HP 10500 series manuals
10500 series
Table of contents
10500 series
Table of contents
10500 series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Ethernet interface configuration commands
- default
- display interface
- duplex
- flow-interval
- jumboframe enable
- loopback internal
- shutdown
- speed
- display port-group manual
- group-member
- port-group manual
- Loopback and null interface configuration commands
- display interface loopback
- display interface null
- interface loopback
- interface null
- reset counters interface null
- VLAN configuration commands
- display interface vlan-interface
- display vlan
- interface vlan-interface
- name
- reset counters interface vlan-interface
- vlan
- Port-based VLAN configuration commands
- port
- port access vlan
- port hybrid pvid
- port hybrid vlan
- port link-type
- port trunk permit vlan
- port trunk pvid
- MAC-based VLAN configuration commands
- display mac-vlan interface
- mac-vlan enable
- mac-vlan mac-address
- MAC address table commands
- display mac-address aging-time
- display mac-address mac-learning
- display mac-address statistics
- mac-address (interface view)
- mac-address (system view)
- mac-address mac-learning disable
- mac-address max-mac-count
- mac-address timer
- Ethernet link aggregation configuration commands
- display link-aggregation load-sharing mode
- display link-aggregation member-port
- display link-aggregation summary
- display link-aggregation verbose
- enable snmp trap updown
- interface bridge-aggregation
- lacp period short
- link-aggregation load-sharing mode
- link-aggregation port-priority
- port link-aggregation group
- reset lacp statistics
- Layer 2 forwarding configuration commands
- reset mac-forwarding statistics
- Fast Layer 2 forwarding configuration commands
- mac-fast-forwarding
- PPPoE server commands
- pppoe-server abnormal-offline-count threshold
- pppoe-server bind
- pppoe-server log-information off
- pppoe-server max-sessions remote-mac
- pppoe-server normal-offline-percent threshold
- reset pppoe-server
- FPGA fast forwarding configuration commands
- LLDP configuration commands
- display lldp neighbor-information
- display lldp statistics
- display lldp status
- display lldp tlv-config
- lldp admin-status
- lldp check-change-interval
- lldp compliance cdp
- lldp enable
- lldp fast-count
- lldp management-address-format string
- lldp management-address-tlv
- lldp timer notification-interval
- lldp timer tx-delay
- lldp timer tx-interval
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
10500 series
Table of contents
10500 series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Using the CLI
- Using the undo form of a command
- Entering system view from user view
- Accessing the CLI online help
- Entering a command
- Configuring and using hotkeys
- Enabling redisplaying entered-but-not-submitted commands
- Understanding command-line error messages
- Viewing history commands
- Filtering the output from a display command
- Configuring user privilege and command levels
- Switching the user privilege level
- Changing the level of a command
- Displaying and maintaining CLI
- Login overview
- User interface assignment
- Logging in to the CLI
- Configuring console login control settings
- Disabling authentication for console login
- Configuring scheme authentication for console login
- Configuring common console user interface settings (optional)
- Logging in through Telnet
- Disabling authentication for Telnet login
- Configuring password authentication for Telnet login
- Configuring scheme authentication for Telnet login
- Configuring common VTY user interface settings (optional)
- Using the device to log in to a Telnet server
- Logging in through SSH
- Configuring the SSH server on the device
- Using the device to log in to an SSH server
- Displaying and maintaining CLI login
- Logging in to the Web interface
- Configuring HTTPS login
- Displaying and maintaining Web login
- HTTP login configuration example
- HTTPS login configuration example
- Logging in through SNMP
- Configuring SNMPv1 or SNMPv2c settings
- NMS login example
- Controlling user logins
- Configuring source/destination IP-based Telnet login control
- Telnet login control configuration example
- Configuring source IP-based SNMP login control
- SNMP login control configuration example
- Configuring source IP-based Web login control
- Configuring FTP
- Managing directories on the FTP server
- Working with the files on the FTP server
- Switching to another user account
- Using the device as an FTP server
- Configuring authentication and authorization
- FTP server configuration example
- Displaying and maintaining FTP
- Configuring TFTP
- Displaying and maintaining the TFTP client
- Managing the file system
- Displaying file information
- Deleting/restoring a file
- Displaying the current working directory
- Managing storage media
- File system management examples
- Managing configuration files
- Configuration file content organization and format
- Saving configuration by using different methods
- Using automatic configuration backup after a software upgrade
- Restoring the next-startup configuration file from a TFTP server
- Displaying and maintaining configuration files
- Upgrading software
- Upgrading BootWare
- Basic concepts
- Patch installation task list
- Installing a patch step by step
- Uninstalling a patch step by step
- Displaying and maintaining software upgrade
- Upgrading the system software
- Installing patches
- Dealing with password loss
- Examining the state of password recovery capability
- Dealing with console login password loss when password recovery capability is enabled
- Dealing with user privilege level password loss when password recovery capability is enabled
- Dealing with password loss when password recovery capability is disabled
- Managing licenses
- Managing the device
- Changing the system time
- configuration example
- Configuration procedure
- Enabling displaying the copyright statement
- Banner input methods
- Configuring the maximum number of concurrent users
- Rebooting the device
- Scheduling jobs
- Scheduling a job in the non-modular approach
- Setting the port status detection timer
- Configuring the alarm resend function
- Clearing unused 16-bit interface indexes
- Displaying and maintaining device management
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring MCE
- MPLS L3VPN concepts
- How MCE works
- Configuring VPN instances on an MCE device
- Configuring routing on an MCE device
- Configuration prerequisites
- Configuring routing between an MCE and a PE
- Displaying and maintaining MCE
- Using BGP to advertise VPN routes to the PE
- Configuring IPv6 MCE
- Configuring route attributes for a VPN instance
- Configuring routing on an IPv6 MCE device
- Configuring routing between an IPv6 MCE and a PE
- Displaying information about IPv6 MCE
- Configuring basic MPLS
- MPLS network architecture
- LSP establishment
- MPLS forwarding
- Protocols and standards
- Configuring MPLS MTU
- Configuring TTL propagation
- Enabling sending MPLS TTL-expired messages
- Displaying and maintaining MPLS
- Configuring a static LSP
- Displaying static LSPs
- Configuring LDP
- LDP operation
- Label distribution and control
- Protocols
- Enabling LDP
- Configuring LDP session parameters
- Configuring LDP backoff
- Configuring LDP MD5 authentication
- Configuring the LDP label distribution control mode
- Configuring a label acceptance policy
- Configuring LDP loop detection
- Configuring LDP session protection
- Configuring LDP GR
- LDP configuration examples
- Label acceptance control configuration example
- configuration considerations
- Label advertisement control configuration example
- Configuring tunnel policies
- Displaying tunnel information
- Configuring MPLS L3VPN
- MPLS L3VPN route advertisement
- MPLS L3VPN packet forwarding
- MPLS L3VPN networking schemes
- Inter-AS VPN
- Carrier's carrier
- Nested VPN
- HoVPN
- OSPF VPN extension
- BGP AS number substitution
- MPLS L3VPN configuration task list
- Configuring routing between a PE and a CE
- Configuring routing between PEs
- Configuring BGP VPNv4 route control
- Configuring inter-AS VPN
- Configuring inter-AS option C
- Configuring nested VPN
- Configuring HoVPN
- Specifying the VPN label processing mode on the egress PE
- Displaying and maintaining MPLS L3VPN
- MPLS L3VPN configuration examples
- Configuring an MPLS L3VPN over a GRE tunnel
- configure a gre tunnel
- Configuring MPLS L3VPN inter-AS option A
- Configuring MPLS L3VPN inter-AS option B
- Configuring MPLS L3VPN inter-AS option C
- Configuring MPLS L3VPN carrier's carrier
- Configuring BGP AS number substitution
- Configuring IPv6 MPLS L3VPN
- IPv6 MPLS L3VPN packet forwarding
- IPv6 MPLS L3VPN network schemes and functions
- Configuring VPN instances
- Configuring BGP VPNv6 route control
- Configuring inter-AS IPv6 VPN
- Configuring inter-AS IPv6 VPN option A
- Displaying and maintaining IPv6 MPLS L3VPN
- IPv6 MPLS L3VPN configuration examples
- Configuring an IPv6 MPLS L3VPN over a GRE tunnel
- Configuring IPv6 MPLS L3VPN inter-AS option A
- Configuring IPv6 MPLS L3VPN inter-AS option C
- Configuring IPv6 MPLS L3VPN carrier's carrier
- Configuring MPLS L2VPN
- MPLS L2VPN connection establishment
- Ethernet over MPLS
- Multi-segment PW
- MPLS L2VPN configuration task list
- Enabling L2VPN
- Configuring a service instance on a Layer 2 Ethernet interface
- Configuring a PW
- Binding an AC to a cross-connect
- Configure static PW redundancy
- Displaying and maintaining MPLS L2VPN
- Configuring an LDP PW (VLAN mode)
- Configuring an LDP PW (flexible mode)
- Configuring LDP PW redundancy
- Configuring an intra-domain multi-segment PW
- Configuring an inter-domain multi-segment PW
- Configuring VPLS
- VPLS implementation
- PE dual homing
- VPLS configuration task list
- Configuring a VSI
- Configuring an LDP PW
- Configuring PE dual homing
- Configuring a dual-homed PE with redundant LDP PWs
- VPLS configuration examples
- LDP PW configuration example
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring MCE
- MPLS L3VPN concepts
- Multi-VPN-instance CE
- Using MCE in tunneling applications
- Configuring routing on an MCE
- Route exchange between an MCE and a PE
- Associating a VPN instance with an interface
- Configuring routing between MCE and PE
- Resetting BGP connections
- Displaying and maintaining MCE
- MCE configuration examples
- Using BGP to advertise VPN routes to the PE
- Using tunnels to advertise VPN routes
- Configuring IPv6 MCE
- Configuring route attributes for a VPN instance
- Configuring routing on an IPv6 MCE
- Configuring routing between IPv6 MCE and PE
- Resetting IPv6 BGP connections
- IPv6 MCE configuration example
- Configuring basic MPLS
- MPLS network structure
- label distribution and management
- MPLS forwarding
- Protocols
- Enabling the MPLS function
- Configuring a static LSP
- Establishing dynamic LSPs through LDP
- Configuring remote LDP session parameters
- Configuring PHP
- Configuring the label distribution control mode
- Configuring LDP loop detection
- Configuring LDP MD5 authentication
- Configuring a DSCP for outgoing LDP packets
- Maintaining LDP sessions
- Configuring a TTL processing mode for an LSR
- Sending back ICMP TTL exceeded messages for MPLS TTL expired packets
- Configuring LDP GR
- Configuring LDP NSR
- Configuring MPLS LSP ping
- Configuring periodic LSP tracert
- Enabling MPLS trap
- Displaying MPLS LDP operation
- Clearing MPLS statistics
- configuration considerations
- Configuring LDP to establish LSPs dynamically
- Configuring BFD for LSPs
- Configuring MPLS TE
- Basic concepts
- CR-LSP
- RSVP-TE
- Traffic forwarding
- CR-LSP backup
- PS for an MPLS TE tunnel
- MPLS TE configuration task list
- Creating an MPLS TE tunnel over a static CR-LSP
- Configuring an MPLS TE tunnel with a dynamic signaling protocol
- Configuration procedure
- Configuring RSVP-TE advanced features
- Configuring RSVP state timers
- Configuring the RSVP hello extension
- Configuring RSVP authentication
- Tuning CR-LSP setup
- Configuring CR-LSP reoptimization
- Tuning MPLS TE tunnel setup
- Assigning priorities to a tunnel
- Forwarding traffic along MPLS TE tunnels through automatic route advertisement
- Configuring traffic forwarding tuning parameters
- Specifying the link metric type for tunnel path calculation
- Configuring FRR
- Configuring a bypass tunnel on its PLR
- Configuring node protection
- Inspecting an MPLS TE tunnel
- Configuring periodic LSP tracert for an MPLS TE tunnel
- Configuring protection switching
- Configuring MPLS TE examples
- MPLS TE using RSVP-TE configuration example
- RSVP-TE GR configuration example
- MPLS RSVP-TE and BFD cooperation configuration example
- CR-LSP backup configuration example
- FRR configuration example
- MPLS TE in MPLS L3VPN configuration example
- Troubleshooting MPLS TE
- Configuring VPLS
- MAC address learning and flooding
- VPLS loop avoidance
- VPLS packet encapsulation
- VPLS configuration task list
- Enabling L2VPN and MPLS L2VPN
- Configuring BGP VPLS
- Configuring the BGP extension
- Binding a service instance with a VPLS instance
- Displaying and maintaining VPLS
- VPLS configuration examples
- Binding service instances with VPLS instances
- Configuring PW redundancy for H-VPLS access
- Configuring BFD for the primary link in an H-VPLS network
- Troubleshooting VPLS
- Configuring MPLS L2VPN
- MPLS L2VPN network models
- Implementation of MPLS L2VPN
- VC encapsulations types
- Configuring basic MPLS L2VPN
- Configuring VLAN encapsulation
- Configuring SVC MPLS L2VPN
- Configuring the remote peer
- Inspecting VCs through MPLS LSP ping
- Creating and configuring MPLS L2VPN
- Resetting L2VPN BGP sessions
- MPLS L2VPN configuration examples
- Configuring Martini MPLS L2VPN
- Configuring Kompella MPLS L2VPN
- Configuring a VC for a service instance
- Troubleshooting MPLS L2VPN
- Configuring MPLS L3VPN
- MPLS L3VPN packet forwarding
- MPLS L3VPN networking schemes
- MPLS L3VPN routing information advertisement
- Inter-AS VPN
- Carrier's carrier
- Nested VPN
- HoVPN
- OSPF VPN extension
- BGP AS number substitution and SoO
- MPLS L3VPN configuration task list
- Configuring VPN instances
- Configuring routing between PE and CE
- Configuring routing between PEs
- Configuring inter-AS VPN
- Configuring inter-AS option B
- Configuring inter-AS option C
- Configuring nested VPN
- Configuration restrictions and guidelines
- Configuring HoVPN
- Configuring a loopback interface
- Configuring BGP AS number substitution and SoO
- MPLS L3VPN configuration examples
- Configuring MPLS L3VPNs using IBGP between PE and CE
- Configuring a hub-spoke network
- Configuring inter-AS option A
- Configuring carrier's carrier
- Configuring OSPF sham links
- Configuring BGP AS number substitution
- Configuring IPv6 MPLS L3VPN
- IPv6 MPLS L3VPN packet forwarding
- IPv6 MPLS L3VPN network schemes and functions
- Configuring route related attributes for a VPN instance
- Configuring routing features for the BGP-VPNv6 subaddress family
- Configuring inter-AS IPv6 VPN
- Configuring inter-AS IPv6 VPN option A
- IPv6 MPLS L3VPN configuration examples
- Configuring IPv6 MPLS L3VPNs
- Configuring inter-AS IPv6 VPN option C
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring AAA
- RADIUS
- HWTACACS
- Domain-based user management
- AAA for MPLS L3VPNs
- RADIUS attributes
- FIPS compliance
- Configuring AAA schemes
- Configuring RADIUS schemes
- Configuring HWTACACS schemes
- Configuring AAA methods for ISP domains
- Configuration prerequisites
- Configuring ISP domain attributes
- Configuring authentication methods for an ISP domain
- Configuring authorization methods for an ISP domain
- Configuring accounting methods for an ISP domain
- Tearing down user connections
- Configuring a NAS ID-VLAN binding
- AAA configuration examples
- Local authentication and authorization for Telnet users
- Authentication/authorization for SSH/Telnet users by a RADIUS server
- AAA for portal users by a RADIUS server
- AAA for 802.1X users by a RADIUS server
- Level switching authentication for Telnet users by an HWTACACS server
- Troubleshooting AAA
- Troubleshooting HWTACACS
- X overview
- X-related protocols
- EAP over RADIUS
- Initiating 802.1X authentication
- X authentication procedures
- EAP relay
- EAP termination
- Configuring 802.1X
- Enabling 802.1X
- Setting the port authorization state
- Specifying an access control method
- Setting the 802.1X authentication timeout timers
- Configuration guidelines
- Configuring the authentication trigger function
- Specifying a mandatory authentication domain on a port
- Enabling the periodic online user re-authentication function
- Configuring an 802.1X guest VLAN
- Displaying and maintaining 802.1X
- Configuration procedure
- Verifying the configuration
- X guest VLAN and VLAN assignment configuration example
- Configuring EAD fast deployment
- Configuring the redirect URL
- EAD fast deployment configuration example
- Troubleshooting EAD fast deployment
- Configuring MAC authentication
- MAC authentication timers
- Critical VLAN
- Configuring MAC authentication globally
- Specifying a MAC authentication domain
- Configuring a MAC authentication critical VLAN
- Configuring MAC authentication delay
- MAC authentication configuration examples
- RADIUS-based MAC authentication configuration example
- ACL assignment configuration example
- Configuring portal authentication
- Portal authentication modes
- Portal support for EAP
- Portal authentication across VPNs
- Specifying the portal server
- Controlling access of portal users
- Configuring an authentication source subnet
- Specifying a portal authentication domain
- Specifying the NAS-Port-ID for an interface
- Specifying a source IP address for outgoing portal packets
- Configuring portal detection functions
- Configuring portal user information synchronization
- Logging off portal users
- Portal configuration examples
- configure the switch
- Configuring re-DHCP portal authentication
- Configuring cross-subnet portal authentication
- Configuring direct portal authentication with extended functions
- Configuring re-DHCP portal authentication with extended functions
- Configuring cross-subnet portal authentication with extended functions
- Configuring portal server detection and portal user information synchronization
- configuring the switch
- Cross-subnet portal authentication across VPNs
- Troubleshooting portal
- Configuring port security
- Working with guest VLAN and Auth-Fail VLAN
- Enabling port security
- Setting the port security mode
- Configuring NTK
- Enabling port security traps
- Ignoring authorization information from the server
- Port security configuration examples
- Configuring the userLoginWithOUI mode
- Configuring the macAddressElseUserLoginSecure mode
- Troubleshooting port security
- Cannot set the port security mode
- Configuring a user profile
- Applying a QoS policy
- Displaying and maintaining user profiles
- Managing public keys
- Creating a local asymmetric key pair
- Destroying a local asymmetric key pair
- Specifying the peer public key on the local device
- Displaying public keys
- Importing a public key from a public key file
- Configuring SSH
- SSH authentication
- Generating local DSA or RSA key pairs
- Enabling the SFTP server function
- Configuring a client's host public key
- Configuring an SSH user
- Setting the SSH management parameters
- Setting the DSCP value for packets sent by the SSH server
- Stelnet client configuration task list
- Establishing a connection to an Stelnet server
- Setting the DSCP value for packets sent by the Stelnet client
- Configuring the device as an SFTP client
- Working with SFTP directories
- Working with SFTP files
- Terminating the connection with the SFTP server
- Transferring files with an SCP server
- Stelnet configuration examples
- When the switch acts as an Stelnet server for publickey authentication
- When the switch acts as an Stelnet client for password authentication
- When the switch acts as an Stelnet client for publickey authentication
- SFTP configuration examples
- When the switch acts as an SFTP client for publickey authentication
- ssh connection
- Configuring TCP attack protection
- Configuring IP source guard
- Dynamic IPv4 source guard entries
- Configuring the IPv4 source guard function
- Configuring a static IPv4 source guard entry
- Setting the maximum number of IPv4 source guard entries allowed on a port
- Configuring a static IPv6 source guard entry
- Setting the maximum number of IPv6 source guard entries allowed on a port
- IP source guard configuration examples
- Dynamic IPv4 source guard using DHCP snooping
- Dynamic IPv4 source guard using DHCP relay
- Static IPv6 source guard entry configuration
- Global static IP source guard configuration
- Troubleshooting IP source guard
- Configuring ARP attack protection
- Configuring unresolvable IP attack protection
- Unresolvable IP attack protection configuration example
- Configuring ARP packet rate limit
- Displaying and maintaining source MAC-based ARP attack detection
- Configuring ARP active acknowledgement
- Configuring ARP detection
- Configuring ARP packet validity check
- Configuring ARP restricted forwarding
- User validity check and ARP packet validity check configuration example
- ARP restricted forwarding configuration example
- Configuring ARP automatic scanning and fixed ARP
- Configuring ND attack defense
- Enabling source MAC consistency check for ND packets
- Configuring URPF
- Network application
- URPF configuration example
- Configuring MFF
- Basic concepts
- MFF work flow
- Displaying and maintaining MFF
- Configuring auto-mode MFF in a ring network
- Configuring manual-mode MFF in a tree network
- Configuring manual-mode MFF in a ring network
- Configuring password control
- Enabling password control
- Setting global password control parameters
- Setting user group password control parameters
- Setting local user password control parameters
- Setting super password control parameters
- Password control configuration example
- Configuring FIPS
- Displaying and maintaining FIPS
- Configuring IPsec
- Protocols and standards
- Configuring ACLs
- Configuring an IPsec transform set
- Configuring an IPsec policy
- Applying an IPsec policy group to an interface
- Enabling ACL checking of de-encapsulated IPsec packets
- Configuring packet information pre-extraction
- Displaying and maintaining IPsec
- Configuring IKE
- IKE functions
- Relationship between IKE and IPsec
- Configuring a name for the local security gateway
- Configuring an IKE peer
- Setting keepalive timers
- Configuring a DPD detector
- Displaying and maintaining IKE
- Troubleshooting IKE
- Failing to establish an IPsec tunnel
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring ARP
- ARP table
- Configuring a static ARP entry
- Configuring the maximum number of dynamic ARP entries for an interface
- Configuring ARP quick update
- Configuring multicast ARP
- Displaying and maintaining ARP
- ARP configuration examples
- Multicast ARP configuration example (in standalone mode)
- Multicast ARP configuration example (in IRF mode)
- Configuring gratuitous ARP
- Configuration procedure
- Configuring proxy ARP
- Enabling common proxy ARP
- Displaying and maintaining proxy ARP
- Local proxy ARP configuration example in case of port isolation
- Local proxy ARP configuration example in super VLAN
- Local proxy ARP configuration example in isolate-user-VLAN
- Configuring ARP snooping
- Configuring IP addressing
- Special IP addresses
- Assigning an IP address to an interface
- Displaying and maintaining IP addressing
- DHCP overview
- Dynamic IP address allocation process
- DHCP message format
- DHCP options
- Protocols and standards
- Configuring the DHCP server
- IP address allocation sequence
- DHCP server configuration task list
- Creating a DHCP address pool
- Configuring dynamic address allocation for an extended address pool
- Configuring a domain name suffix for the client
- Configuring BIMS server information for the client
- Configuring the TFTP server and bootfile name for the client
- Specifying a server's IP address for the DHCP client
- Enabling DHCP
- Configuration guidelines
- Configuring the DHCP server security functions
- Enabling client offline detection
- Specifying the threshold for sending trap messages
- DHCP server configuration examples
- Dynamic IP address assignment configuration example
- Self-defined option configuration example
- Troubleshooting DHCP server configuration
- Configuring the DHCP relay agent
- DHCP relay agent support for Option 82
- DHCP relay agent configuration task list
- Correlating a DHCP server group with a relay agent interface
- Configuring the DHCP relay agent security functions
- Enabling unauthorized DHCP server detection
- Configuring the DHCP relay agent to handle Option 82
- Setting the DSCP value for DHCP packets
- DHCP relay agent configuration examples
- DHCP relay agent Option 82 support configuration example
- Troubleshooting DHCP relay agent configuration
- Configuring DHCP client
- Displaying and maintaining the DHCP client
- Verifying the configuration
- Configuring DHCP snooping
- Application environment of trusted ports
- DHCP snooping support for Option 82
- DHCP snooping configuration task list
- Configuring DHCP snooping entries backup
- Enabling DHCP starvation attack protection
- Enabling DHCP-REQUEST message attack protection
- Displaying and maintaining DHCP snooping
- DHCP snooping configuration examples
- Configuring IPv4 DNS
- Configuring the IPv4 DNS client
- Configuring dynamic domain name resolution
- Displaying and maintaining IPv4 DNS
- Dynamic domain name resolution configuration example
- Troubleshooting IPv4 DNS configuration
- Configuring IP forwarding basics
- Configuring IP performance optimization
- Configuration example
- Configuring the TCP send/receive buffer size
- Configuring TCP timers
- Disadvantages of sending ICMP error packets
- Configuring UDP helper
- Displaying and maintaining UDP helper
- Configuring IPv6 basics
- IPv6 addresses
- IPv6 neighbor discovery protocol
- IPv6 path MTU discovery
- Configuring basic IPv6 functions
- manual configuration
- Configuring an IPv6 link-local address
- Configure an IPv6 anycast address
- Configuring IPv6 ND
- Setting the age timer for ND entries in stale state
- Configuring the maximum number of attempts to send an NS message for DAD
- Configuring path MTU discovery
- Configuring ICMPv6 packet sending
- Enabling sending ICMPv6 time exceeded messages
- Displaying and maintaining IPv6 basics configuration
- IPv6 basics configuration example
- Troubleshooting IPv6 basics configuration
- DHCPv6 overview
- IAID
- Assignment involving four messages
- Stateless DHCPv6 configuration
- Configuring DHCPv6 relay agent
- Configuration prerequisites
- Displaying and maintaining the DHCPv6 relay agent
- Configuring DHCPv6 client
- Stateless DHCPv6 configuration example
- Configuring IPv6 DNS
- Setting the DSCP value for IPv6 DNS packets
- IPv6 DNS configuration examples
- Configuring tunneling
- IPv4 over IPv4 tunneling
- IPv4 over IPv6 tunneling
- IPv6 over IPv6 tunneling
- Tunneling configuration task list
- Configuring an IPv6 manual tunnel
- Configuring a 6to4 tunnel
- configuration considerations
- Configuring an ISATAP tunnel
- Configuring an IPv4 over IPv4 tunnel
- Configuring an IPv4 over IPv6 tunnel
- Configuring an IPv6 over IPv6 tunnel
- Displaying and maintaining tunneling configuration
- Configuring GRE
- GRE encapsulation and de-encapsulation processes
- Configuring a GRE over IPv4 tunnel
- Configuring a GRE over IPv6 tunnel
- Displaying and maintaining GRE
- GRE over IPv6 tunnel configuration example
- verify the configuration
- Troubleshooting GRE
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring basic MPLS
- MPLS network architecture
- LSP establishment
- MPLS forwarding
- Protocols and standards
- MPLS configuration task list
- Setting MPLS MTU
- Specifying the label type advertised by egress
- Enabling sending MPLS TTL-expired messages
- Configuring a static LSP
- Configuration procedure
- Configuration restrictions and guidelines
- Verifying the configuration
- Configuring LDP
- LDP operation
- Label distribution and control
- LDP-IGP synchronization
- LDP over MPLS TE
- Protocols
- Enabling LDP
- Configuring Hello parameters
- Restrictions and guidelines
- Configuring LDP backoff
- Configuring LDP to redistribute BGP unicast routes
- Configuring the LDP label distribution control mode
- Configuring a label acceptance policy
- Configuring LDP loop detection
- Configuring LDP session protection
- Configuring LDP GR
- Configuring LDP IS-IS synchronization
- Resetting LDP sessions
- IPv4 LDP configuration examples
- Label acceptance control configuration example
- Label advertisement control configuration example
- LDP FRR configuration example
- IPv6 LDP configuration examples
- IPv6 label acceptance control configuration example
- IPv6 label advertisement control configuration example
- Configuring MPLS TE
- CRLSP establishment using PCE path calculation
- Traffic forwarding
- Make-before-break
- Route pinning
- DiffServ-aware TE
- Bidirectional MPLS TE tunnel
- Enabling MPLS TE
- Configuring DS-TE
- Configuring an MPLS TE tunnel to use a dynamic CRLSP
- Configuring MPLS TE attributes for a link
- Configuring MPLS TE tunnel constraints
- Establishing an MPLS TE tunnel by using RSVP-TE
- Controlling MPLS TE tunnel setup
- Configuring an MPLS TE tunnel to use a CRLSP calculated by PCEs
- Establishing a CRLSP by using the path calculated by PCEs
- Configuring traffic forwarding
- Configuring a bidirectional MPLS TE tunnel
- Configuring CRLSP backup
- Configuring MPLS TE FRR
- Configuring node fault detection
- Enabling SNMP notifications for MPLS TE
- MPLS TE configuration examples
- Establishing an MPLS TE tunnel with RSVP-TE
- Establishing an inter-AS MPLS TE tunnel with RSVP-TE
- Establishing an inter-area MPLS TE tunnel over a CRLSP calculated by PCEs
- Bidirectional MPLS TE tunnel configuration example
- CRLSP backup configuration example
- Manual bypass tunnel for FRR configuration example
- Auto FRR configuration example
- IETF DS-TE configuration example
- Troubleshooting MPLS TE
- Configuring a static CRLSP
- Configuring RSVP
- CRLSP setup procedure
- RSVP authentication
- Configuring RSVP refresh
- Configuring RSVP authentication
- Setting a DSCP value for outgoing RSVP packets
- Displaying and maintaining RSVP
- RSVP GR configuration example
- Configuring tunnel policies
- Tunnel policy configuration examples
- Configuring MPLS L3VPN
- MPLS L3VPN route advertisement
- MPLS L3VPN packet forwarding
- MPLS L3VPN networking schemes
- Inter-AS VPN
- OSPF VPN extension
- BGP AS number substitution and SoO attribute
- MPLS L3VPN FRR
- ECMP VPN route redistribution
- Configuring basic MPLS L3VPN
- Configuring routing between a PE and a CE
- Configuring routing between PEs
- Configuring inter-AS VPN
- Configuring inter-AS option B
- Configuring inter-AS option C
- Configuring an OSPF sham link
- Configuring a loopback interface
- Specifying the VPN label processing mode on the egress PE
- Configuring MPLS L3VPN FRR
- Configuring BGP RT filtering
- Procedure
- Enabling ECMP VPN route redistribution
- Enabling SNMP notifications for MPLS L3VPN
- Displaying and maintaining MPLS L3VPN
- MPLS L3VPN configuration examples
- Configuring a hub-spoke network
- Configuring MPLS L3VPN inter-AS option A
- Configuring MPLS L3VPN inter-AS option B
- Configuring MPLS L3VPN inter-AS option C
- Configuring BGP AS number substitution
- Configuring BGP AS number substitution and SoO attribute
- Configuring MPLS L3VPN FRR through VPNv4 route backup for a VPNv4 route
- Configuring MPLS L3VPN FRR through VPNv4 route backup for an IPv4 route
- Configuring MPLS L3VPN FRR through IPv4 route backup for a VPNv4 route
- Configuring IPv6 MPLS L3VPN
- IPv6 MPLS L3VPN routing information advertisement
- Configuring BGP VPNv6 route control
- Configuring inter-AS IPv6 VPN
- Configuring inter-AS IPv6 VPN option A
- Configuring an OSPFv3 sham link
- Creating a sham link
- Enabling logging for BGP route flapping
- IPv6 MPLS L3VPN configuration examples
- Configuring IPv6 MPLS L3VPN inter-AS option A
- Configuring IPv6 MPLS L3VPN inter-AS option C
- Configuring MPLS L2VPN
- Remote connection model
- PW types
- Control word
- Multi-segment PW
- VCCV
- Restrictions and guidelines for MPLS L2VPN
- Enabling L2VPN
- Configuring a PW
- Configuring an LDP PW
- Configuring a remote CCC connection
- Binding an Ethernet service instance to a cross-connect
- Configuring PW redundancy
- Configuring LDP PW redundancy
- MPLS L2VPN configuration examples
- Configuring a BGP PW
- Configuring an intra-domain multi-segment PW
- Configuring an inter-domain multi-segment PW
- Configuring VPLS
- VPLS implementation
- H-VPLS
- Restrictions and guidelines for VPLS
- Configuring a VSI
- Configuring a BGP auto-discovery LDP PW
- Binding an Ethernet service instance to a VSI
- Configuring UPE dual homing
- Configuring MAC address learning
- VPLS configuration examples
- LDP PW configuration example
- BGP PW configuration example
- BGP auto-discovery LDP PW configuration example
- H-VPLS using MPLS access configuration example
- Ethernet service instance and VSI binding configuration example
- H-VPLS UPE dual homing configuration example
- Configuring MPLS OAM
- Configuring MPLS ping for LSPs
- Configuring MCE
- MCE overview
- MCE configuration task list
- Creating a VPN instance
- Configuring routing on an MCE
- Configuring routing between an MCE and a VPN site
- Configuring routing between an MCE and a PE
- Displaying and maintaining MCE
- Configuring the MCE that uses EBGP to advertise VPN routes to the PE
- Configuring IPv6 MCE
- Configuring VPN instances
- Configuring route related attributes for a VPN instance
- Displaying and maintaining IPv6 MCE
- IPv6 MCE configuration example
- Document conventions and icons
- Network topology icons
- Support and other resources
- Websites
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- IRF overview
- Network topologies
- Operating mode
- IRF member ID
- IRF physical port
- IRF merge
- IRF multi-active detection
- LACP MAD
- Configuring IRF
- IRF link and MPU redundancy
- Multichassis link aggregation
- Setup and configuration task list
- Preconfiguring IRF member devices in standalone mode
- Binding physical ports to IRF ports
- Connecting physical IRF ports
- Accessing the IRF fabric
- Changing the member ID of a device
- Adding physical ports to an IRF port
- Enabling IRF auto merge
- Configuring IRF link load sharing mode
- Configuring IRF bridge MAC persistence
- Enabling software auto-update for system software image synchronization
- Setting the IRF link down report delay
- Displaying and maintaining an IRF fabric
- BFD MAD-enabled IRF configuration example for a two-chassis IRF fabric
- Configuration example for restoring standalone mode
- Four-chassis IRF fabric configuration example
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Using the CLI
- Entering system view from user view
- Using the undo form of a command
- Entering a command
- Abbreviating commands
- Configuring and using command hotkeys
- Enabling redisplaying entered-but-not-submitted commands
- Using the command history function
- Pausing between screens of output
- Filtering the output from a display command
- Saving the output from a display command to a file
- Viewing and managing the output from a display command effectively
- Login overview
- Logging in through the console port for the first device access
- Logging in to the CLI
- Login authentication modes
- Logging in through the console port locally
- Configuring password authentication for console login
- Configuring scheme authentication for console login
- Logging in through Telnet
- configuring password authentication for telnet login
- configuring scheme authentication for telnet login
- Using the device to log in to a Telnet server
- Logging in through SSH
- Using the device to log in to an SSH server
- Displaying and maintaining CLI login
- Accessing the device through SNMP
- Configuring SNMPv1 or SNMPv2c access
- Controlling user access
- Configuration example
- Configuring command authorization
- Configuring command accounting
- Configuration procedure
- Configuring RBAC
- Assigning user roles
- Creating user roles
- Configuring feature groups
- Changing the interface policy of a user role
- Assigning user roles to local AAA authentication users
- Configuring temporary user role authorization
- Configuring user role authentication
- Obtaining temporary user role authorization
- RBAC configuration examples
- RBAC configuration example for RADIUS authentication users
- RBAC configuration example for HWTACACS authentication users
- Troubleshooting RBAC
- Login attempts by RADIUS users always fail
- Configuring FTP
- Configuring authentication and authorization
- Manually releasing FTP connections
- FTP server configuration example in IRF mode
- Using the device as an FTP client
- Managing directories on the FTP server
- Changing to another user account
- Terminating the FTP connection
- FTP client configuration example in IRF mode
- Configuring TFTP
- Configuring the device as an IPv6 TFTP client
- Managing the file system
- Managing files
- Copying a file
- Deleting files from the recycle bin
- Displaying directory information
- Managing storage media
- Setting the operation mode for files and folders
- Managing configuration files
- Configuration file formats
- Startup configuration file selection
- Enabling configuration encryption
- Specifying a next-startup configuration file
- Backing up the main next-startup configuration file to a TFTP server
- Deleting a next-startup configuration file
- Upgrading software
- Comware image redundancy and loading procedure
- Upgrade methods
- Preparing for the upgrade
- Specifying the startup image file and completing the upgrade (in standalone mode)
- Specifying the startup image file and completing the upgrade (in IRF mode)
- Restoring or downgrading the BootWare image
- Displaying and maintaining software image settings
- ISSU overview
- ISSU methods for a compatible version
- ISSU method for an incompatible version
- ISSU prerequisites
- Performing an ISSU by using issu series commands
- Performing an ISSU for a single-MPU device
- Performing an ISSU in IRF mode
- Performing an ISSU for a multichassis IRF fabric
- Performing an ISSU for a dual-MPU single-chassis IRF fabric
- Performing an ISSU for a single-MPU single-chassis IRF fabric
- Displaying and maintaining ISSU
- ISSU examples for using issu series commands in standalone mode
- Feature upgrade to an incompatible version
- Feature rollback example
- ISSU examples for using issu series commands in IRF mode
- Performing an ISSU by using install series commands
- Uninstalling feature or patch images
- Rolling back the software configuration
- Aborting a software activate/deactivate operation
- ISSU examples for using install series commands in standalone mode
- ISSU examples for using install series commands in IRF mode
- Managing the device
- Specifying the system time source
- Configuring banners
- Rebooting the device
- Scheduling a device reboot
- Schedule configuration example
- Disabling password recovery capability
- Setting the port status detection timer
- Setting memory usage thresholds
- Configuring the temperature alarm thresholds
- Specifying a traffic load sharing mode for an LPU
- Specifying an operating mode for an LPU
- Configuration guidelines
- Configuring the asset profile of a physical component
- Verifying and diagnosing transceiver modules
- Disabling alarm traps for transceiver modules
- Configuring Tcl
- Configuring MDCs
- Default MDC and non-default MDCs
- Creating an MDC
- Assigning physical interfaces to an MDC
- Specifying a CPU weight for an MDC
- Specifying a memory space percentage for an MDC
- Displaying and maintaining MDCs
- Using automatic configuration
- Interface selection process
- Automatic-configuration parameter acquisition process
- Deploying and configuring servers for automatic configuration
- DHCP server configuration guidelines
- Support and other resources
- Conventions
- Index
10500 series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Configuring AAA
- RADIUS
- HWTACACS
- LDAP
- AAA implementation on the device
- AAA for MPLS L3VPNs
- RADIUS attributes
- FIPS compliance
- Configuring AAA schemes
- configuring user group attributes
- Configuring RADIUS schemes
- Configuring HWTACACS schemes
- Configuring LDAP schemes
- Configuring AAA methods for ISP domains
- Creating an ISP domain
- Configuring authentication methods for an ISP domain
- Configuring authorization methods for an ISP domain
- Configuring accounting methods for an ISP domain
- Enabling the session-control feature
- Configuring the RADIUS DAE server feature
- Configuring a NAS-ID profile
- Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users
- Authentication and authorization for SSH users by a RADIUS server
- Authentication for SSH users by an LDAP server
- AAA for 802.1X users by a RADIUS server
- Troubleshooting RADIUS
- RADIUS packet delivery failure
- Troubleshooting LDAP
- X overview
- X-related protocols
- EAP over RADIUS
- X authentication initiation
- X authentication procedures
- EAP relay
- EAP termination
- Configuring 802.1X
- Guest VLAN
- Auth-Fail VLAN
- Critical VLAN
- Using 802.1X authentication with other features
- Redirect URL assignment
- Configuration prerequisites
- Enabling 802.1X
- Enabling EAP relay or EAP termination
- Specifying an access control method
- Setting the 802.1X authentication timeout timers
- Configuration guidelines
- Configuration procedure
- Enabling the periodic online user reauthentication feature
- Manually reauthenticating all online 802.1X users on a port
- Configuring an 802.1X guest VLAN
- Enabling the 802.1X critical voice VLAN
- Sending EAP-Success packets for 802.1X users assignment to the 802.1X critical VLAN
- Enabling 802.1X guest VLAN assignment delay
- Configuring 802.1X SmartOn
- Displaying and maintaining 802.1X
- X guest VLAN and authorization VLAN configuration example
- X with ACL assignment configuration example
- X with EAD assistant configuration example (with DHCP relay agent)
- X with EAD assistant configuration example (with DHCP server)
- X SmartOn configuration example
- Troubleshooting 802.1X EAD assistant for Web browser users
- Configuring MAC authentication
- VLAN assignment
- ACL assignment
- Configuration task list
- Configuring the user account format
- Enabling MAC authentication offline detection
- Configuring MAC authentication delay
- Configuration restrictions and guidelines
- Configuring a MAC authentication critical VLAN
- Enabling the MAC authentication critical voice VLAN
- Including user IP addresses in MAC authentication requests
- MAC authentication configuration examples
- RADIUS-based MAC authentication configuration example
- ACL assignment configuration example
- ftp server
- Configuring portal authentication
- Interaction between portal system components
- Portal support for EAP
- Portal configuration task list
- Configuring a portal authentication server
- Enabling portal authentication on an interface
- Specifying a portal Web server on an interface
- Configuring an authentication source subnet
- Configuring an authentication destination subnet
- Setting the maximum number of portal users
- Enabling outgoing packets filtering on a portal-enabled interface
- Configuring portal authentication server detection
- Configuring portal Web server detection
- Configuring portal user synchronization
- Configuring the portal fail-permit feature
- Applying a NAS-ID profile to an interface
- Configuring the local portal Web server feature
- Configuring a local portal Web server
- Logging out online portal users
- Portal configuration examples
- authentication server
- Configuring re-DHCP portal authentication
- Configuring cross-subnet portal authentication
- Configuring extended direct portal authentication
- Configuring extended re-DHCP portal authentication
- Configuring extended cross-subnet portal authentication
- Configuring portal server detection and portal user synchronization
- Configuring cross-subnet portal authentication for MPLS L3VPNs
- Configuring direct portal authentication using the local portal Web server
- Troubleshooting portal
- Cannot log out portal users on the RADIUS server
- Configuring port security
- General guidelines and restrictions
- Setting port security's limit on the number of secure MAC addresses on a port
- Configuring port security features
- Configuring secure MAC addresses
- Enabling MAC move
- Applying a NAS-ID profile to port security
- Port security configuration examples
- userLoginWithOUI configuration example
- configure port security
- macAddressElseUserLoginSecure configuration example
- Troubleshooting port security
- Configuring password control
- Password updating and expiration
- User login control
- Setting global password control parameters
- Setting user group password control parameters
- Setting local user password control parameters
- Displaying and maintaining password control
- Verifying the configuration
- Managing public keys
- Distributing a local host public key
- Destroying a local key pair
- Entering a peer host public key
- Example for importing a public key from a public key file
- Configuring SSL
- Configuring an SSL client policy
- Displaying and maintaining SSL
- Configuring PKI
- PKI architecture
- PKI applications
- Configuring a PKI domain
- Requesting a certificate
- Configuring automatic certificate request
- Aborting a certificate request
- Verifying certificates without CRL checking
- Specifying the storage path for the certificates and CRLs
- Removing a certificate
- Displaying and maintaining PKI
- Requesting a certificate from an RSA Keon CA server
- Requesting a certificate from a Windows Server 2003 CA server
- Requesting a certificate from an OpenCA server
- Certificate-based access control policy configuration example
- Certificate import and export configuration example
- Troubleshooting PKI configuration
- Failed to obtain the CA certificate
- Failed to request local certificates
- Failed to obtain CRLs
- Failed to import the local certificate
- Failed to set the storage path
- Configuring IPsec
- Security association
- IPsec implementation
- IPsec RRI
- Protocols and standards
- Configuring an ACL
- Configuring an IPsec transform set
- Configuring a manual IPsec policy
- Configuring an IKE-based IPsec policy
- Applying an IPsec policy to an interface
- Enabling ACL checking for de-encapsulated packets
- Configuring IPsec anti-replay redundancy
- Binding a source interface to an IPsec policy
- Enabling logging of IPsec packets
- Configuring the DF bit of IPsec packets
- Configuring IPsec for IPv6 routing protocols
- Configuring SNMP notifications for IPsec
- Displaying and maintaining IPsec
- IPsec configuration examples
- Configuring an IKE-based IPsec tunnel for IPv4 packets
- Configuring an IKE-based IPsec tunnel for IPv6 packets
- Configuring IPsec for RIPng
- Configuring IKE
- IKE security mechanism
- Configuring an IKE profile
- Configuring an IKE proposal
- Configuring an IKE keychain
- Configuring the global identity information
- Configuring the IKE keepalive feature
- Enabling invalid SPI recovery
- Setting the maximum number of IKE SAs
- Displaying and maintaining IKE
- Aggressive mode with RSA signature authentication configuration example
- Troubleshooting IKE
- IPsec SA negotiation failed because no matching IPsec transform sets were found
- Configuring IKEv2
- New features in IKEv2
- Configuring an IKEv2 profile
- Configuring an IKEv2 policy
- Configuring an IKEv2 proposal
- Configuring an IKEv2 keychain
- Configure global IKEv2 parameters
- Configuring the IKEv2 NAT keepalive feature
- IKEv2 configuration examples
- IKEv2 with RSA signature authentication configuration example
- Troubleshooting IKEv2
- Configuring SSH
- SSH authentication methods
- SSH support for Suite B
- Enabling the Stelnet server
- Enabling the SCP server
- Configuring a client's host public key
- Configuring an SSH user
- Configuring the SSH management parameters
- Specifying a PKI domain for the SSH server
- Specifying the source IP address for SSH packets
- Establishing a connection to an Stelnet server based on Suite B
- Establishing a connection to an SFTP server
- Establishing a connection to an SFTP server based on Suite B
- Working with SFTP directories
- Displaying help information
- Establishing a connection to an SCP server based on Suite B
- Specifying public key algorithms for SSH2
- Specifying MAC algorithms for SSH2
- Publickey authentication enabled Stelnet server configuration example
- Password authentication enabled Stelnet client configuration example
- Publickey authentication enabled Stelnet client configuration example
- Stelnet configuration example based on 128-bit Suite B algorithms
- SFTP configuration examples
- Password authentication enabled SFTP server configuration example
- Publickey authentication enabled SFTP client configuration example
- SFTP configuration example based on 192-bit Suite B algorithms
- SCP configuration examples
- SCP configuration example based on Suite B algorithms
- NETCONF over SSH configuration example with password authentication
- Configuring IP source guard
- Dynamic IPSG bindings
- Configuring the IPv4SG feature
- Configuring the IPv6SG feature
- Displaying and maintaining IPSG
- IPSG configuration examples
- Dynamic IPv4SG using DHCP snooping configuration example
- Dynamic IPv4SG using DHCP relay configuration example
- Static IPv6SG configuration example
- Dynamic IPv6SG using DHCPv6 snooping configuration example
- Configuring ARP attack protection
- Configuring ARP source suppression
- Configuration example
- Configuring ARP packet rate limit
- Configuring source MAC-based ARP attack detection
- Configuring ARP packet source MAC consistency check
- Configuring authorized ARP
- Configuration example (on a DHCP relay agent)
- Configuring ARP detection
- Configuring user validity check
- Configuring ARP packet validity check
- Enabling ARP detection logging
- User validity check and ARP packet validity check configuration example
- Configuring ARP scanning and fixed ARP
- Configuring the checking of sender IP addresses for ARP packets
- Configuring uRPF
- uRPF operation
- Network application
- Configuring IPv6 uRPF
- IPv6 uRPF operation
- Configuring FIPS
- Configuring FIPS mode
- Configuration changes in FIPS mode
- Exiting FIPS mode
- Power-up self-tests
- Triggering self-tests
- Entering FIPS mode through manual reboot
- Exiting FIPS mode through automatic reboot
- Configuring attack detection and prevention
- Scanning attacks
- Flood attacks
- TCP fragment attack
- Attack detection and prevention configuration task list
- Configuring a scanning attack defense policy
- Configuring attack detection exemption
- Applying an attack defense policy to the device
- Configuring TCP fragment attack prevention
- Configuring login attack prevention
- Displaying and maintaining attack detection and prevention
- Attack detection and prevention configuration examples
- IP blacklist configuration example
- Configuring MACsec
- MACsec applications
- MACsec configuration task list
- Configuring a preshared key
- Configuring the MACsec confidentiality offset
- Configuring MACsec protection parameters by MKA policy
- Applying an MKA policy
- Troubleshooting MACsec
- Configuring MFF
- Basic concepts
- MFF working mechanism
- Configuring a network port
- Displaying and maintaining MFF
- Auto-mode MFF configuration example in a ring network
- Manual-mode MFF configuration example in a tree network
- Manual-mode MFF configuration example in a ring network
- Configuring ND attack defense
- Configuring ND attack detection
- Specifying the role of the attached device
- Enabling the RA guard logging feature
- Configuring keychains
- Displaying and maintaining keychain
- configuring switch b
- Document conventions and icons
- Network topology icons
- Support and other resources
- Websites
- Index
10500 series
Table of contents
- configuration guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- using the cli
- Entering system view from user view
- Using the undo form of a command
- Entering a command
- abbreviating commands
- Configuring and using command hotkeys
- Enabling redisplaying entered-but-not-submitted commands
- Using the command history feature
- Pausing between screens of output
- Filtering the output from a display command
- Saving the output from a display command to a file
- Viewing and managing the output from a display command effectively
- configuring rbac
- User role assignment
- Configuration task list
- Configuration restrictions and guidelines
- Configuring feature groups
- Configuring resource access policies
- Configuring the VPN instance policy of a user role
- Assigning user roles to remote AAA authentication users
- Configuring temporary user role authorization
- Configuring user role authentication
- Obtaining temporary user role authorization
- RBAC configuration example for RADIUS authentication users
- RBAC temporary user role authorization configuration example (HWTACACS authentication)
- radius authentication
- Troubleshooting RBAC
- Login overview
- Using the console port for the first device access
- cli overview
- user roles
- FIPS compliance
- configuring password authentication for console login
- configuring scheme authentication for console login
- Configuring Telnet login
- Configuring the device as a Telnet server
- configuring password authentication for telnet login
- Using the device to log in to a Telnet server
- configuring the device as an ssh server
- displaying and maintaining cli login
- Accessing the device through SNMP
- configuration procedures
- Configuration example
- Configuring command authorization
- Configuring command accounting
- configuring ftp
- Configuring basic parameters
- Manually releasing FTP connections
- FTP server configuration example in IRF mode
- establishing an ftp connection
- Managing directories on the FTP server
- Working with files on the FTP server
- Changing to another user account
- Terminating the FTP connection
- FTP client configuration example in IRF mode
- configuring tftp
- Configuring the device as an IPv6 TFTP client
- Managing the file system
- Managing files
- renaming a file
- Deleting/restoring a file
- displaying directory information
- Deleting a directory
- Repairing a storage medium
- Partitioning a CF card or USB disk
- Setting the operation mode for files and folders
- managing configuration files
- Next-startup configuration file redundancy
- Saving the running configuration
- Configuring configuration rollback
- Configuring configuration archive parameters
- Enabling automatic configuration archiving
- Specifying a next-startup configuration file
- Backing up the main next-startup configuration file to a TFTP server
- Restoring the main next-startup configuration file from a TFTP server
- Displaying and maintaining configuration files
- upgrading software
- Software file naming conventions
- System startup process
- PEX startup process
- upgrade methods
- Upgrade restrictions and guidelines
- Upgrade task list
- Specifying startup images and completing the upgrade
- IRF mode
- Restoring or downgrading the BootWare image without using ISSU
- Enabling software synchronization from the active MPU to the standby MPU at startup
- Upgrade procedure
- Displaying and maintaining software image settings
- Configuration procedure
- Verifying the configuration
- Performing an ISSU
- ISSU commands
- Verifying the device operating status
- Determining the upgrade procedure
- Performing an ISSU by using issu commands
- Performing an incompatible upgrade
- Performing an ISSU by using install commands
- Uninstalling feature or patch images
- Aborting a software activate/deactivate operation
- Deleting inactive software images
- Troubleshooting ISSU in IRF mode
- Feature upgrade to an incompatible version
- Examples of using issu commands for ISSU on a four-member IRF fabric
- Feature upgrade to an incompatible version (upgrading one subordinate member first)
- Feature upgrade to an incompatible version (upgrading multiple subordinate members first)
- Examples of using issu commands for ISSU on an eIRF system
- Examples of using install commands for ISSU on a standalone device
- irf fabric
- Examples of using install commands for ISSU on an eIRF system
- Using automatic configuration
- configuration files
- script files
- Configuring the DHCP server when a TFTP file server is used
- Configuring the DNS server
- Automatic configuration examples
- enable dhcp
- Automatic configuration using HTTP server and Tcl script
- Automatic configuration using HTTP server and Python script
- Automatic IRF setup
- managing the device
- configuring the system time
- Enabling displaying the copyright statement
- rebooting the device
- Configuration guidelines
- Scheduling a task
- Schedule configuration example
- Setting the port status detection timer
- Setting memory alarm thresholds
- Configuring the temperature alarm thresholds
- Specifying an operating mode for a service module
- Enabling the port down feature globally
- Isolating a switching fabric module
- verifying and diagnosing transceiver modules
- diagnosing transceiver modules
- Displaying and maintaining device management configuration
- Using Tcl
- Managing the system with BootWare
- restrictions and guidelines
- Modifying serial port parameters
- Updating the entire BootWare
- Using the BASIC-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A))
- Updating the extended BootWare segment
- Running the backup extended BootWare segment
- Running the Comware software
- Upgrading Comware software through the management Ethernet port
- Restoring the factory-default configuration
- Skipping the configuration file at the next startup
- Skipping console login authentication
- Managing storage media
- Using the EXTENDED ASSISTANT menu
- Using the EXTENDED-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A))
- BootWare shortcut keys
- Disabling password recovery capability
- Comware software upgrade examples
- Using TFTP to upgrade Comware software through the management Ethernet port
- Using FTP to upgrade Comware software through the management Ethernet port
- Using Python
- Comware V7 extended Python API
- Transfer class
- API get_self_slot
- API get_slot_range
- API get_slot_info
- support and other resources
- command conventions
- Index