OneStart

HP 10500 series manuals

10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. product overview
  2. key features
  3. technical specifications
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Ethernet interface configuration commands
  5. default
  6. display interface
  7. duplex
  8. flow-interval
  9. jumboframe enable
  10. loopback internal
  11. shutdown
  12. speed
  13. display port-group manual
  14. group-member
  15. port-group manual
  16. Loopback and null interface configuration commands
  17. display interface loopback
  18. display interface null
  19. interface loopback
  20. interface null
  21. reset counters interface null
  22. VLAN configuration commands
  23. display interface vlan-interface
  24. display vlan
  25. interface vlan-interface
  26. name
  27. reset counters interface vlan-interface
  28. vlan
  29. Port-based VLAN configuration commands
  30. port
  31. port access vlan
  32. port hybrid pvid
  33. port hybrid vlan
  34. port link-type
  35. port trunk permit vlan
  36. port trunk pvid
  37. MAC-based VLAN configuration commands
  38. display mac-vlan interface
  39. mac-vlan enable
  40. mac-vlan mac-address
  41. MAC address table commands
  42. display mac-address aging-time
  43. display mac-address mac-learning
  44. display mac-address statistics
  45. mac-address (interface view)
  46. mac-address (system view)
  47. mac-address mac-learning disable
  48. mac-address max-mac-count
  49. mac-address timer
  50. Ethernet link aggregation configuration commands
  51. display link-aggregation load-sharing mode
  52. display link-aggregation member-port
  53. display link-aggregation summary
  54. display link-aggregation verbose
  55. enable snmp trap updown
  56. interface bridge-aggregation
  57. lacp period short
  58. link-aggregation load-sharing mode
  59. link-aggregation port-priority
  60. port link-aggregation group
  61. reset lacp statistics
  62. Layer 2 forwarding configuration commands
  63. reset mac-forwarding statistics
  64. Fast Layer 2 forwarding configuration commands
  65. mac-fast-forwarding
  66. PPPoE server commands
  67. pppoe-server abnormal-offline-count threshold
  68. pppoe-server bind
  69. pppoe-server log-information off
  70. pppoe-server max-sessions remote-mac
  71. pppoe-server normal-offline-percent threshold
  72. reset pppoe-server
  73. FPGA fast forwarding configuration commands
  74. LLDP configuration commands
  75. display lldp neighbor-information
  76. display lldp statistics
  77. display lldp status
  78. display lldp tlv-config
  79. lldp admin-status
  80. lldp check-change-interval
  81. lldp compliance cdp
  82. lldp enable
  83. lldp fast-count
  84. lldp management-address-format string
  85. lldp management-address-tlv
  86. lldp timer notification-interval
  87. lldp timer tx-delay
  88. lldp timer tx-interval
  89. Support and other resources
  90. Conventions
  91. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Using the CLI
  6. Using the undo form of a command
  7. Entering system view from user view
  8. Accessing the CLI online help
  9. Entering a command
  10. Configuring and using hotkeys
  11. Enabling redisplaying entered-but-not-submitted commands
  12. Understanding command-line error messages
  13. Viewing history commands
  14. Filtering the output from a display command
  15. Configuring user privilege and command levels
  16. Switching the user privilege level
  17. Changing the level of a command
  18. Displaying and maintaining CLI
  19. Login overview
  20. User interface assignment
  21. Logging in to the CLI
  22. Configuring console login control settings
  23. Disabling authentication for console login
  24. Configuring scheme authentication for console login
  25. Configuring common console user interface settings (optional)
  26. Logging in through Telnet
  27. Disabling authentication for Telnet login
  28. Configuring password authentication for Telnet login
  29. Configuring scheme authentication for Telnet login
  30. Configuring common VTY user interface settings (optional)
  31. Using the device to log in to a Telnet server
  32. Logging in through SSH
  33. Configuring the SSH server on the device
  34. Using the device to log in to an SSH server
  35. Displaying and maintaining CLI login
  36. Logging in to the Web interface
  37. Configuring HTTPS login
  38. Displaying and maintaining Web login
  39. HTTP login configuration example
  40. HTTPS login configuration example
  41. Logging in through SNMP
  42. Configuring SNMPv1 or SNMPv2c settings
  43. NMS login example
  44. Controlling user logins
  45. Configuring source/destination IP-based Telnet login control
  46. Telnet login control configuration example
  47. Configuring source IP-based SNMP login control
  48. SNMP login control configuration example
  49. Configuring source IP-based Web login control
  50. Configuring FTP
  51. Managing directories on the FTP server
  52. Working with the files on the FTP server
  53. Switching to another user account
  54. Using the device as an FTP server
  55. Configuring authentication and authorization
  56. FTP server configuration example
  57. Displaying and maintaining FTP
  58. Configuring TFTP
  59. Displaying and maintaining the TFTP client
  60. Managing the file system
  61. Displaying file information
  62. Deleting/restoring a file
  63. Displaying the current working directory
  64. Managing storage media
  65. File system management examples
  66. Managing configuration files
  67. Configuration file content organization and format
  68. Saving configuration by using different methods
  69. Using automatic configuration backup after a software upgrade
  70. Restoring the next-startup configuration file from a TFTP server
  71. Displaying and maintaining configuration files
  72. Upgrading software
  73. Upgrading BootWare
  74. Basic concepts
  75. Patch installation task list
  76. Installing a patch step by step
  77. Uninstalling a patch step by step
  78. Displaying and maintaining software upgrade
  79. Upgrading the system software
  80. Installing patches
  81. Dealing with password loss
  82. Examining the state of password recovery capability
  83. Dealing with console login password loss when password recovery capability is enabled
  84. Dealing with user privilege level password loss when password recovery capability is enabled
  85. Dealing with password loss when password recovery capability is disabled
  86. Managing licenses
  87. Managing the device
  88. Changing the system time
  89. configuration example
  90. Configuration procedure
  91. Enabling displaying the copyright statement
  92. Banner input methods
  93. Configuring the maximum number of concurrent users
  94. Rebooting the device
  95. Scheduling jobs
  96. Scheduling a job in the non-modular approach
  97. Setting the port status detection timer
  98. Configuring the alarm resend function
  99. Clearing unused 16-bit interface indexes
  100. Displaying and maintaining device management
  101. Support and other resources
  102. Conventions
  103. Index
10500 series first page preview

10500 series

Brand: HP | Category: Network Router
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Configuring MCE
  7. MPLS L3VPN concepts
  8. How MCE works
  9. Configuring VPN instances on an MCE device
  10. Configuring routing on an MCE device
  11. Configuration prerequisites
  12. Configuring routing between an MCE and a PE
  13. Displaying and maintaining MCE
  14. Using BGP to advertise VPN routes to the PE
  15. Configuring IPv6 MCE
  16. Configuring route attributes for a VPN instance
  17. Configuring routing on an IPv6 MCE device
  18. Configuring routing between an IPv6 MCE and a PE
  19. Displaying information about IPv6 MCE
  20. Configuring basic MPLS
  21. MPLS network architecture
  22. LSP establishment
  23. MPLS forwarding
  24. Protocols and standards
  25. Configuring MPLS MTU
  26. Configuring TTL propagation
  27. Enabling sending MPLS TTL-expired messages
  28. Displaying and maintaining MPLS
  29. Configuring a static LSP
  30. Displaying static LSPs
  31. Configuring LDP
  32. LDP operation
  33. Label distribution and control
  34. Protocols
  35. Enabling LDP
  36. Configuring LDP session parameters
  37. Configuring LDP backoff
  38. Configuring LDP MD5 authentication
  39. Configuring the LDP label distribution control mode
  40. Configuring a label acceptance policy
  41. Configuring LDP loop detection
  42. Configuring LDP session protection
  43. Configuring LDP GR
  44. LDP configuration examples
  45. Label acceptance control configuration example
  46. configuration considerations
  47. Label advertisement control configuration example
  48. Configuring tunnel policies
  49. Displaying tunnel information
  50. Configuring MPLS L3VPN
  51. MPLS L3VPN route advertisement
  52. MPLS L3VPN packet forwarding
  53. MPLS L3VPN networking schemes
  54. Inter-AS VPN
  55. Carrier's carrier
  56. Nested VPN
  57. HoVPN
  58. OSPF VPN extension
  59. BGP AS number substitution
  60. MPLS L3VPN configuration task list
  61. Configuring routing between a PE and a CE
  62. Configuring routing between PEs
  63. Configuring BGP VPNv4 route control
  64. Configuring inter-AS VPN
  65. Configuring inter-AS option C
  66. Configuring nested VPN
  67. Configuring HoVPN
  68. Specifying the VPN label processing mode on the egress PE
  69. Displaying and maintaining MPLS L3VPN
  70. MPLS L3VPN configuration examples
  71. Configuring an MPLS L3VPN over a GRE tunnel
  72. configure a gre tunnel
  73. Configuring MPLS L3VPN inter-AS option A
  74. Configuring MPLS L3VPN inter-AS option B
  75. Configuring MPLS L3VPN inter-AS option C
  76. Configuring MPLS L3VPN carrier's carrier
  77. Configuring BGP AS number substitution
  78. Configuring IPv6 MPLS L3VPN
  79. IPv6 MPLS L3VPN packet forwarding
  80. IPv6 MPLS L3VPN network schemes and functions
  81. Configuring VPN instances
  82. Configuring BGP VPNv6 route control
  83. Configuring inter-AS IPv6 VPN
  84. Configuring inter-AS IPv6 VPN option A
  85. Displaying and maintaining IPv6 MPLS L3VPN
  86. IPv6 MPLS L3VPN configuration examples
  87. Configuring an IPv6 MPLS L3VPN over a GRE tunnel
  88. Configuring IPv6 MPLS L3VPN inter-AS option A
  89. Configuring IPv6 MPLS L3VPN inter-AS option C
  90. Configuring IPv6 MPLS L3VPN carrier's carrier
  91. Configuring MPLS L2VPN
  92. MPLS L2VPN connection establishment
  93. Ethernet over MPLS
  94. Multi-segment PW
  95. MPLS L2VPN configuration task list
  96. Enabling L2VPN
  97. Configuring a service instance on a Layer 2 Ethernet interface
  98. Configuring a PW
  99. Binding an AC to a cross-connect
  100. Configure static PW redundancy
  101. Displaying and maintaining MPLS L2VPN
  102. Configuring an LDP PW (VLAN mode)
  103. Configuring an LDP PW (flexible mode)
  104. Configuring LDP PW redundancy
  105. Configuring an intra-domain multi-segment PW
  106. Configuring an inter-domain multi-segment PW
  107. Configuring VPLS
  108. VPLS implementation
  109. PE dual homing
  110. VPLS configuration task list
  111. Configuring a VSI
  112. Configuring an LDP PW
  113. Configuring PE dual homing
  114. Configuring a dual-homed PE with redundant LDP PWs
  115. VPLS configuration examples
  116. LDP PW configuration example
  117. Support and other resources
  118. Conventions
  119. Index
10500 series first page preview

10500 series

Brand: HP | Category: Network Router
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Configuring MCE
  9. MPLS L3VPN concepts
  10. Multi-VPN-instance CE
  11. Using MCE in tunneling applications
  12. Configuring routing on an MCE
  13. Route exchange between an MCE and a PE
  14. Associating a VPN instance with an interface
  15. Configuring routing between MCE and PE
  16. Resetting BGP connections
  17. Displaying and maintaining MCE
  18. MCE configuration examples
  19. Using BGP to advertise VPN routes to the PE
  20. Using tunnels to advertise VPN routes
  21. Configuring IPv6 MCE
  22. Configuring route attributes for a VPN instance
  23. Configuring routing on an IPv6 MCE
  24. Configuring routing between IPv6 MCE and PE
  25. Resetting IPv6 BGP connections
  26. IPv6 MCE configuration example
  27. Configuring basic MPLS
  28. MPLS network structure
  29. label distribution and management
  30. MPLS forwarding
  31. Protocols
  32. Enabling the MPLS function
  33. Configuring a static LSP
  34. Establishing dynamic LSPs through LDP
  35. Configuring remote LDP session parameters
  36. Configuring PHP
  37. Configuring the label distribution control mode
  38. Configuring LDP loop detection
  39. Configuring LDP MD5 authentication
  40. Configuring a DSCP for outgoing LDP packets
  41. Maintaining LDP sessions
  42. Configuring a TTL processing mode for an LSR
  43. Sending back ICMP TTL exceeded messages for MPLS TTL expired packets
  44. Configuring LDP GR
  45. Configuring LDP NSR
  46. Configuring MPLS LSP ping
  47. Configuring periodic LSP tracert
  48. Enabling MPLS trap
  49. Displaying MPLS LDP operation
  50. Clearing MPLS statistics
  51. configuration considerations
  52. Configuring LDP to establish LSPs dynamically
  53. Configuring BFD for LSPs
  54. Configuring MPLS TE
  55. Basic concepts
  56. CR-LSP
  57. RSVP-TE
  58. Traffic forwarding
  59. CR-LSP backup
  60. PS for an MPLS TE tunnel
  61. MPLS TE configuration task list
  62. Creating an MPLS TE tunnel over a static CR-LSP
  63. Configuring an MPLS TE tunnel with a dynamic signaling protocol
  64. Configuration procedure
  65. Configuring RSVP-TE advanced features
  66. Configuring RSVP state timers
  67. Configuring the RSVP hello extension
  68. Configuring RSVP authentication
  69. Tuning CR-LSP setup
  70. Configuring CR-LSP reoptimization
  71. Tuning MPLS TE tunnel setup
  72. Assigning priorities to a tunnel
  73. Forwarding traffic along MPLS TE tunnels through automatic route advertisement
  74. Configuring traffic forwarding tuning parameters
  75. Specifying the link metric type for tunnel path calculation
  76. Configuring FRR
  77. Configuring a bypass tunnel on its PLR
  78. Configuring node protection
  79. Inspecting an MPLS TE tunnel
  80. Configuring periodic LSP tracert for an MPLS TE tunnel
  81. Configuring protection switching
  82. Configuring MPLS TE examples
  83. MPLS TE using RSVP-TE configuration example
  84. RSVP-TE GR configuration example
  85. MPLS RSVP-TE and BFD cooperation configuration example
  86. CR-LSP backup configuration example
  87. FRR configuration example
  88. MPLS TE in MPLS L3VPN configuration example
  89. Troubleshooting MPLS TE
  90. Configuring VPLS
  91. MAC address learning and flooding
  92. VPLS loop avoidance
  93. VPLS packet encapsulation
  94. VPLS configuration task list
  95. Enabling L2VPN and MPLS L2VPN
  96. Configuring BGP VPLS
  97. Configuring the BGP extension
  98. Binding a service instance with a VPLS instance
  99. Displaying and maintaining VPLS
  100. VPLS configuration examples
  101. Binding service instances with VPLS instances
  102. Configuring PW redundancy for H-VPLS access
  103. Configuring BFD for the primary link in an H-VPLS network
  104. Troubleshooting VPLS
  105. Configuring MPLS L2VPN
  106. MPLS L2VPN network models
  107. Implementation of MPLS L2VPN
  108. VC encapsulations types
  109. Configuring basic MPLS L2VPN
  110. Configuring VLAN encapsulation
  111. Configuring SVC MPLS L2VPN
  112. Configuring the remote peer
  113. Inspecting VCs through MPLS LSP ping
  114. Creating and configuring MPLS L2VPN
  115. Resetting L2VPN BGP sessions
  116. MPLS L2VPN configuration examples
  117. Configuring Martini MPLS L2VPN
  118. Configuring Kompella MPLS L2VPN
  119. Configuring a VC for a service instance
  120. Troubleshooting MPLS L2VPN
  121. Configuring MPLS L3VPN
  122. MPLS L3VPN packet forwarding
  123. MPLS L3VPN networking schemes
  124. MPLS L3VPN routing information advertisement
  125. Inter-AS VPN
  126. Carrier's carrier
  127. Nested VPN
  128. HoVPN
  129. OSPF VPN extension
  130. BGP AS number substitution and SoO
  131. MPLS L3VPN configuration task list
  132. Configuring VPN instances
  133. Configuring routing between PE and CE
  134. Configuring routing between PEs
  135. Configuring inter-AS VPN
  136. Configuring inter-AS option B
  137. Configuring inter-AS option C
  138. Configuring nested VPN
  139. Configuration restrictions and guidelines
  140. Configuring HoVPN
  141. Configuring a loopback interface
  142. Configuring BGP AS number substitution and SoO
  143. MPLS L3VPN configuration examples
  144. Configuring MPLS L3VPNs using IBGP between PE and CE
  145. Configuring a hub-spoke network
  146. Configuring inter-AS option A
  147. Configuring carrier's carrier
  148. Configuring OSPF sham links
  149. Configuring BGP AS number substitution
  150. Configuring IPv6 MPLS L3VPN
  151. IPv6 MPLS L3VPN packet forwarding
  152. IPv6 MPLS L3VPN network schemes and functions
  153. Configuring route related attributes for a VPN instance
  154. Configuring routing features for the BGP-VPNv6 subaddress family
  155. Configuring inter-AS IPv6 VPN
  156. Configuring inter-AS IPv6 VPN option A
  157. IPv6 MPLS L3VPN configuration examples
  158. Configuring IPv6 MPLS L3VPNs
  159. Configuring inter-AS IPv6 VPN option C
  160. Support and other resources
  161. Conventions
  162. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Configuring AAA
  11. RADIUS
  12. HWTACACS
  13. Domain-based user management
  14. AAA for MPLS L3VPNs
  15. RADIUS attributes
  16. FIPS compliance
  17. Configuring AAA schemes
  18. Configuring RADIUS schemes
  19. Configuring HWTACACS schemes
  20. Configuring AAA methods for ISP domains
  21. Configuration prerequisites
  22. Configuring ISP domain attributes
  23. Configuring authentication methods for an ISP domain
  24. Configuring authorization methods for an ISP domain
  25. Configuring accounting methods for an ISP domain
  26. Tearing down user connections
  27. Configuring a NAS ID-VLAN binding
  28. AAA configuration examples
  29. Local authentication and authorization for Telnet users
  30. Authentication/authorization for SSH/Telnet users by a RADIUS server
  31. AAA for portal users by a RADIUS server
  32. AAA for 802.1X users by a RADIUS server
  33. Level switching authentication for Telnet users by an HWTACACS server
  34. Troubleshooting AAA
  35. Troubleshooting HWTACACS
  36. X overview
  37. X-related protocols
  38. EAP over RADIUS
  39. Initiating 802.1X authentication
  40. X authentication procedures
  41. EAP relay
  42. EAP termination
  43. Configuring 802.1X
  44. Enabling 802.1X
  45. Setting the port authorization state
  46. Specifying an access control method
  47. Setting the 802.1X authentication timeout timers
  48. Configuration guidelines
  49. Configuring the authentication trigger function
  50. Specifying a mandatory authentication domain on a port
  51. Enabling the periodic online user re-authentication function
  52. Configuring an 802.1X guest VLAN
  53. Displaying and maintaining 802.1X
  54. Configuration procedure
  55. Verifying the configuration
  56. X guest VLAN and VLAN assignment configuration example
  57. Configuring EAD fast deployment
  58. Configuring the redirect URL
  59. EAD fast deployment configuration example
  60. Troubleshooting EAD fast deployment
  61. Configuring MAC authentication
  62. MAC authentication timers
  63. Critical VLAN
  64. Configuring MAC authentication globally
  65. Specifying a MAC authentication domain
  66. Configuring a MAC authentication critical VLAN
  67. Configuring MAC authentication delay
  68. MAC authentication configuration examples
  69. RADIUS-based MAC authentication configuration example
  70. ACL assignment configuration example
  71. Configuring portal authentication
  72. Portal authentication modes
  73. Portal support for EAP
  74. Portal authentication across VPNs
  75. Specifying the portal server
  76. Controlling access of portal users
  77. Configuring an authentication source subnet
  78. Specifying a portal authentication domain
  79. Specifying the NAS-Port-ID for an interface
  80. Specifying a source IP address for outgoing portal packets
  81. Configuring portal detection functions
  82. Configuring portal user information synchronization
  83. Logging off portal users
  84. Portal configuration examples
  85. configure the switch
  86. Configuring re-DHCP portal authentication
  87. Configuring cross-subnet portal authentication
  88. Configuring direct portal authentication with extended functions
  89. Configuring re-DHCP portal authentication with extended functions
  90. Configuring cross-subnet portal authentication with extended functions
  91. Configuring portal server detection and portal user information synchronization
  92. configuring the switch
  93. Cross-subnet portal authentication across VPNs
  94. Troubleshooting portal
  95. Configuring port security
  96. Working with guest VLAN and Auth-Fail VLAN
  97. Enabling port security
  98. Setting the port security mode
  99. Configuring NTK
  100. Enabling port security traps
  101. Ignoring authorization information from the server
  102. Port security configuration examples
  103. Configuring the userLoginWithOUI mode
  104. Configuring the macAddressElseUserLoginSecure mode
  105. Troubleshooting port security
  106. Cannot set the port security mode
  107. Configuring a user profile
  108. Applying a QoS policy
  109. Displaying and maintaining user profiles
  110. Managing public keys
  111. Creating a local asymmetric key pair
  112. Destroying a local asymmetric key pair
  113. Specifying the peer public key on the local device
  114. Displaying public keys
  115. Importing a public key from a public key file
  116. Configuring SSH
  117. SSH authentication
  118. Generating local DSA or RSA key pairs
  119. Enabling the SFTP server function
  120. Configuring a client's host public key
  121. Configuring an SSH user
  122. Setting the SSH management parameters
  123. Setting the DSCP value for packets sent by the SSH server
  124. Stelnet client configuration task list
  125. Establishing a connection to an Stelnet server
  126. Setting the DSCP value for packets sent by the Stelnet client
  127. Configuring the device as an SFTP client
  128. Working with SFTP directories
  129. Working with SFTP files
  130. Terminating the connection with the SFTP server
  131. Transferring files with an SCP server
  132. Stelnet configuration examples
  133. When the switch acts as an Stelnet server for publickey authentication
  134. When the switch acts as an Stelnet client for password authentication
  135. When the switch acts as an Stelnet client for publickey authentication
  136. SFTP configuration examples
  137. When the switch acts as an SFTP client for publickey authentication
  138. ssh connection
  139. Configuring TCP attack protection
  140. Configuring IP source guard
  141. Dynamic IPv4 source guard entries
  142. Configuring the IPv4 source guard function
  143. Configuring a static IPv4 source guard entry
  144. Setting the maximum number of IPv4 source guard entries allowed on a port
  145. Configuring a static IPv6 source guard entry
  146. Setting the maximum number of IPv6 source guard entries allowed on a port
  147. IP source guard configuration examples
  148. Dynamic IPv4 source guard using DHCP snooping
  149. Dynamic IPv4 source guard using DHCP relay
  150. Static IPv6 source guard entry configuration
  151. Global static IP source guard configuration
  152. Troubleshooting IP source guard
  153. Configuring ARP attack protection
  154. Configuring unresolvable IP attack protection
  155. Unresolvable IP attack protection configuration example
  156. Configuring ARP packet rate limit
  157. Displaying and maintaining source MAC-based ARP attack detection
  158. Configuring ARP active acknowledgement
  159. Configuring ARP detection
  160. Configuring ARP packet validity check
  161. Configuring ARP restricted forwarding
  162. User validity check and ARP packet validity check configuration example
  163. ARP restricted forwarding configuration example
  164. Configuring ARP automatic scanning and fixed ARP
  165. Configuring ND attack defense
  166. Enabling source MAC consistency check for ND packets
  167. Configuring URPF
  168. Network application
  169. URPF configuration example
  170. Configuring MFF
  171. Basic concepts
  172. MFF work flow
  173. Displaying and maintaining MFF
  174. Configuring auto-mode MFF in a ring network
  175. Configuring manual-mode MFF in a tree network
  176. Configuring manual-mode MFF in a ring network
  177. Configuring password control
  178. Enabling password control
  179. Setting global password control parameters
  180. Setting user group password control parameters
  181. Setting local user password control parameters
  182. Setting super password control parameters
  183. Password control configuration example
  184. Configuring FIPS
  185. Displaying and maintaining FIPS
  186. Configuring IPsec
  187. Protocols and standards
  188. Configuring ACLs
  189. Configuring an IPsec transform set
  190. Configuring an IPsec policy
  191. Applying an IPsec policy group to an interface
  192. Enabling ACL checking of de-encapsulated IPsec packets
  193. Configuring packet information pre-extraction
  194. Displaying and maintaining IPsec
  195. Configuring IKE
  196. IKE functions
  197. Relationship between IKE and IPsec
  198. Configuring a name for the local security gateway
  199. Configuring an IKE peer
  200. Setting keepalive timers
  201. Configuring a DPD detector
  202. Displaying and maintaining IKE
  203. Troubleshooting IKE
  204. Failing to establish an IPsec tunnel
  205. Support and other resources
  206. Conventions
  207. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Configuring ARP
  10. ARP table
  11. Configuring a static ARP entry
  12. Configuring the maximum number of dynamic ARP entries for an interface
  13. Configuring ARP quick update
  14. Configuring multicast ARP
  15. Displaying and maintaining ARP
  16. ARP configuration examples
  17. Multicast ARP configuration example (in standalone mode)
  18. Multicast ARP configuration example (in IRF mode)
  19. Configuring gratuitous ARP
  20. Configuration procedure
  21. Configuring proxy ARP
  22. Enabling common proxy ARP
  23. Displaying and maintaining proxy ARP
  24. Local proxy ARP configuration example in case of port isolation
  25. Local proxy ARP configuration example in super VLAN
  26. Local proxy ARP configuration example in isolate-user-VLAN
  27. Configuring ARP snooping
  28. Configuring IP addressing
  29. Special IP addresses
  30. Assigning an IP address to an interface
  31. Displaying and maintaining IP addressing
  32. DHCP overview
  33. Dynamic IP address allocation process
  34. DHCP message format
  35. DHCP options
  36. Protocols and standards
  37. Configuring the DHCP server
  38. IP address allocation sequence
  39. DHCP server configuration task list
  40. Creating a DHCP address pool
  41. Configuring dynamic address allocation for an extended address pool
  42. Configuring a domain name suffix for the client
  43. Configuring BIMS server information for the client
  44. Configuring the TFTP server and bootfile name for the client
  45. Specifying a server's IP address for the DHCP client
  46. Enabling DHCP
  47. Configuration guidelines
  48. Configuring the DHCP server security functions
  49. Enabling client offline detection
  50. Specifying the threshold for sending trap messages
  51. DHCP server configuration examples
  52. Dynamic IP address assignment configuration example
  53. Self-defined option configuration example
  54. Troubleshooting DHCP server configuration
  55. Configuring the DHCP relay agent
  56. DHCP relay agent support for Option 82
  57. DHCP relay agent configuration task list
  58. Correlating a DHCP server group with a relay agent interface
  59. Configuring the DHCP relay agent security functions
  60. Enabling unauthorized DHCP server detection
  61. Configuring the DHCP relay agent to handle Option 82
  62. Setting the DSCP value for DHCP packets
  63. DHCP relay agent configuration examples
  64. DHCP relay agent Option 82 support configuration example
  65. Troubleshooting DHCP relay agent configuration
  66. Configuring DHCP client
  67. Displaying and maintaining the DHCP client
  68. Verifying the configuration
  69. Configuring DHCP snooping
  70. Application environment of trusted ports
  71. DHCP snooping support for Option 82
  72. DHCP snooping configuration task list
  73. Configuring DHCP snooping entries backup
  74. Enabling DHCP starvation attack protection
  75. Enabling DHCP-REQUEST message attack protection
  76. Displaying and maintaining DHCP snooping
  77. DHCP snooping configuration examples
  78. Configuring IPv4 DNS
  79. Configuring the IPv4 DNS client
  80. Configuring dynamic domain name resolution
  81. Displaying and maintaining IPv4 DNS
  82. Dynamic domain name resolution configuration example
  83. Troubleshooting IPv4 DNS configuration
  84. Configuring IP forwarding basics
  85. Configuring IP performance optimization
  86. Configuration example
  87. Configuring the TCP send/receive buffer size
  88. Configuring TCP timers
  89. Disadvantages of sending ICMP error packets
  90. Configuring UDP helper
  91. Displaying and maintaining UDP helper
  92. Configuring IPv6 basics
  93. IPv6 addresses
  94. IPv6 neighbor discovery protocol
  95. IPv6 path MTU discovery
  96. Configuring basic IPv6 functions
  97. manual configuration
  98. Configuring an IPv6 link-local address
  99. Configure an IPv6 anycast address
  100. Configuring IPv6 ND
  101. Setting the age timer for ND entries in stale state
  102. Configuring the maximum number of attempts to send an NS message for DAD
  103. Configuring path MTU discovery
  104. Configuring ICMPv6 packet sending
  105. Enabling sending ICMPv6 time exceeded messages
  106. Displaying and maintaining IPv6 basics configuration
  107. IPv6 basics configuration example
  108. Troubleshooting IPv6 basics configuration
  109. DHCPv6 overview
  110. IAID
  111. Assignment involving four messages
  112. Stateless DHCPv6 configuration
  113. Configuring DHCPv6 relay agent
  114. Configuration prerequisites
  115. Displaying and maintaining the DHCPv6 relay agent
  116. Configuring DHCPv6 client
  117. Stateless DHCPv6 configuration example
  118. Configuring IPv6 DNS
  119. Setting the DSCP value for IPv6 DNS packets
  120. IPv6 DNS configuration examples
  121. Configuring tunneling
  122. IPv4 over IPv4 tunneling
  123. IPv4 over IPv6 tunneling
  124. IPv6 over IPv6 tunneling
  125. Tunneling configuration task list
  126. Configuring an IPv6 manual tunnel
  127. Configuring a 6to4 tunnel
  128. configuration considerations
  129. Configuring an ISATAP tunnel
  130. Configuring an IPv4 over IPv4 tunnel
  131. Configuring an IPv4 over IPv6 tunnel
  132. Configuring an IPv6 over IPv6 tunnel
  133. Displaying and maintaining tunneling configuration
  134. Configuring GRE
  135. GRE encapsulation and de-encapsulation processes
  136. Configuring a GRE over IPv4 tunnel
  137. Configuring a GRE over IPv6 tunnel
  138. Displaying and maintaining GRE
  139. GRE over IPv6 tunnel configuration example
  140. verify the configuration
  141. Troubleshooting GRE
  142. Support and other resources
  143. Conventions
  144. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Configuring basic MPLS
  9. MPLS network architecture
  10. LSP establishment
  11. MPLS forwarding
  12. Protocols and standards
  13. MPLS configuration task list
  14. Setting MPLS MTU
  15. Specifying the label type advertised by egress
  16. Enabling sending MPLS TTL-expired messages
  17. Configuring a static LSP
  18. Configuration procedure
  19. Configuration restrictions and guidelines
  20. Verifying the configuration
  21. Configuring LDP
  22. LDP operation
  23. Label distribution and control
  24. LDP-IGP synchronization
  25. LDP over MPLS TE
  26. Protocols
  27. Enabling LDP
  28. Configuring Hello parameters
  29. Restrictions and guidelines
  30. Configuring LDP backoff
  31. Configuring LDP to redistribute BGP unicast routes
  32. Configuring the LDP label distribution control mode
  33. Configuring a label acceptance policy
  34. Configuring LDP loop detection
  35. Configuring LDP session protection
  36. Configuring LDP GR
  37. Configuring LDP IS-IS synchronization
  38. Resetting LDP sessions
  39. IPv4 LDP configuration examples
  40. Label acceptance control configuration example
  41. Label advertisement control configuration example
  42. LDP FRR configuration example
  43. IPv6 LDP configuration examples
  44. IPv6 label acceptance control configuration example
  45. IPv6 label advertisement control configuration example
  46. Configuring MPLS TE
  47. CRLSP establishment using PCE path calculation
  48. Traffic forwarding
  49. Make-before-break
  50. Route pinning
  51. DiffServ-aware TE
  52. Bidirectional MPLS TE tunnel
  53. Enabling MPLS TE
  54. Configuring DS-TE
  55. Configuring an MPLS TE tunnel to use a dynamic CRLSP
  56. Configuring MPLS TE attributes for a link
  57. Configuring MPLS TE tunnel constraints
  58. Establishing an MPLS TE tunnel by using RSVP-TE
  59. Controlling MPLS TE tunnel setup
  60. Configuring an MPLS TE tunnel to use a CRLSP calculated by PCEs
  61. Establishing a CRLSP by using the path calculated by PCEs
  62. Configuring traffic forwarding
  63. Configuring a bidirectional MPLS TE tunnel
  64. Configuring CRLSP backup
  65. Configuring MPLS TE FRR
  66. Configuring node fault detection
  67. Enabling SNMP notifications for MPLS TE
  68. MPLS TE configuration examples
  69. Establishing an MPLS TE tunnel with RSVP-TE
  70. Establishing an inter-AS MPLS TE tunnel with RSVP-TE
  71. Establishing an inter-area MPLS TE tunnel over a CRLSP calculated by PCEs
  72. Bidirectional MPLS TE tunnel configuration example
  73. CRLSP backup configuration example
  74. Manual bypass tunnel for FRR configuration example
  75. Auto FRR configuration example
  76. IETF DS-TE configuration example
  77. Troubleshooting MPLS TE
  78. Configuring a static CRLSP
  79. Configuring RSVP
  80. CRLSP setup procedure
  81. RSVP authentication
  82. Configuring RSVP refresh
  83. Configuring RSVP authentication
  84. Setting a DSCP value for outgoing RSVP packets
  85. Displaying and maintaining RSVP
  86. RSVP GR configuration example
  87. Configuring tunnel policies
  88. Tunnel policy configuration examples
  89. Configuring MPLS L3VPN
  90. MPLS L3VPN route advertisement
  91. MPLS L3VPN packet forwarding
  92. MPLS L3VPN networking schemes
  93. Inter-AS VPN
  94. OSPF VPN extension
  95. BGP AS number substitution and SoO attribute
  96. MPLS L3VPN FRR
  97. ECMP VPN route redistribution
  98. Configuring basic MPLS L3VPN
  99. Configuring routing between a PE and a CE
  100. Configuring routing between PEs
  101. Configuring inter-AS VPN
  102. Configuring inter-AS option B
  103. Configuring inter-AS option C
  104. Configuring an OSPF sham link
  105. Configuring a loopback interface
  106. Specifying the VPN label processing mode on the egress PE
  107. Configuring MPLS L3VPN FRR
  108. Configuring BGP RT filtering
  109. Procedure
  110. Enabling ECMP VPN route redistribution
  111. Enabling SNMP notifications for MPLS L3VPN
  112. Displaying and maintaining MPLS L3VPN
  113. MPLS L3VPN configuration examples
  114. Configuring a hub-spoke network
  115. Configuring MPLS L3VPN inter-AS option A
  116. Configuring MPLS L3VPN inter-AS option B
  117. Configuring MPLS L3VPN inter-AS option C
  118. Configuring BGP AS number substitution
  119. Configuring BGP AS number substitution and SoO attribute
  120. Configuring MPLS L3VPN FRR through VPNv4 route backup for a VPNv4 route
  121. Configuring MPLS L3VPN FRR through VPNv4 route backup for an IPv4 route
  122. Configuring MPLS L3VPN FRR through IPv4 route backup for a VPNv4 route
  123. Configuring IPv6 MPLS L3VPN
  124. IPv6 MPLS L3VPN routing information advertisement
  125. Configuring BGP VPNv6 route control
  126. Configuring inter-AS IPv6 VPN
  127. Configuring inter-AS IPv6 VPN option A
  128. Configuring an OSPFv3 sham link
  129. Creating a sham link
  130. Enabling logging for BGP route flapping
  131. IPv6 MPLS L3VPN configuration examples
  132. Configuring IPv6 MPLS L3VPN inter-AS option A
  133. Configuring IPv6 MPLS L3VPN inter-AS option C
  134. Configuring MPLS L2VPN
  135. Remote connection model
  136. PW types
  137. Control word
  138. Multi-segment PW
  139. VCCV
  140. Restrictions and guidelines for MPLS L2VPN
  141. Enabling L2VPN
  142. Configuring a PW
  143. Configuring an LDP PW
  144. Configuring a remote CCC connection
  145. Binding an Ethernet service instance to a cross-connect
  146. Configuring PW redundancy
  147. Configuring LDP PW redundancy
  148. MPLS L2VPN configuration examples
  149. Configuring a BGP PW
  150. Configuring an intra-domain multi-segment PW
  151. Configuring an inter-domain multi-segment PW
  152. Configuring VPLS
  153. VPLS implementation
  154. H-VPLS
  155. Restrictions and guidelines for VPLS
  156. Configuring a VSI
  157. Configuring a BGP auto-discovery LDP PW
  158. Binding an Ethernet service instance to a VSI
  159. Configuring UPE dual homing
  160. Configuring MAC address learning
  161. VPLS configuration examples
  162. LDP PW configuration example
  163. BGP PW configuration example
  164. BGP auto-discovery LDP PW configuration example
  165. H-VPLS using MPLS access configuration example
  166. Ethernet service instance and VSI binding configuration example
  167. H-VPLS UPE dual homing configuration example
  168. Configuring MPLS OAM
  169. Configuring MPLS ping for LSPs
  170. Configuring MCE
  171. MCE overview
  172. MCE configuration task list
  173. Creating a VPN instance
  174. Configuring routing on an MCE
  175. Configuring routing between an MCE and a VPN site
  176. Configuring routing between an MCE and a PE
  177. Displaying and maintaining MCE
  178. Configuring the MCE that uses EBGP to advertise VPN routes to the PE
  179. Configuring IPv6 MCE
  180. Configuring VPN instances
  181. Configuring route related attributes for a VPN instance
  182. Displaying and maintaining IPv6 MCE
  183. IPv6 MCE configuration example
  184. Document conventions and icons
  185. Network topology icons
  186. Support and other resources
  187. Websites
  188. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Using the CLI
  9. Entering system view from user view
  10. Using the undo form of a command
  11. Entering a command
  12. Abbreviating commands
  13. Configuring and using command hotkeys
  14. Enabling redisplaying entered-but-not-submitted commands
  15. Using the command history function
  16. Pausing between screens of output
  17. Filtering the output from a display command
  18. Saving the output from a display command to a file
  19. Viewing and managing the output from a display command effectively
  20. Login overview
  21. Logging in through the console port for the first device access
  22. Logging in to the CLI
  23. Login authentication modes
  24. Logging in through the console port locally
  25. Configuring password authentication for console login
  26. Configuring scheme authentication for console login
  27. Logging in through Telnet
  28. configuring password authentication for telnet login
  29. configuring scheme authentication for telnet login
  30. Using the device to log in to a Telnet server
  31. Logging in through SSH
  32. Using the device to log in to an SSH server
  33. Displaying and maintaining CLI login
  34. Accessing the device through SNMP
  35. Configuring SNMPv1 or SNMPv2c access
  36. Controlling user access
  37. Configuration example
  38. Configuring command authorization
  39. Configuring command accounting
  40. Configuration procedure
  41. Configuring RBAC
  42. Assigning user roles
  43. Creating user roles
  44. Configuring feature groups
  45. Changing the interface policy of a user role
  46. Assigning user roles to local AAA authentication users
  47. Configuring temporary user role authorization
  48. Configuring user role authentication
  49. Obtaining temporary user role authorization
  50. RBAC configuration examples
  51. RBAC configuration example for RADIUS authentication users
  52. RBAC configuration example for HWTACACS authentication users
  53. Troubleshooting RBAC
  54. Login attempts by RADIUS users always fail
  55. Configuring FTP
  56. Configuring authentication and authorization
  57. Manually releasing FTP connections
  58. FTP server configuration example in IRF mode
  59. Using the device as an FTP client
  60. Managing directories on the FTP server
  61. Changing to another user account
  62. Terminating the FTP connection
  63. FTP client configuration example in IRF mode
  64. Configuring TFTP
  65. Configuring the device as an IPv6 TFTP client
  66. Managing the file system
  67. Managing files
  68. Copying a file
  69. Deleting files from the recycle bin
  70. Displaying directory information
  71. Managing storage media
  72. Setting the operation mode for files and folders
  73. Managing configuration files
  74. Configuration file formats
  75. Startup configuration file selection
  76. Enabling configuration encryption
  77. Specifying a next-startup configuration file
  78. Backing up the main next-startup configuration file to a TFTP server
  79. Deleting a next-startup configuration file
  80. Upgrading software
  81. Comware image redundancy and loading procedure
  82. Upgrade methods
  83. Preparing for the upgrade
  84. Specifying the startup image file and completing the upgrade (in standalone mode)
  85. Specifying the startup image file and completing the upgrade (in IRF mode)
  86. Restoring or downgrading the BootWare image
  87. Displaying and maintaining software image settings
  88. ISSU overview
  89. ISSU methods for a compatible version
  90. ISSU method for an incompatible version
  91. ISSU prerequisites
  92. Performing an ISSU by using issu series commands
  93. Performing an ISSU for a single-MPU device
  94. Performing an ISSU in IRF mode
  95. Performing an ISSU for a multichassis IRF fabric
  96. Performing an ISSU for a dual-MPU single-chassis IRF fabric
  97. Performing an ISSU for a single-MPU single-chassis IRF fabric
  98. Displaying and maintaining ISSU
  99. ISSU examples for using issu series commands in standalone mode
  100. Feature upgrade to an incompatible version
  101. Feature rollback example
  102. ISSU examples for using issu series commands in IRF mode
  103. Performing an ISSU by using install series commands
  104. Uninstalling feature or patch images
  105. Rolling back the software configuration
  106. Aborting a software activate/deactivate operation
  107. ISSU examples for using install series commands in standalone mode
  108. ISSU examples for using install series commands in IRF mode
  109. Managing the device
  110. Specifying the system time source
  111. Configuring banners
  112. Rebooting the device
  113. Scheduling a device reboot
  114. Schedule configuration example
  115. Disabling password recovery capability
  116. Setting the port status detection timer
  117. Setting memory usage thresholds
  118. Configuring the temperature alarm thresholds
  119. Specifying a traffic load sharing mode for an LPU
  120. Specifying an operating mode for an LPU
  121. Configuration guidelines
  122. Configuring the asset profile of a physical component
  123. Verifying and diagnosing transceiver modules
  124. Disabling alarm traps for transceiver modules
  125. Configuring Tcl
  126. Configuring MDCs
  127. Default MDC and non-default MDCs
  128. Creating an MDC
  129. Assigning physical interfaces to an MDC
  130. Specifying a CPU weight for an MDC
  131. Specifying a memory space percentage for an MDC
  132. Displaying and maintaining MDCs
  133. Using automatic configuration
  134. Interface selection process
  135. Automatic-configuration parameter acquisition process
  136. Deploying and configuring servers for automatic configuration
  137. DHCP server configuration guidelines
  138. Support and other resources
  139. Conventions
  140. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Configuring AAA
  14. RADIUS
  15. HWTACACS
  16. LDAP
  17. AAA implementation on the device
  18. AAA for MPLS L3VPNs
  19. RADIUS attributes
  20. FIPS compliance
  21. Configuring AAA schemes
  22. configuring user group attributes
  23. Configuring RADIUS schemes
  24. Configuring HWTACACS schemes
  25. Configuring LDAP schemes
  26. Configuring AAA methods for ISP domains
  27. Creating an ISP domain
  28. Configuring authentication methods for an ISP domain
  29. Configuring authorization methods for an ISP domain
  30. Configuring accounting methods for an ISP domain
  31. Enabling the session-control feature
  32. Configuring the RADIUS DAE server feature
  33. Configuring a NAS-ID profile
  34. Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users
  35. Authentication and authorization for SSH users by a RADIUS server
  36. Authentication for SSH users by an LDAP server
  37. AAA for 802.1X users by a RADIUS server
  38. Troubleshooting RADIUS
  39. RADIUS packet delivery failure
  40. Troubleshooting LDAP
  41. X overview
  42. X-related protocols
  43. EAP over RADIUS
  44. X authentication initiation
  45. X authentication procedures
  46. EAP relay
  47. EAP termination
  48. Configuring 802.1X
  49. Guest VLAN
  50. Auth-Fail VLAN
  51. Critical VLAN
  52. Using 802.1X authentication with other features
  53. Redirect URL assignment
  54. Configuration prerequisites
  55. Enabling 802.1X
  56. Enabling EAP relay or EAP termination
  57. Specifying an access control method
  58. Setting the 802.1X authentication timeout timers
  59. Configuration guidelines
  60. Configuration procedure
  61. Enabling the periodic online user reauthentication feature
  62. Manually reauthenticating all online 802.1X users on a port
  63. Configuring an 802.1X guest VLAN
  64. Enabling the 802.1X critical voice VLAN
  65. Sending EAP-Success packets for 802.1X users assignment to the 802.1X critical VLAN
  66. Enabling 802.1X guest VLAN assignment delay
  67. Configuring 802.1X SmartOn
  68. Displaying and maintaining 802.1X
  69. X guest VLAN and authorization VLAN configuration example
  70. X with ACL assignment configuration example
  71. X with EAD assistant configuration example (with DHCP relay agent)
  72. X with EAD assistant configuration example (with DHCP server)
  73. X SmartOn configuration example
  74. Troubleshooting 802.1X EAD assistant for Web browser users
  75. Configuring MAC authentication
  76. VLAN assignment
  77. ACL assignment
  78. Configuration task list
  79. Configuring the user account format
  80. Enabling MAC authentication offline detection
  81. Configuring MAC authentication delay
  82. Configuration restrictions and guidelines
  83. Configuring a MAC authentication critical VLAN
  84. Enabling the MAC authentication critical voice VLAN
  85. Including user IP addresses in MAC authentication requests
  86. MAC authentication configuration examples
  87. RADIUS-based MAC authentication configuration example
  88. ACL assignment configuration example
  89. ftp server
  90. Configuring portal authentication
  91. Interaction between portal system components
  92. Portal support for EAP
  93. Portal configuration task list
  94. Configuring a portal authentication server
  95. Enabling portal authentication on an interface
  96. Specifying a portal Web server on an interface
  97. Configuring an authentication source subnet
  98. Configuring an authentication destination subnet
  99. Setting the maximum number of portal users
  100. Enabling outgoing packets filtering on a portal-enabled interface
  101. Configuring portal authentication server detection
  102. Configuring portal Web server detection
  103. Configuring portal user synchronization
  104. Configuring the portal fail-permit feature
  105. Applying a NAS-ID profile to an interface
  106. Configuring the local portal Web server feature
  107. Configuring a local portal Web server
  108. Logging out online portal users
  109. Portal configuration examples
  110. authentication server
  111. Configuring re-DHCP portal authentication
  112. Configuring cross-subnet portal authentication
  113. Configuring extended direct portal authentication
  114. Configuring extended re-DHCP portal authentication
  115. Configuring extended cross-subnet portal authentication
  116. Configuring portal server detection and portal user synchronization
  117. Configuring cross-subnet portal authentication for MPLS L3VPNs
  118. Configuring direct portal authentication using the local portal Web server
  119. Troubleshooting portal
  120. Cannot log out portal users on the RADIUS server
  121. Configuring port security
  122. General guidelines and restrictions
  123. Setting port security's limit on the number of secure MAC addresses on a port
  124. Configuring port security features
  125. Configuring secure MAC addresses
  126. Enabling MAC move
  127. Applying a NAS-ID profile to port security
  128. Port security configuration examples
  129. userLoginWithOUI configuration example
  130. configure port security
  131. macAddressElseUserLoginSecure configuration example
  132. Troubleshooting port security
  133. Configuring password control
  134. Password updating and expiration
  135. User login control
  136. Setting global password control parameters
  137. Setting user group password control parameters
  138. Setting local user password control parameters
  139. Displaying and maintaining password control
  140. Verifying the configuration
  141. Managing public keys
  142. Distributing a local host public key
  143. Destroying a local key pair
  144. Entering a peer host public key
  145. Example for importing a public key from a public key file
  146. Configuring SSL
  147. Configuring an SSL client policy
  148. Displaying and maintaining SSL
  149. Configuring PKI
  150. PKI architecture
  151. PKI applications
  152. Configuring a PKI domain
  153. Requesting a certificate
  154. Configuring automatic certificate request
  155. Aborting a certificate request
  156. Verifying certificates without CRL checking
  157. Specifying the storage path for the certificates and CRLs
  158. Removing a certificate
  159. Displaying and maintaining PKI
  160. Requesting a certificate from an RSA Keon CA server
  161. Requesting a certificate from a Windows Server 2003 CA server
  162. Requesting a certificate from an OpenCA server
  163. Certificate-based access control policy configuration example
  164. Certificate import and export configuration example
  165. Troubleshooting PKI configuration
  166. Failed to obtain the CA certificate
  167. Failed to request local certificates
  168. Failed to obtain CRLs
  169. Failed to import the local certificate
  170. Failed to set the storage path
  171. Configuring IPsec
  172. Security association
  173. IPsec implementation
  174. IPsec RRI
  175. Protocols and standards
  176. Configuring an ACL
  177. Configuring an IPsec transform set
  178. Configuring a manual IPsec policy
  179. Configuring an IKE-based IPsec policy
  180. Applying an IPsec policy to an interface
  181. Enabling ACL checking for de-encapsulated packets
  182. Configuring IPsec anti-replay redundancy
  183. Binding a source interface to an IPsec policy
  184. Enabling logging of IPsec packets
  185. Configuring the DF bit of IPsec packets
  186. Configuring IPsec for IPv6 routing protocols
  187. Configuring SNMP notifications for IPsec
  188. Displaying and maintaining IPsec
  189. IPsec configuration examples
  190. Configuring an IKE-based IPsec tunnel for IPv4 packets
  191. Configuring an IKE-based IPsec tunnel for IPv6 packets
  192. Configuring IPsec for RIPng
  193. Configuring IKE
  194. IKE security mechanism
  195. Configuring an IKE profile
  196. Configuring an IKE proposal
  197. Configuring an IKE keychain
  198. Configuring the global identity information
  199. Configuring the IKE keepalive feature
  200. Enabling invalid SPI recovery
  201. Setting the maximum number of IKE SAs
  202. Displaying and maintaining IKE
  203. Aggressive mode with RSA signature authentication configuration example
  204. Troubleshooting IKE
  205. IPsec SA negotiation failed because no matching IPsec transform sets were found
  206. Configuring IKEv2
  207. New features in IKEv2
  208. Configuring an IKEv2 profile
  209. Configuring an IKEv2 policy
  210. Configuring an IKEv2 proposal
  211. Configuring an IKEv2 keychain
  212. Configure global IKEv2 parameters
  213. Configuring the IKEv2 NAT keepalive feature
  214. IKEv2 configuration examples
  215. IKEv2 with RSA signature authentication configuration example
  216. Troubleshooting IKEv2
  217. Configuring SSH
  218. SSH authentication methods
  219. SSH support for Suite B
  220. Enabling the Stelnet server
  221. Enabling the SCP server
  222. Configuring a client's host public key
  223. Configuring an SSH user
  224. Configuring the SSH management parameters
  225. Specifying a PKI domain for the SSH server
  226. Specifying the source IP address for SSH packets
  227. Establishing a connection to an Stelnet server based on Suite B
  228. Establishing a connection to an SFTP server
  229. Establishing a connection to an SFTP server based on Suite B
  230. Working with SFTP directories
  231. Displaying help information
  232. Establishing a connection to an SCP server based on Suite B
  233. Specifying public key algorithms for SSH2
  234. Specifying MAC algorithms for SSH2
  235. Publickey authentication enabled Stelnet server configuration example
  236. Password authentication enabled Stelnet client configuration example
  237. Publickey authentication enabled Stelnet client configuration example
  238. Stelnet configuration example based on 128-bit Suite B algorithms
  239. SFTP configuration examples
  240. Password authentication enabled SFTP server configuration example
  241. Publickey authentication enabled SFTP client configuration example
  242. SFTP configuration example based on 192-bit Suite B algorithms
  243. SCP configuration examples
  244. SCP configuration example based on Suite B algorithms
  245. NETCONF over SSH configuration example with password authentication
  246. Configuring IP source guard
  247. Dynamic IPSG bindings
  248. Configuring the IPv4SG feature
  249. Configuring the IPv6SG feature
  250. Displaying and maintaining IPSG
  251. IPSG configuration examples
  252. Dynamic IPv4SG using DHCP snooping configuration example
  253. Dynamic IPv4SG using DHCP relay configuration example
  254. Static IPv6SG configuration example
  255. Dynamic IPv6SG using DHCPv6 snooping configuration example
  256. Configuring ARP attack protection
  257. Configuring ARP source suppression
  258. Configuration example
  259. Configuring ARP packet rate limit
  260. Configuring source MAC-based ARP attack detection
  261. Configuring ARP packet source MAC consistency check
  262. Configuring authorized ARP
  263. Configuration example (on a DHCP relay agent)
  264. Configuring ARP detection
  265. Configuring user validity check
  266. Configuring ARP packet validity check
  267. Enabling ARP detection logging
  268. User validity check and ARP packet validity check configuration example
  269. Configuring ARP scanning and fixed ARP
  270. Configuring the checking of sender IP addresses for ARP packets
  271. Configuring uRPF
  272. uRPF operation
  273. Network application
  274. Configuring IPv6 uRPF
  275. IPv6 uRPF operation
  276. Configuring FIPS
  277. Configuring FIPS mode
  278. Configuration changes in FIPS mode
  279. Exiting FIPS mode
  280. Power-up self-tests
  281. Triggering self-tests
  282. Entering FIPS mode through manual reboot
  283. Exiting FIPS mode through automatic reboot
  284. Configuring attack detection and prevention
  285. Scanning attacks
  286. Flood attacks
  287. TCP fragment attack
  288. Attack detection and prevention configuration task list
  289. Configuring a scanning attack defense policy
  290. Configuring attack detection exemption
  291. Applying an attack defense policy to the device
  292. Configuring TCP fragment attack prevention
  293. Configuring login attack prevention
  294. Displaying and maintaining attack detection and prevention
  295. Attack detection and prevention configuration examples
  296. IP blacklist configuration example
  297. Configuring MACsec
  298. MACsec applications
  299. MACsec configuration task list
  300. Configuring a preshared key
  301. Configuring the MACsec confidentiality offset
  302. Configuring MACsec protection parameters by MKA policy
  303. Applying an MKA policy
  304. Troubleshooting MACsec
  305. Configuring MFF
  306. Basic concepts
  307. MFF working mechanism
  308. Configuring a network port
  309. Displaying and maintaining MFF
  310. Auto-mode MFF configuration example in a ring network
  311. Manual-mode MFF configuration example in a tree network
  312. Manual-mode MFF configuration example in a ring network
  313. Configuring ND attack defense
  314. Configuring ND attack detection
  315. Specifying the role of the attached device
  316. Enabling the RA guard logging feature
  317. Configuring keychains
  318. Displaying and maintaining keychain
  319. configuring switch b
  320. Document conventions and icons
  321. Network topology icons
  322. Support and other resources
  323. Websites
  324. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Table of contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. using the cli
  11. Entering system view from user view
  12. Using the undo form of a command
  13. Entering a command
  14. abbreviating commands
  15. Configuring and using command hotkeys
  16. Enabling redisplaying entered-but-not-submitted commands
  17. Using the command history feature
  18. Pausing between screens of output
  19. Filtering the output from a display command
  20. Saving the output from a display command to a file
  21. Viewing and managing the output from a display command effectively
  22. configuring rbac
  23. User role assignment
  24. Configuration task list
  25. Configuration restrictions and guidelines
  26. Configuring feature groups
  27. Configuring resource access policies
  28. Configuring the VPN instance policy of a user role
  29. Assigning user roles to remote AAA authentication users
  30. Configuring temporary user role authorization
  31. Configuring user role authentication
  32. Obtaining temporary user role authorization
  33. RBAC configuration example for RADIUS authentication users
  34. RBAC temporary user role authorization configuration example (HWTACACS authentication)
  35. radius authentication
  36. Troubleshooting RBAC
  37. Login overview
  38. Using the console port for the first device access
  39. cli overview
  40. user roles
  41. FIPS compliance
  42. configuring password authentication for console login
  43. configuring scheme authentication for console login
  44. Configuring Telnet login
  45. Configuring the device as a Telnet server
  46. configuring password authentication for telnet login
  47. Using the device to log in to a Telnet server
  48. configuring the device as an ssh server
  49. displaying and maintaining cli login
  50. Accessing the device through SNMP
  51. configuration procedures
  52. Configuration example
  53. Configuring command authorization
  54. Configuring command accounting
  55. configuring ftp
  56. Configuring basic parameters
  57. Manually releasing FTP connections
  58. FTP server configuration example in IRF mode
  59. establishing an ftp connection
  60. Managing directories on the FTP server
  61. Working with files on the FTP server
  62. Changing to another user account
  63. Terminating the FTP connection
  64. FTP client configuration example in IRF mode
  65. configuring tftp
  66. Configuring the device as an IPv6 TFTP client
  67. Managing the file system
  68. Managing files
  69. renaming a file
  70. Deleting/restoring a file
  71. displaying directory information
  72. Deleting a directory
  73. Repairing a storage medium
  74. Partitioning a CF card or USB disk
  75. Setting the operation mode for files and folders
  76. managing configuration files
  77. Next-startup configuration file redundancy
  78. Saving the running configuration
  79. Configuring configuration rollback
  80. Configuring configuration archive parameters
  81. Enabling automatic configuration archiving
  82. Specifying a next-startup configuration file
  83. Backing up the main next-startup configuration file to a TFTP server
  84. Restoring the main next-startup configuration file from a TFTP server
  85. Displaying and maintaining configuration files
  86. upgrading software
  87. Software file naming conventions
  88. System startup process
  89. PEX startup process
  90. upgrade methods
  91. Upgrade restrictions and guidelines
  92. Upgrade task list
  93. Specifying startup images and completing the upgrade
  94. IRF mode
  95. Restoring or downgrading the BootWare image without using ISSU
  96. Enabling software synchronization from the active MPU to the standby MPU at startup
  97. Upgrade procedure
  98. Displaying and maintaining software image settings
  99. Configuration procedure
  100. Verifying the configuration
  101. Performing an ISSU
  102. ISSU commands
  103. Verifying the device operating status
  104. Determining the upgrade procedure
  105. Performing an ISSU by using issu commands
  106. Performing an incompatible upgrade
  107. Performing an ISSU by using install commands
  108. Uninstalling feature or patch images
  109. Aborting a software activate/deactivate operation
  110. Deleting inactive software images
  111. Troubleshooting ISSU in IRF mode
  112. Feature upgrade to an incompatible version
  113. Examples of using issu commands for ISSU on a four-member IRF fabric
  114. Feature upgrade to an incompatible version (upgrading one subordinate member first)
  115. Feature upgrade to an incompatible version (upgrading multiple subordinate members first)
  116. Examples of using issu commands for ISSU on an eIRF system
  117. Examples of using install commands for ISSU on a standalone device
  118. irf fabric
  119. Examples of using install commands for ISSU on an eIRF system
  120. Using automatic configuration
  121. configuration files
  122. script files
  123. Configuring the DHCP server when a TFTP file server is used
  124. Configuring the DNS server
  125. Automatic configuration examples
  126. enable dhcp
  127. Automatic configuration using HTTP server and Tcl script
  128. Automatic configuration using HTTP server and Python script
  129. Automatic IRF setup
  130. managing the device
  131. configuring the system time
  132. Enabling displaying the copyright statement
  133. rebooting the device
  134. Configuration guidelines
  135. Scheduling a task
  136. Schedule configuration example
  137. Setting the port status detection timer
  138. Setting memory alarm thresholds
  139. Configuring the temperature alarm thresholds
  140. Specifying an operating mode for a service module
  141. Enabling the port down feature globally
  142. Isolating a switching fabric module
  143. verifying and diagnosing transceiver modules
  144. diagnosing transceiver modules
  145. Displaying and maintaining device management configuration
  146. Using Tcl
  147. Managing the system with BootWare
  148. restrictions and guidelines
  149. Modifying serial port parameters
  150. Updating the entire BootWare
  151. Using the BASIC-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A))
  152. Updating the extended BootWare segment
  153. Running the backup extended BootWare segment
  154. Running the Comware software
  155. Upgrading Comware software through the management Ethernet port
  156. Restoring the factory-default configuration
  157. Skipping the configuration file at the next startup
  158. Skipping console login authentication
  159. Managing storage media
  160. Using the EXTENDED ASSISTANT menu
  161. Using the EXTENDED-BOOTWARE menu (for all MPUs except LSU1SUPB0(JG496A))
  162. BootWare shortcut keys
  163. Disabling password recovery capability
  164. Comware software upgrade examples
  165. Using TFTP to upgrade Comware software through the management Ethernet port
  166. Using FTP to upgrade Comware software through the management Ethernet port
  167. Using Python
  168. Comware V7 extended Python API
  169. Transfer class
  170. API get_self_slot
  171. API get_slot_range
  172. API get_slot_info
  173. support and other resources
  174. command conventions
  175. Index
10500 series first page preview

10500 series

Brand: HP | Category: Switch
Related products
F5000-SF500011900F5000-CA-F5000Photosmart 7500A-F1000-EProCurve Access Controller 720wlJ8153AJD272A
HP categories
More HP categories