 Configuring DHCP tests ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ············ 109
iv Configuring DNS tests ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ············· 110 Configuring FTP tests ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ················ 111 Configuring HTTP tests ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ·············· 112 Configuring UDP jitter tests ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 112 Configuring SNMP tests ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··········· 114 Configuring TCP tests ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··············· 115 Configuring UDP echo tests ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· 116 Configuring voice tests ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·············· 116 Configuring DLSw tests ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ············· 118 Configuring the collabo ration function ··················\ ··················\ ··················\ ··················\ ················ ··················\ ············ 119 Configuring threshold monitoring ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 120 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 120 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 120 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 120 Configuring the NQA statisti cs collection function ··················\ ··················\ ··················\ ··················\ ···· ··················\ ····· 122 Configuring the history re cords saving function ··················\ ··················\ ··················\ ··················\ ······· ··················\ ······ 122 Configuring optional parameter s for an NQA test group ··················\ ··················\ ··················\ ··················\ · ·············· 123 Configuring a schedule fo r an NQA test group ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··· 124 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 124 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 125 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 125 Displaying and ma intaining NQA ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··········· 125 NQA configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ·············· 126 ICMP echo test conf iguration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 126 DHCP test configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 127 DNS test configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ······ 129 FTP test configura tion example ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ········ 130 HTTP test configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 131 UDP jitter test configuration example ··················\ ··················\ ··················\ ··················\ ················· ··················\ ····· 132 SNMP test config uration example ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ···· 135 TCP test configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ······· 136 UDP echo test conf iguration example ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ·· 137 Voice test config uration example ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ······ 139 DLSw test configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 141 NQA collaboration configuration example··················\ ··················\ ··················\ ··················\ ················ ·············· 143 Configurin g sFlow ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··················\ ·· 146 sFlow overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ ········· 146 Introduction to sFlow ·················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ················ 146 sFlow operation ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ 147 Configuring sFlow ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··················\ ······· 147 Configuring the sFlow agen t and sFlow collector ··················\ ··················\ ··················\ ··················\ ······· ············· 147 Configuring flow sampling ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ·········· 148 Configuring counter sampling ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················ 148 Displaying and maintaining sFlow ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ············· 148 sFlow configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················· 149 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 149 Troubleshooting sFlow configuration ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ············ 150 Configuring IPC ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ···· 151 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 151 Node ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ·· 151 Link ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ································\ ··················\ ·········· 151 Channel ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ ····· 151 Packet sending modes ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ············ 152
v Enabling IPC performa nce statistics ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ·············· 152 Displaying and maintaining IPC ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 153 Configuring PoE ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ ··· 154 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 154 Protocol specification ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ················ 154 PoE configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ ···· 155 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 155 Enabling PoE ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ ·········· 156 Enabling PoE for a PoE interface ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ······· 156 Detecting PDs ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··············· 157 Enabling the PSE to detect nonstandard PDs ··················\ ··················\ ··················\ ··················\ ············ ··············· 157 Configuring a PD disconnection detection mode ··················\ ··················\ ··················\ ··················\ ········· ··········· 157 Configuring th e PoE power ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ 157 Configuring the maximum PoE interface power ··················\ ··················\ ··················\ ··················\ ··········· ··········· 157 Configuring PoE power management ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 158 Configuring PoE interface power management ··················\ ··················\ ··················\ ··················\ ············ ··········· 158 Configuring the PoE mo nitoring function ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ·········· 159 Configuring PSE po wer monitoring ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··· 159 Monitoring PD ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ····· 159 Configuring PoE interface through PoE profile ··················\ ··················\ ··················\ ··················\ ········· ··················\ ······ 159 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 160 Configuring PoE profile ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 160 Applying PoE profile ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··············· 160 Upgrading PSE processing software in service ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ···· 161 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 161 Displaying and maintaining PoE ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ·············· 161 PoE configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ 162 Troubleshooting PoE ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ··················\ ····· 163 Setting the priority of a PoE interface to critical fails ··················\ ··················\ ··················\ ··················\ ··············· 163 Applying a PoE profile to a PoE interface fails ··················\ ··················\ ··················\ ··················\ ······· ················· 163 Configuring an AC input unde r-voltage threshold fails ··················\ ··················\ ··················\ ··················\ · ·········· 164 Configuring cluste r management ·················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ········· 165 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 165 Roles in a cluster ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ · 165 How a cluster works ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· 166 Cluster management configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 169 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 169 Configuring the management switch ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ·········· 170 Enabling NDP globally and for specific ports ··················\ ··················\ ··················\ ··················\ ·········· ················ 170 Configuring NDP parameters ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ······ 171 Enabling NTDP globally an d for specific ports ··················\ ··················\ ··················\ ··················\ ········· ··············· 171 Configuring NTDP parameters ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 172 Manually collecting topology information ··················\ ··················\ ··················\ ··················\ ·············· ··················\ 172 Enabling the cluster function ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ··········· 173 Establishing a cluster ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 173 Enabling management VLAN auto-negotiation ··················\ ··················\ ··················\ ··················\ ············· ··········· 174 Configuring communication between the management switch and the member switches within a cluster ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 174 Configuring cluster management protocol packets ··················\ ··················\ ··················\ ··················\ ······· ·········· 175 Cluster member management ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ····· 176 Configuring the me mber switches ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ············· 177 Enabling NDP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ 177 Enabling NTDP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ················· 177
vi Manually collecting to pology information ··················\ ··················\ ··················\ ··················\ ·············· ··················\ 177 Enabling the cluster function ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ··········· 177 Deleting a member switch from a cluster ··················\ ··················\ ··················\ ··················\ ··················\ ················ 177 Configuring access between the management switch and its me mber switches ··················\ ··················\ ·············· 177 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 177 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 178 Adding a candidate sw itch to a cluster ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··········· 178 Configuring advanced cluste r management functions ··················\ ··················\ ··················\ ··················\ ····· ················ 178 Configuring topology management ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ · 178 Configuring interact ion for a cluster ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ 179 SNMP configuration synchronization function ··················\ ··················\ ··················\ ··················\ ··········· ·············· 180 Configuring web user ac counts in batches ··················\ ··················\ ··················\ ··················\ ·············· ················ 181 Displaying and maintainin g cluster management ··················\ ··················\ ··················\ ··················\ ········· ··················\ · 181 Cluster management co nfiguration example ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ···· 182 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 182 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 183 Configuring CWMP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ················ 186 Hardware compatibility ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················· 186 CWMP overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·······················\ ··················\ ····· 186 CWMP network framework ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· 186 Basic CWMP functions ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··········· 187 CWMP mechanism ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··········· 188 CWMP configura tion tasks ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ················· 191 Configuring the DHCP server ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ········ 191 Configuring the DNS server ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ········· 192 Configuring the ACS server ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ········· 192 Configuring CPEs ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ················ 192 Enabling CWMP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ····· 192 Configuring the ACS attributes ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ················· 193 Configuring the ACS URL ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·········· 193 Configuring the ACS us ername and password ··················\ ··················\ ··················\ ··················\ ············· ·········· 193 Configuring CPE attributes ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ ·· 194 Configuring the CPE username and password ··················\ ··················\ ··················\ ··················\ ············· ··········· 194 Configuring the CWMP connection interface ··················\ ··················\ ··················\ ··················\ ············· ············· 194 Sending Inform messages ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 195 Configuring the maximum number of attempts made to retry a connection ··················\ ··················\ ············· 195 Configuring the close-wait timer of the CPE ··················\ ··················\ ··················\ ··················\ ··········· ··················\ 195 Configuring the CPE working mode ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ 196 Specifying an SSL client policy for HTTPS connection to ACS ··················\ ··················\ ··················\ ············· ···· 196 Displaying and maintaining CWMP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· 197 CWMP configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ············· 197 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 197 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 197 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 198 Configuring a stack (available only on the HP 5500 SI) ··················\ ··················\ ··················\ ··················\ ············· 206 Stack configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 206 Configuring the master device of a stack ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ·········· 206 Configuring a private IP a ddress pool for the stack ··················\ ··················\ ··················\ ··················\ ··· ············· 207 Configuring stack ports ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········· 207 Creating a stack ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ 207 Configuring the stack ports of a member device ··················\ ··················\ ··················\ ··················\ ··················\ ············ 207 Logging in to the CLI of a member from the master ··················\ ··················\ ··················\ ··················\ ····· ··················\ ·· 208 Displaying and maintainin g stack configuration ··················\ ··················\ ··················\ ··················\ ········ ··················\ ···· 208