Home
HP 1920-24G-PoE+ User's Manual
Contents
1. EA ars DHCP DISCOVER unicast DHCP OFFER unicast DHCP REQUEST unicast DHCP ACK unicast Recommended configuration procedure Task Enabling DHCP and configuring advanced parameters for the DHCP relay agent Creating a DHCP server group Enabling the DHCP relay agent on an interface Configuring and displaying clients IP to MAC bindings Remarks Required Enable DHCP globally and configure advanced DHCP parameters By default global DHCP is disabled Required To improve reliability you can specify several DHCP servers as a group on the DHCP relay agent and correlate a relay agent interface with the server group When the interface receives requesting messages from clients the relay agent forwards them to all the DHCP servers of the group Required Enable the DHCP relay agent on an interface and correlate the interface with a DHCP server group IMPORTANT The DHCP relay agent works on interfaces with IP addresses manually contigured only Optional Create a static IP to MAC binding and view static and dynamic bindings The DHCP relay agent can dynamically record clients IP 4o MAC bindings after clients get IP addresses It also supports static bindings that is you can manually configure IP 4o MAC bindings on the DHCP relay agent so that users can access external network using fixed IP addresses By default no static binding is created 298 Enabli
2. ID Description 1 VLAN 0004 Modify VLAN description Note you can do this later on the Modify VLAN page Modify the description of the selected VLAN ID Description Pott Chars Contigure GigabitEthernet 1 0 1 as a hybrid port a Select Device gt Port Management from the navigation tree b Click the Setup tab c Select Hybrid trom the Link Type list d Select GigabitEthernet 1 0 1 from the chassis front panel e Click Apply 164 Figure 155 Configuring GigabitEthernet 1 0 1 as a hybrid port Summary Detail Basic Configuration Port State No Change r Speed No Change a Duplex No Change Link Type Hybrid E PVD 1 4094 Description Chars 1 80 Advanced Configuration Flow TEE I MDI No Change ee No Change ae Max MAC Power Save No Change Coumi No Change 0 8192 Storm Suppression J i r Y ri Y i r Broadcast No Change Multicast No Change Unicast nll Suppression Suppression Suppression pps range 1 148810 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port _ kbps range 1 100000 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port _ Select All Select None Unit Selected Ports p e It may take some time if vou apply the above settings to multiple ports Apply Cancel 3 Configure the voice VLAN function globally a Select Network gt Voice VLAN from the navigation tree b Click the Setup tab c Select Enable in the Voice VLAN security lis
3. 267 Timer Description before the timer Message received Action after the timer expires expires Dynamic member switch starts or resets an aging port aging timer timer for the port When the When a port dynamically joins an IPv6 multicast group the The switch removes this port from the MLD snooping forwarding timer expires the dynamic table member port ages out MLD membership report NOTE In MLD snooping only dynamic ports age out How MLD snooping works The ports in this section are dynamic ports MLD messages include general query MLD report and done message An MLD snooping enabled switch performs differently depending on the MLD message General query The MLD querier periodically sends MLD general queries to all hosts and routers on the local subnet to check whether any active IPv6 multicast group members exist on the subnet The destination IPv6 address of MLD general queries is FFO2 1 After receiving an MLD general query the switch forwards the query to all ports in the VLAN except the receiving port The switch also performs one of the following actions MLD report If the receiving port is a dynamic router port in the router port list the switch restarts the aging timer for the router port If the receiving port is not in the router port list the switch adds the port as a dynamic router port to the router port list and starts an aging timer for the port A host sends an MLD report t
4. Dynamic LACP Enabled sie EE EE link aggregation interface Select port s for the link aggregation interface i 7 ai E1 EN ET El Select All select None Selected Ports Unselected Ports Memebers of the link aggregation interface to be EE ideas pis ie se ae ei ee be Created Members of existing link aggregation interfaces Summary Aggregation Interface ID Member Ports Aggregation Interface Type 1 Static Apply Cancel 3 Configure a link aggregation group as described in Table 64 4 Click Apply Table 64 Configuration items liem Description Enter Link Aggregation Assign an ID to the link aggregation group to be created Intertace ID You can view the result in the Summary area at the bottom of the page Set the type of the link aggregation interface to be created Specity Interface Type e Static LACP is disabled e Dynamic LACP is enabled Select one or multiple ports to be assigned to the link aggregation group from Select port s for the link the chassis front panel aggregation interface l l You can view the result in the Summary area at the bottom of the page Displaying aggregate interface information 1 From the navigation tree select Network gt Link Aggregation The detault Summary tab appears The list on the upper part of the page displays information about all the aggregate interfaces 209 2 Choose an aggregate interface from the list The list on the lower part of the pa
5. 3 The CA verifies the digital signature approves the application and issues a certificate 385 A The RA receives the certificate from the CA sends it to the LDAP server to provide directory navigation service and notifies the entity that the certificate is successfully issued 5 The entity retrieves the certificate With the certificate the entity can communicate with other entities sately through encryption and digital signature 6 The entity makes a request to the CA when it needs to revoke its certificate The CA approves the request updates the CRLs and publishes the CRLs on the LDAP server PKI applications The PKI technology can satisty the security requirements of online transactions As an infrastructure PKI has a wide range of applications Here are some application examples e VPN A VPN is a private data communication network built on the public communication infrastructure A VPN can leverage network layer security protocols for example IPSec in conjunction with PK based encryption and digital signature technologies to achieve confidentiality e Secure email Emails require confidentiality integrity authentication and non repudiation PKI can address these needs The secure email protocol that is developing rapidly is S MIME which is based on PKI and allows for transfer of encrypted mails with signature e Web security For Web security two peers can establish an SSL connection first for transparent an
6. Configuring AAA Overview AAA Authentication Authorization and Accounting AAA provides a uniform framework for implementing network access management It provides the following security functions e Authentication ldentifies users and determines whether a user is valid e Authorization Grants user rights and controls user access to resources and services For example a user who has successfully logged in to the device can be granted read and print permissions to the files on the device e Accounting Records all network service usage information including service type start time and trattic The accounting function provides information required for charging and allows for network security surveillance application AAA typically uses a client server model as shown in Figure 334 The client runs on the network access server NAS which is also called the access device The server maintains user information centrally In an AAA network the NAS is a server for users but a client for AAA servers Figure 334 AAA application scenario Internet Network RADIUS server 1 RADIUS server 2 The NAS uses the authentication server to authenticate any user who tries to log in use network resources or access other networks The NAS transparently transmits authentication authorization and accounting information between the user and the servers The RADIUS protocol detines how a NAS and a remote server exchange user
7. Specifies the variables for example interface status and CPU usage maintained by the SNMP agent for the SNMP manager to read and set Figure 99 Relationship between an NMS agent and MIB MIB Get Set requests o de Get Set responses NMS and Traps Agent A MIB stores variables called nodes or objects in a tree hierarchy and identifies each node with a unique OID An OID is a string of numbers that describes the path from the root node to a leaf node For example the object B in Figure 100 is uniquely identitied by the OID 1 2 1 1 Figure 100 MIB tree Root SNMP provides the following basic operations e Get The NMS retrieves SNMP object nodes in an agent MIB 111 Set The NMS modities the value of an object node in an agent MIB Notifications Includes traps and informs SNMP agent sends traps or informs to report events to the NMS The difference between these two types of notification is that informs require acknowledgement but traps do not The device supports only traps SNMP protocol versions HP supports SNMPv1 SNMPv2c and SNMPv3 An NMS and an SNMP agent must use the same SNMP version to communicate with each other SNMPv1 Uses community names for authentication To access an SNMP agent an NMS must use the same community name as set on the SNMP agent If the community name used by the NMS is ditferent trom the community name set on the agent the NMS cannot establish an
8. 179 Step Descri ption Based on the configuration BPDU and the path cost of the root port the device calculates a designated port configuration BPDU for each of the other ports e The root bridge ID is replaced with that of the configuration BPDU of the root port 2 e The root path cost is replaced with that of the configuration BPDU of the root port plus the path cost of the root port e The designated bridge ID is replaced with the ID of this device e The designated port ID is replaced with the ID of this port The device compares the calculated configuration BPDU with the configuration BPDU on the port whose port role will be determined and acts depending on the result of the comparison e If the calculated configuration BPDU is superior the device considers this port as the 3 designated port replaces the configuration BPDU on the port with the calculated configuration BPDU and periodically sends the calculated configuration BPDU e If the configuration BPDU on the port is superior the device blocks this port without updating its configuration BPDU The blocked port can receive BPDUs but it cannot send BPDUs or forward any data When the network topology is stable only the root port and designated ports forward user traffic Other ports are all in the blocked state to receive BPDUs but not to forward BPDUs or user traffic Table 54 Selecting the optimum configuration BPDU Step Actions Upon receiving a configuration
9. 459 NMM RMON configuration 93 QoS policy configuration 466 QoS priority map table 475 QoS token bucket 473 QoS traffic class configuration 479 QoS traffic classification 468 QoS traffic evaluation 473 QoS traffic mirroring contiguration 481 QoS traffic redirecting configuration 481 transmitting LLDP frames 221 trap port security feature 421 type IP subnet VLAN 134 MAC address VLAN 134 policy VLAN 134 port type VLAN 154 protocol VLAN 134 U UDP AAA RADIUS packet format 365 RADIUS configuration 363 374 unicast IP routing configuration IPv4 278 IP routing configuration IPv6 278 MAC address table configuration 173 174 175 MAC address table multiport unicast entry 174 security 802 1X unicast trigger mode 324 upgrading device software 52 uploading Web device file 68 user security ARP user validity check 250 user account security MAC authentication user account policies 404 532 user level Web user level 8 user management AAA management by ISP domains 353 V validity check security ARP packet 250 security ARP user 250 VCT configuration 91 viewing device diagnostic information 54 device electronic label 54 Virtual Cable Test Use VCT Virtual Local Area Network Use VLAN VLAN assignment 802 1 X 329 assignment MAC authentication 405 Auth Fail 802 1 X 330 configuration 133 145 contiguration guidelines 149 contiguring 133 145 contiguring 802 1X Auth Fa
10. A wildcard mask also called an inverse mask is a 32 bit binary and represented in dotted decimal notation In contrast to a network mask the O bits in a wildcard mask represent do care bits while the 1 bits represent don t care bits If the do care bits in an IP address identical to the do care bits in an IP address criterion the IP address matches the criterion All don t care bits are ignored The Os and 1s in a wildcard mask can be noncontiguous For example 0 255 0 255 is a valid wildcard mask Rule numbering ACL rules can be manually numbered or automatically numbered This section describes how automatic ACL rule numbering works Rule numbering step If you do not assign an ID to the rule you are creating the system automatically assigns it a rule ID The rule numbering step sets the increment by which the system automatically numbers rules For example the default ACL rule numbering step is 5 If you do not assign IDs to rules you are creating they are automatically numbered O 5 10 15 and so on The wider the numbering step the more rules you can insert between two rules By introducing a gap between rules rather than contiguously numbering rules you have the flexibility of inserting rules in an ACL This feature is important for a contig order ACL where ACL rules are matched in ascending order of rule ID Automatic rule numbering and renumbering The ID automatically assigned to an ACL rule takes
11. Enter the IP address 192 168 1 2 and enter the port number 1812 Enter name in both the Key field and the Confirm Key field c Click Apply Figure 425 Configuring the RADIUS authentication server Add RADIUS Server Server Type Primary Authenticatio IP Address IPyd IPv6 192 168 1 2 Port 1612 1 65535 Default 1812 Key aas 1 64 Chars Confirm Key TT 1 64 Chars Apply Cancel Configure the primary accounting server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Configure the primary accounting server Select the server type Primary Accounting Enter the IP address 192 168 1 2 and enter the port number 1813 Enter money in both the Key field and the Confirm Key field 434 Figure 426 Configuring the RADIUS accounting server Add RADIUS Serer Server Type Primary Accounting IP Address IPv4 IPv amp 192 168 1 2 Port 1613 1 65535 Default 1813 Key mz ii 1 64 Chars Confirm Key TILT 1 64 Chars Apply Cancel c Click Apply The RADIUS Server Configuration area displays the servers you have configured as shown in Figure 427 Figure 427 Configuring the RADIUS scheme Add RADIUS Scheme scheme Name system 1 32 Chars Common Configuration Server Type Extended Username Format Without domain name Advanced RADIUS Server Configuration Server Type IF Address Port Operati on Pri mary Authenticatio
12. GEL EE te ec ee Te 111 NA elit EA AA OE OE RE EE cer 111 EE ELE EG 112 Recommended configuration procedure EE ESE EE ER aaaeuees 112 Enabling SNMP agent rss EG 113 Configuring EEN EE 115 er ELE VLEES 115 Adding rules to EN TYE esse eseeeseeaeeeeeeeuneeuens 116 Configuring an SNMP community Sic te gta E A EE EE OE AE EE N 117 Configuring an SNMP Tes EE EE 118 Configuring EN VET ee 120 Configuring SNMP trap TE ET ee ee 121 Displaying SNMP packet RT 123 SNMPv1 v2c configuration example ssssssssessessssssseesssssesecsssseecssssseesssssscsssnecesssisecssssnsscessnnsssssnusecsssnnneesssnnees 124 SNMPV3 configuration example ssssssssssssesssesssessesssseeesssssesessssseessssssseesssuseessssuseccsssusecsssusesesssnnsscssssusscesssuneessnnnses 127 Displaying interface STATISTICS eeeeeeereeeererreereereereeeeeecereseeseercereereseeseesreseeresecsreseeseercsrcsreseeseercereereseeseesceseereseeseeseeseeeeee 132 Configuring VLANs rssssssssesessssssessessssssenssesnscssncssnecssneesanecsasecsnsessnscssnscsaneceaneceanecsasecensecansceansccensecansceanseeansesnaseen 133 E AE NENA ENA E ee E E AA A E oe EE 133 EE D A E OE EE E 133 VLAN types sssssssssssessssessesssseeesssssscessssseseessssecesssssscsssssssessssssesssssssesssssssscesssusesesssusesssssseseessnssccessassecssaneseesssneseesssen 134 Pan OE EN EE EE EE EN 135 Recommended VLAN configuration procedures EE EE 137 Recommended configuration procedure for assigning an access port to a VLAN eers ee see se
13. L Check Fragment L Check Logging Source IP Address 10 1 1 Source Wildcard 0 0 0 0 LITime Rande Add Rule ID Operation Description Time Range 3 Configure authorized IP b From the navigation tree select Security gt Authorized IP Click Setup The authorized IP configuration page appears Select 2001 for IPv4 ACL in the Telnet field and select 2001 for IPv4 ACL in the Web HTTP field Click Apply 445 Figure 443 Configuring authorized IP summary ER S OSOS IPv4 ACL 2001 ha IPVBACL NoChange Web HTTP Py4ACL 2001 ha Apply Rule ID Operation Description Time Range 446 Configuring loopback detection A loop occurs when a port receives a packet sent by itself Loops might cause broadcast storms The purpose of loopback detection is to detect loops on ports With loopback detection enabled on an Ethernet port the device periodically checks for loops on the port If the device detects a loop on the port it operates on the port according to the preconfigured loopback detection actions When the device detects a loop on an access port it disables the port from forwarding data packets sends a trap message to the terminal and deletes the corresponding MAC address forwarding entry When the device detects a loop on a trunk port or a hybrid port it sends a trap message to the terminal If loopback detection control is also enabled on the port the device disables the port from forwarding
14. Mirroring Group ID Select Group ID v Port Type Monitor Port Stream Orientation both Select port s Ee Ee n da En En Er Er En Er EnEn AAAAAAAABEEFEEIEIEE N Port s B Available for Selection Selected Port s Note 1 Selected Port s Configured member port s 2 NotAvailable for Selection All the member ports of mirroring group on the device except Selected Port s 3 Configure ports for the mirroring group as described in Table 17 4 Click Apply A progress dialog box appears 5 After the success notification appears click Close Table 17 Configuration items ltem Description ID of the mirroring group to be configured Mirroring Group ID The available groups were added previously Select a Local mirroring group ID to configure ports for the local mirroring group Configure ports for a local mirroring group Port Type e Monitor Port Configures the monitor ports for the local mirroring group e Mirror Port Configures mirroring ports for the local mirroring group Set the direction of the traffic monitored by the monitor port of the mirroring group Stream e both Mirrors both received and sent packets on mirroring ports Orientation e inbound Mirrors only packets received by mirroring port e outbound Mirrors only packets sent by mirroring ports Click the ports to be configured on the chassis front panel If aggregate interfaces are configured on the device the page displays a list of agg
15. Slave Configuration guidelines When you configure a stack follow these guidelines e If a device is already configured as the master device of a stack you cannot modify the private IP address pool on the device e fa device is already configured as a member device of a stack the Global Settings area on the member device is not available 46 Displaying system and device information Displaying system intormation Select Summary from the navigation tree to enter the System Information page to view the basic system information system resource state and recent system logs Figure 36 System information Device Information System Resource State CPU Usage 2 HP 1920 24G Switch JG924A Temperature oc Product Information HP 1920 24G Switch Software Time Level Description Device Location Apr 26 13 06 51 083 2000 Information as MAA N EL User Command is summary ei Contact Information DO OE Eventindex 1 CommandSource 2 ConfigSource 4 da Anni a i EE ConfigDestination 2 Configuration is changed N SerialNum Apr 26 12 18 11 009 2000 Notification Console logged out from aux0 219801A08WM08B00007B Apr 26 12 18 10 428 2000 Notification Exit from configuration mode by Software Version Apr 26 12 08 58 091 2000 Warning admin logged in from 192 168 1 27 5 20 99 Alpha 1101 O Hardware Version More Logs On DeviceMore REV A amp Bootrom Version Refresh Period Manual v Refresh 109 g Running Time 0 days 4 hours 1 mi
16. The following table shows how ports of different link types handle frames Actions Access Trunk Hybrid in the inbound Checks whether the PVID is permitted on the port Tags the frame with the direction for an PVID tag e If yes tags the frame with the PVID tag untagged frame e If not drops the frame e Receives the frame if its VLAN ID is the In the inbound same as the PVID direction for a tagged frame Receives the frame if its VLAN is permitted on the port Drops the frame if its e Drops the frame if its VLAN is not permitted on the port VLAN ID is different from the PVID e Removes the tag and sends the frame if the frame carries Sends the frame if its VLAN is permitted on the port The Removes the VLAN tag and sends the frame In the outbound direction the PVID tag and the port belongs to the PVID Sends the frame without removing the tag if its VLAN is carried on the port but is different from the PVID 136 frame is sent with the VLAN tag removed or intact depending on your contiguration with the port hybrid vlan command This is true of the PVID Recommended VLAN configuration procedures Recommended contiguration procedure for assigning an access port to a VLAN Step Remarks Required 1 Creating VLANs Create one or multiple VLANs Optional 2 Configuring the link type of a port Configure the link type of the port as access By default the link type of a port is acces
17. User Group Add Local User o User name 1 55 Chars Password 1 63 Chars Confirm 1 63 Chars Password Encryption Reversible Irreversible Group system r User type Common User d Level Visitor ii service ype Web FIP Telnet LAN access SSH Expire time VLAN 1 4094 ACL 2000 4999 User profile 1 32 Chars Items marked with an asterisk are required Cancel Configure the local user as described in Table 118 Click Apply Table 118 Configuration items ltem Description Username Specify a name for the local user Specify and confirm the password of the local user Password l l The settings of these two fields must be the same Confirm Do not specify a password starting with spaces because the spaces will be ignored Password Encryption Select a password encryption method Reversible or Irreversible Select a user group for the local user Group ee ii For information about user group configuration see Configuring a user group Select a user type for the local user Common User Security Log Administrator or User type Guest Administrator Only the Common User option takes effect on this software version Select an authorization level for the local user Visitor Monitor Configure or Level Management in ascending order of priority This option takes effect on only Web FTP Telnet and SSH users Select the service types for the local user to use including Web FTP Telnet LAN access Ethernet acces
18. a server Group ID w Search Advanced Search Serer Group IO IF Address Operation Add Interface Contig A Interface Name Search Advanced Search Interface Mame DHCP Relay State Operation vlar interfacel Disabled vVlan interface2 Disabled ES User Information User Information 2 Configure a DHCP server group In the Server Group area click Add and then pertorm the following operations as shown in Figure 281 Enter 1 for Server Group ID Enter 10 1 1 1 for IP Address Click Apply Figure 281 Adding a DHCP server group DHCP Snooping server Group ID 1 0 19 IF Address 10 1 1 1 tems marked with an asterisk are required Apply Cancel 304 3 Enable the DHCP relay agent on VLAN interface 1 a In the Interface Config field click the El icon of VLAN interface 1 and then perform the following operations as shown in Figure 282 b Select the Enable option next to DHCP Relay c Select 1 for Server Group ID d Click Apply Figure 282 Enabling the DHCP relay agent on an interface and correlate it with a server group DHCP Snooping Interface Mame Vilan interface DHCP Relay Enable Disable Address Match Check Enable Disable Apply Cancel Because the DHCP relay agent and server are on different subnets you need to configure a static route or dynamic routing protocol to make them reachable to each other 305 Configuring DHCP snooping DHCP snoopi
19. as shown in Figure 459 Figure 459 WRR queuing Queue 1 Weight 1 Packets to be sent through this port Queue 2 Weight 2 Sent packets t Interface JA seseees I uY v Queue Sending queue scheduling 472 A typical switch provides eight output queues per port WRR assigns each queue a weight value represented by w7 w w5 w4 w3 w2 w1 or wO to decide the proportion of resources assigned to the queue On a 100 Mbps port you can set the weight values of WRR queuing to 25 25 15 15 5 5 5 and 5 corresponding to w7 w w5 w4 w3 w2 wl and wO respectively In this way the queue with the lowest priority is assured of at least 5 Mbps of bandwidth and the disadvantage of SP queuing that packets in low priority queues might fail to be served for a long time is avoided Another advantage of WRR queuing is that while the queues are scheduled in turn the service time for each queue is not fixed If a queue is empty the next queue will be scheduled immediately This improves bandwidth resource use efficiency Basic WRR queuing contains multiple queues You can configure the weight percentage or byte count for each queue and WRR schedules these queues based on the user defined parameters in a round robin manner You can implement SP WRR queue scheduling on a port by assigning some queues on the port to the SP scheduling group when you configure WRR Packets in the SP scheduling group are scheduled pr
20. d Click Apply 501 Figure 493 Configuring the PoE ports supplying power to the IP telephones Summary PSE Setup Select Port HHE COCE OOCL Select AIl Select None Note The Select All and the Select None are only applied to current unit E Selected E Power Supplied Power Enabled Power Disabled Not Supported Power State Enable v E Power Max 1000 40000 milliwatts step 100 Power Prority High v Selected Ports GE1 0 1 GE1 0 2 Power Fault Apply Cancel 2 Enable PoE on GigabitEthernet 1 0 11 and set the maximum power of the port to 9000 milliwatts a Click the Setup tab b On the tab click to select port GigabitEthernet 1 0 11 from the chassis front panel select Enable from the Power State list and select the box before Power Max and enter 9000 c Click Apply Figure 494 Configuring the PoE port supplying power to AP Summary PSE Setup Select Port DACA AMAA eee BROOD QCOO0O PARA Hi EI H H Select All Select None Note The Select All and the Select None are only applied to current unit E Selected Power Supplied E Power Enabled Power Disabled Not Supported Power Fault Power State Enable v v Power Max 9000 1000 40000 milliwatts step 100 Power Prority No change v Selected Ports GE1 0 11 Apply Cancel After the configuration takes effect the IP telephones and AP are powered and can operate correctly 5
21. 177 190 199 configuration global 192 configuration port specific 195 device implementation 189 features 185 how it works 189 MSTI calculation 189 MSTP information display on port 197 protocols and standards 190 relationship to RSTP and STP 185 STP basic concepts 178 VLAN to instance mapping table 187 multicast configuring IGMP snooping 260 displaying IGMP snooping multicast forwarding entries 259 enabling IGMP snooping globally 256 enabling IGMP snooping in a VLAN 257 IGMP snooping configuration 252 IGMP snooping port function configuration 258 security 802 1X multicast trigger mode 324 multiport unicast entry MAC address table 174 N NAS AAA application 352 AAA contiguration 352 network ACL contiguration advanced 456 463 ACL contiguration basic 455 462 ACL configuration Ethernet frame header 459 ACL contiguration IPv4 454 ACL configuration IPv6 461 ACL packet fragment filtering 452 all operation parameters for a port 74 ARP dynamic table entry 244 ARP message format 242 ARP operation 242 ARP static entry creation 245 ARP static table entry 244 ARP table 243 CLI configuration 20 configuring client s IP to MAC bindings 302 configuring DHCP relay agent advanced parameters 299 configuring DHCP snooping functions on interface 309 creating DHCP server group 300 device idle timeout period configuration 50 device system name configuration 50 d
22. 178 STP root port 178 route FIB table optimal routes 278 static creation IPv4 280 static creation IPv6 281 static route 2 8 static routing configuration IPv4 283 static routing configuration IPv6 287 static routing default route 279 router 528 IGMP snooping router port 252 MLD snooping router port 266 routing ACL configuration 450 ACL contiguration advanced 456 463 ACL contiguration basic 455 462 ACL configuration Ethernet frame header 459 ACL configuration IPv4 454 ACL configuration IPv6 461 contiguring IGMP snooping 260 contiguring MLD snooping 274 DHCP snooping configuration 306 displaying IGMP snooping multicast forwarding entries 259 displaying MLD snooping multicast forwarding entries 2 3 enabling IGMP snooping globally 256 enabling IGMP snooping in a VLAN 257 enabling MLD snooping globally 270 enabling MLD snooping in a VLAN 270 IGMP snooping configuration 252 IGMP snooping port function configuration 258 MLD snooping configuration 266 MLD snooping port function configuration 272 port based VLAN configuration 135 QoS priority mapping 4 4 security 802 1X authentication contiguration 336 security 802 1X configuration 321 VLAN type 134 RSTP rule network convergence 184 STP basic concepts 178 ACL auto match order sort 450 ACL automatic rule numbering 451 451 ACL automatic rule renumbering 451 ACL contig match order sort
23. 2 Configure extended attributes Atter contiguring the basic attributes contigure the parameters on the Jurisdiction Configuration page of the CA server This includes selecting the proper extension protiles enabling the SCEP autovetting function and adding the IP address list for SCEP autovetting 3 Configure the CRL publishing behavior After completing the configuration perform CRL related configurations In this example select the local CRL publishing mode of HTTP and set the HTTP URL to http 4 4 4 133 447 myca crl After the contiguration make sure the system clock of the switch is synchronous to that of the CA so that the switch can request certificates and retrieve CRLs properly 399 Configuring the switch 1 Create a PKI entity From the navigation tree select Authentication gt Certificate Management The PKI entity list page is displayed by default Click Add Enter aaa as the PKI entity name enter ac as the common name and click Apply Figure 382 Creating a PKI entity Domain Certificate CRL Add PKI Entity Entity Name 1 15 Chars Common Name 1 31 Chars IP Address FQDN 1 127 Chars Country Region name symbol two characters Country Region Code compliant to I5O 3166 standard State 1 31 Chars Locality 1 31 Chars Organization 1 21 Chars Organization Unit 1 31 Chars tems marked with an asterisk are required Apply Cancel Create a PKI dom
24. 450 ACL match order 450 ACL numbering step 451 running status S NMM RMON displaying 96 saving Web device configuration 65 searching Web search function 17 Web sort function 19 security 802 1X authentication configuration 336 AAA configuration 352 359 ACL configuration 450 ACL configuration advanced 456 463 ACL configuration basic 455 462 ACL configuration Ethernet frame header 459 ACL configuration IPv4 454 ACL configuration IPv6 461 ACL packet fragment filtering 452 ARP detection configuration 250 ARP packet validity check 250 ARP user validity check 250 DHCP snooping configuration 306 308 enabling DHCP snooping 309 MAC authentication ACL assignment 411 MAC authentication configuration 404 406 408 MAC authentication methods 404 MAC authentication timers 405 MAC authentication user account policies 404 MAC local authentication configuration 408 port See port security protocols and standards RADIUS 368 RADIUS configuration 363 374 RADIUS scheme contiguration 368 seleting VLAN 142 server security 802 1X authentication configuration 336 security 802 1X configuration 321 332 security 802 1X configuration global 332 security 802 1X configuration port specitic 333 service QoS policy configuration 466 service management FIP service 314 HTTP service 314 HTTPS service 314 SFTP service 314 SSH service 314 Telnet service 314 setting 529 buffer cap
25. 6 24 MB Capacity 28 42 MB a File Size KB Boot File Type Operation F flash test_old_2126d002 bin 11 184 Backup T 7 flash default diag 94 433 a l flash system xml 0 147 flash startup cfg 1 288 F flash _startup_bak cfg 1 272 D F flash fest bin 11 214 Main l M flash ogfile logfile log 208 504 D 7 records 20 per page page 1 1 record 1 7 First Nexi 1 GO Download File Remove File Set as Main Boot File Upload File Please select disk flash v File Browse e Note Do not perform any operation when upload is in process Apply 2 Select a medium from the Please select disk list Two categories of information are displayed o Medium information including the used space the free space and the capacity of the medium o File information including all files on the medium the file sizes and the boot tile types Main or Backup The boot tile type is only displayed for an application file bin or app file that will be used as the main or backup boot file Downloading a file 1 Select Device gt File Management from the navigation tree to enter the file management page see Figure 57 2 From the Please select disk list select the medium where the file to be downloaded resides 3 Select the file from the list Only one file can be downloaded at a time 67 4 5 Click Download File The File Download dialog box appears Open the file or save the file to a path Uploading a file D IMPO
26. 89 MAC address table configuration 173 174 175 MAC authentication configuration global 406 MAC authentication configuration port specific 408 MAC based 802 1X configuration 336 MSTP configuration 177 190 199 NMM local port mirroring configuration 83 NMM port mirroring configuration 79 NMM RMON configuration 93 105 NMM SNMP configuration 111 ping 31 7 PoE contiguration 497 501 521 PoE power 497 port isolation contiguration 441 port management 69 5 port security advanced control configuration 428 port security advanced mode configuration 433 port security basic control configuration 425 port security basic mode configuration 430 port security configuration 421 423 430 port security configuration global 424 port security permitted OUls configuration 429 port based VLAN configuration 135 QoS configuration 489 QoS policy configuration 466 QoS priority mapping 4 4 QoS traftic mirroring contiguration 481 QoS traffic redirecting configuration 481 RADIUS configuration 363 374 RADIUS scheme configuration 368 security 802 1X authentication configuration 336 security 802 1X configuration 321 332 security 802 1X configuration global 332 security 802 1X configuration port specitic 333 security ARP attack protection configuration 250 security MAC authentication ACL assignment 411 security MAC authentication configuration 404 406 408 security MAC local authenti
27. A user does not need to enter a username and password for network access The device initiates a MAC authentication process when it detects an unknown source MAC address on a MAC authentication enabled port If the MAC address passes authentication the user can access authorized network resources If the authentication fails the device marks the MAC address as a silent MAC address drops the packet and starts a quiet timer The device drops all subsequent packets from the MAC address within the quiet time This quiet mechanism avoids repeated authentication during a short time If the MAC address that has failed authentication is a static MAC address or a MAC address that has passed any security authentication the device does not mark the MAC address as a silent address User account policies MAC authentication supports the following user account policies e One MAC based user account for each user The access device uses the source MAC addresses in packets as the usernames and passwords of users for MAC authentication This policy is suitable for an insecure environment e One shared user account for all users You specify one username and password which are not necessarily a MAC address for all MAC authentication users on the access device This policy is suitable for a secure environment Authentication methods You can perform MAC authentication on the access device local authentication or through a RADIUS server Local aut
28. Basic Setup Configure a rule for a basic IPv6 ACL Contigure Advanced ane Configure a rule for an advanced IPv6 ACL Configure Remove Delete an IPv ACL or its rules Configure Summary Display the queue information about a port Monitor Queue Setup Configure a queue on a port Configure Summary Display line rate configuration information Monitor Line Rate Setup Configure the line rate Configure Summary Display classifier configuration information Monitor Create Create a dlass Configure Classifier Setup Configure the classification rules for a class Configure Remove Delete a class or its classification rules Configure Summary Display traffic behavior configuration information Monitor Create Create a traffic behavior Configure Tr Setup Configure actions for a traffic behavior Configure ee Contigure traffic mirroring and traffic redirecting Eeue for a traffic behavior Remove Delete a traffic behavior Configure Summary Display QoS policy configuration information Monitor Create Create a QoS policy Configure QoS Policy ote Contigure the classifier behavior associations for a ede QoS policy ed Delete a QoS policy or its classifier behavior N me associations Summary Display the QoS policy applied to a port Monitor Port Policy Setup Apply a QoS policy to a port Configure Remove Remove the QoS policy from the port Configure Priority Priority Display priority mapping table information Monitor Mapping Mapping Modify the priority mappi
29. Display information about stack members Optional Display the control panels of stack members IMPORTANT Before viewing the control panel of a member device you must make sure the username password and access right you used to log on to the master device are the same with those contigured on the member device otherwise the control panel of the member device cannot be displayed Optional Log in to the Web network management interface of a member device from the master device IMPORTANT Before logging in to a member device you must make sure the username password and access right you used to log on to the master device are the same with those configured on the member device Otherwise you cannot log in to the member device You can configure them by selecting Device and then clicking Users from the navigation tree Contiguring global parameters of a stack Select Stack from the navigation tree to enter the page shown in Figure 26 You can contigure global parameters of a stack in the Global Settings area 40 Figure 26 Setting up Topology Summary Device Summary Global Settings Private Net IP Mask Build Stack Disable v Apply Port Settings Port Name v Search Advanced Search Port Name Port Status GigabitEthernet1 0 1 not stack port GigabitEthernet1 0 2 not stack port GigabitEthernet1 0 3 not stack port GigabitEthernet1 0 4 not stack port GigabitEthernet1 0 5 not stack port 28 records 5
30. Kel filtering are permitted to use the FTP service You can view this configuration item by clicking the expanding button in front of FTP aise Enable Telnet Enable or disable the Telnet service service The Telnet service is disabled by default ser Enable SSH Enable or disable the SSH service service The SSH service is disabled by default Enable or disable the SFTP service En Enable SFTP The SFTP service is disabled by default ies IMPORTANT When you enable the SFTP service the SSH service must be enabled Tem Enable HTTP Enable or disable the HTTP service service The HTTP service is enabled by default 315 ltem Description Set the port number for HTTP service You can view this configuration item by clicking the expanding button in front of HTTP Port Number IMPORTANT When you modify a port make sure the port is not used by any other service Associate the HTTP service with an ACL Only the clients that pass the ACL filtering are permitted to use the HTTP service ACL You can view this configuration item by clicking the expanding button in front of HTTP Enable HTTPS Enable or disable the HTTPS service service The HTTPS service is disabled by default Select a local certificate for the HTTPS service from the Certificate dropdown list You can configure the certificates available in the dropdown list in Authentication gt Certificate Management For more information see Certiticate Managing certifi
31. LAN access Auth Name Secondary Method El Login AuthZ Name Secondary Method PPP Auth Name Secondary Method Portal Authz Name Secondary Method Command Auth Name d Click Apply e After the contiguration process is complete click Close Configure AAA accounting method for the ISP domain a Click the Accounting tab b Select test trom the Select an ISP domain list c Select Accounting Optional and select Enable from the list d Select Default Accounting select the accounting method RADIUS and select the accounting scheme system from the Name list e Click Apply 347 Figure 328 Configuring the AAA accounting method for the ISP domain Domain Setup Authentication Authorization Accounting Configuration of AAA Select an ISP domain test E Accounting Optional Disable Default Accounting RADIUS Name system Secondary Method E LAN access Accounting Name Secondary Method E Login Accounting Name Secondary Method PFF Accounting Name Secondary Method Fortal Accounting Name secondary Method f After the configuration process is complete click Close Configuring an ACL 1 From the navigation tree select QoS gt ACL IPv4 2 Click the Add tab 3 Enter the ACL number 3000 and click Apply Figure 329 Creating ACL 3000 Summary Basic Setup Advanced Setup Link Layer Setup Remove ACL Number S000 2000 2999 for basic ACLS 3000 3994 for advanced ACLS Match Order 4000 4999 for Ethernet frame heade
32. Max F Fort Murmber of HE n Outbound Restriction Operation rite Protection Add Del Selected F Secure MAC Address List Advanced Port Security Configuration gt Ports Enabled With Advanced Features Permitted GUIs tor ports working in the mode of 02 1 MAC Based Or oul Configure advanced port security control a In the Advanced Port Security Configuration area click Ports Enabled With Advanced Features and then click Add b Select GigabitEthernet1 0 1 from the Port list and select 802 1X MAC Based Or OUI from the Security Mode list c Click Apply Figure 433 Configuring advanced port security control settings on GigabitEthernet 1 0 1 Apply Advanced Port Security Configuration Port GigabitEthernet1 0 1 v Security Mode 802 1X MAC Based Or OUI v Enable Intrusion Protection Disable Port Temporarily Enable Outbound Restriction Only MAC Known Unicasts L ignore Authorization Apply Cancel Add permitted OUls a In the Advanced Port Security Configuration area click Permitted OUls b Enter 1234 0100 0000 in the OUI Value field c Click Add 438 Figure 434 Configuring permitted OUI values Advanced Port Security Configuration Ports Enabled with Advanced Features YFermited QWs for ports working in the mode of 802 14 MAL Based Or oul OUI value 1234 0100 0000 Add kin the format H H H Only the first 24 bits make sense OJI Value Operation d Repeat previous three steps to add the OUI values
33. OFLZ76E5 4F15995 C 1066544 CEAZEDES AFBCSIAE A1EBS1A3 0643F930 AABSFB1N 4R69E524 Back Table 124 Field description Field Description Version CRL version number Signature Algorithm Signature algorithm that the CRL uses CA that issued the CRL Issuer 398 Field Description Last Update Last update time Next Update Next update time X509v3 CRL Number CRL sequence number X509v3 Authority Key Identifier smee the CA that issued the certificate and the certificate version Pubic key identifier keyid A CA might have multiple key pairs and this field identifies which key pair is used for the CRL signature No Revoked Certificates No certificates are revoked PKI configuration example Network requirements As shown in Figure 381 configure the switch working as the PKI entity so that e The switch submits a local certificate request to the CA server which runs the RSA Keon software e The switch retrieves CRLs for certificate verification Figure 381 Network diagram PKI entity Internet Host Switch CA server Configuring the CA server 1 Create a CA server named myca In this example first contigure the basic attributes of Nickname and Subject DN on the CA server the nickname is the name of the trusted CA and the subject DN is the DN attributes of the CA including the common name organization unit organization and country Leave the default values of the other attributes
34. Options include primary authentication Server Type server primary accounting server secondary authentication server and secondary accounting server Specify the IPv4 or IPv address of the RADIUS server The IP addresses of the primary and secondary servers for a scheme must be different IP Address l Otherwise the configuration fails RADIUS server addresses in the same scheme must use the same IP version Port Specity the UDP port of the RADIUS server Key Specity the shared key for communication with the RADIUS server Confirm Key If no shared key is specified the shared key specified in the common configuration part is used RADIUS configuration example Network requirements As shown in Figure 354 an 802 1X user logs in to the switch from the host Configure the switch to implement RADIUS authentication and accounting for the 802 1X user RADIUS accounting records the online duration of the 802 1X user Configure RADIUS servers on CAMS or IMC to use the default port for authentication and accounting The 802 1X user s username and password and the shared key expert are configured for packet exchange with the switch On the switch contigure the shared key for packet exchange with the RADIUS server as expert and configure the system to remove the domain name of a username before sending it to the RADIUS server On the switch enable the Telnet server function and configure the switch to use AAA for authentication
35. Please select the ISP domains Domain Name Default Domain 360 Configure the ISP domain to use local authentication a b c d Select Authentication gt AAA from the navigation tree Click the Authentication tab Select the domain test Select Login AuthN and select the authentication method Local Figure 342 Configuring the ISP domain to use local authentication Domain Setup Authorization Accounting Authentication Configuration of AAA e f Select an ISP domain test E Default Authn Local Name E LAN access AuthN Name Login AuthN Name PPP Auth Name Portal Auth Name Apply Click Apply secondary Method Secondary Method Secondary Method secondary Method secondary Method A configuration progress dialog box appears as shown in Figure 343 After the configuration process is complete click Close Figure 343 Configuration progress dialog box Current Configuration Seting Login Auth OK Configure the ISP domain to use local authorization a b C Select Authentication gt AAA from the navigation tree Click the Authorization tab Select the domain test Select Login AuthZ and select the authorization method Local Click Apply A configuration progress dialog box appears 361 f After the configuration progress is complete click Close Figure 344 Configuring the ISP domain to use local authorization Domain Setup Authentication Accounting Authorizatio
36. Priority level 3 4 Click the Statistics Information tab to display the LLDP statistics 233 Figure 204 The statistic information tab Local Information Neighbor Information Status Information LLDP statistics information of port 4 GigabitEfhernet1 0 4 The number of LLDP frames transmitted 2677 The number of LLDP frames received 2676 The number of LLDP frames discarded 70 The number of LLDP error frames 70 The number of LLDP TLVs discarded 70 The number of LLDP TLVs unrecognized 70 The number of LLDP neighbor information aged out 0 The number of CDP frames transmitted 70 The number of CDP frames received 70 The number of CDP frames discarded 70 The number of CDP error frames 70 5 Click the Status Information tab to display the LLDP status information Figure 205 The status information tab Local Information Neighbor Information Statistic Information Port 4 GigabitEthernet1 0 4 Port status of LLDP Enable Admin status TE Rx Trap flag No Polling interval Os Number of neighbors 1 Number of MED neighbors N Number of CDP neighbors 70 Number of sent optional TLV 23 Number of received unknown TLV 0 Displaying global LLDP intormation 1 From the navigation tree select Network gt LLDP 2 Click the Global Summary tab to display global local LLDP information and statistics Table 79 describes the fields 234 Figure 206 The global summary tab Port Setup Global Setup Neighbor Summary L
37. Rule ID Operation Description Time Fiat 3 Configure a rule for a basic IPv4 ACL 4 Click Add 455 Table 139 Configuration items ltem Description het Select the basic IPv4 ACL for which you want to configure rules Available ACLs are basic IPv4 ACLs Select the Rule ID box and enter a number for the rule Rule ID If you do not specify the rule number the system will assign one automatically If the rule number you specify already exists the following operations modify the configuration of the rule Select the action to be performed for IPv4 packets matching the rule Action e Permit Allows matched packets to pass e Deny Drops matched packets Select this box to apply the rule to only non tirst fragments Check Fragment If you do no select this box the rule applies to all fragments and non fragments Select this box to keep a log of matched IPv4 packets A log entry contains the ACL rule number operation for the matched packets Check Logging protocol number source destination address source destination port number and number of matched packets This function is not supported Source IP Address Select the Source IP Address box and enter a source Pv4 address and a Source Wildcard wildcard mask in dotted decimal notation Time Range Select the time range during which the rule takes effect Configuring a rule for an advanced IPv4 ACL 1 Select QoS gt ACL IPv4 from the navigation tree 2 Click t
38. Select ports for the link aggregation interface Select All Select None Selected Ports Unselected Ports el aca ca re Not a member of any link aggregation interface created Members of existing link aggregation interfaces Summary Aggregation Interface ID Member Ports Aggregation Interface Type 1 GE TV O 1 GET1 0 3 Dynamic Apply Cancel Contiguration guidelines When you configure a link aggregation group follow these guidelines In an aggregation group a Selected port must have the same port attributes and class two configurations as the reference port To keep these configurations consistent you should configure the port manually Choose a reference port from the member ports that are in up state and with the same class two configurations as the aggregate interface The candidate ports are sorted in the following order o Full duplex high speed o Full duplex low speed o Half duplex high speed o half duplex low speed If two ports have the same duplex mode speed pair the one with the lower port number is chosen Port attribute configuration includes the contiguration of the port rate duplex mode and link state For more information about class two configurations see Configuration classes To guarantee a successtul static aggregation make sure the ports at the two ends of each link to be aggregated are in the same aggregation state To guarantee a successful dynamic aggregation make sure the pee
39. SelectanAcl Help Configure an Ethernet frame header ACL C Rule ID ss 8 655 34 Ifno ID is entered the system will specify one MAC Address Filter Format of MAC address and mask is H H H COS O21p priority None Type Filter Time Range Rule ID Operation Description Time Rar 3 Configure a rule for an Ethernet frame header IPv4 ACL as described in Table 141 4 Click Add Table 141 Configuration items ltem Description Select the Ethernet frame header IPv4 ACL for which you want to configure ACL rules Available ACLs are Ethernet frame header IPv4 ACLs Select the Rule ID box and enter a number for the rule If you do not specify the rule number the system will assign one Rule ID automatically If the rule number you specify already exists the following operations modify the configuration of the rule Select the action to be performed for packets matching the rule Action e Permit Allows matched packets to pass e Deny Drops matched packets 460 ltem Description Source MAC Address MAC Source Mask Address Filter Destination MAC Address Destination Mask COS 802 1p priority LSAP Type LSAP Mask Type Filter protocol Type Protocol Mask Time Range Select the Source MAC Address box and enter a source MAC address and a mask Select the Destination MAC Address box and enter a destination MAC address and a mask Specify the 802 1p priority for the rule Select t
40. TCP Connection establishing and maintaining TCP connections Established These items are available only when you select 6 TCP trom the Protocol list Operator Select the operators and enter the source port numbers and Source Don destination port numbers as reguired or These items are available only when you select 6 TCP or 17 UDP Operator from the Protocol list Different operators have different configuration requirements for the port number fields TCP UDP Port e Not Check The following port number fields cannot be Destination so Port e Range The following port number fields must be configured to define a port range e Other values The first port number field must be configured and the second must not Only Not Check and Other values are supported DSCP Specify the DSCP value If you specify the ToS precedence or IP precedence Precedence TOS Specify the ToS preference when you specify the DSCP Filter value the specitied TOS or IP Precedence Specify the IP precedence precedence does not take effect Time Range Select the time range during which the rule takes effect Configuring a rule for an Ethernet frame header ACL 1 Select QoS gt ACL IPv4 from the navigation tree 2 Click the Link Layer Setup tab The rule configuration page for an Ethernet frame header IPv4 ACL appears 459 Figure 449 Configuring a rule for an Ethernet frame header ACL Summar Add Basic Setup Advanced Setup Remove ACL
41. The parameters mainly include the IP addresses of the servers the shared keys and the RADIUS server type By default no RADIUS scheme exists To configure a RADIUS scheme 1 Select Authentication gt RADIUS from the navigation tree Figure 350 RADIUS scheme list Scheme Server sername Primary Primary L Mame Type Format Authentication Serer Accounting Server el C system Standard Without domain Ee il name Add Del Selected 2 Click Add 368 Figure 351 RADIUS scheme configuration page Add RADIUS Scheme Scheme Name 1 32 Chars Common Configuration Server Type Standard kd Username Format Without domain name F Advanced RADIUS Server Configuration Server Type IP Address Port Operation Add Items marked with an asterisk are required Apply Cancel 3 Configure the parameters as described in Table 1 14 4 Click Apply Table 114 Configuration items ltem Descri ption Scheme Name Enter a name for the RADIUS scheme Configure the common parameters for the RADIUS scheme including the server type the username format and the shared keys for authentication and accounting packets For more information about common configuration see Configuring common parameters Common Configuration Configure the parameters of the RADIUS authentication servers and RADIUS Server Configuration accounting servers For more information about RADIUS server configuration see Adding RADIUS servers Contigu
42. To view the configuration and power information click a port on the chassis front panel Figure 491 PoE summary with GigabitEthernet 1 0 1 selected PSE Setup Port Setup PSE Summary PSE ID Location State Max Power VV Average Power W Peak Power W Available Power W 1 slot 1 subslot 0 on 415 0 0 415 Ports Power Display Pepe qe AAAO EI OAAR OE EIE EES fia ter Selected E Power Supplied m Power Enabled C Power Disabled C Not Supported C Power Fault Port Power State Port State Priority Max Power mvy Average Power mW Peak Power mW Free Power mvy 500 PoE contiguration example Network requirements As shown in Figure 492 GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 are connected to IP telephones GigabitEthernet 1 0 11 is connected to AP whose maximum power does not exceed 9000 milliwatts The IP telephones have a higher power supply priority than the AP so the PSE supplies power to the IP telephones first if the PSE power is overloaded Figure 492 Network diagram GE1 0 11 Phone Phone2 AP Configuring PoE 1 Enable PoE on GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 and set their power supply priority to critical a Select PoE gt PoE from the navigation tree b Click the Setup tab c On the tab click to select ports GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 from the chassis front panel select Enable from the Power State list and select Critical from the Power Priority list
43. authorization and accounting of Telnet users Figure 354 Network diagram Vlan int2 192 168 1 1 24 GE1 0 1 Telnet user Switch RADIUS server 192 168 1 10 24 10 110 91 146 24 Configuration prerequisites Enable 802 1X globally and on the specified port Configure network access control based on MAC addresses Details not shown Configuring a RADIUS scheme 1 Select Authentication gt RADIUS from the navigation tree 2 Click Add to add a RADIUS scheme a Enter system as the scheme name b Select Extended as the server type 374 c Select Without domain name for the username format 3 In the RADIUS Server Configuration area click Add to configure the primary authentication server a Select Primary Authentication as the server type b Enter 10 110 91 146 as the IP address c Enter 1812 as the port d Enter expert as the key and enter expert again to confirm the key e Click Apply Figure 355 RADIUS authentication server configuration page Add RADIUS Server Server Type Primary Authenticatio IP Address IPv4 IPv6 10 110 91 146 Port 1812 1 65535 Default 1812 Key TILLI 1 64 Chars Confirm Key TETTI 1 64 Chars Apply Cancel 4 In the RADIUS Server Configuration area click Add again to configure the primary accounting server a Select Primary Accounting as the server type b Enter 10 110 91 146 as the IP address c Enter 1813 as the port d Enter expert as the key and e
44. the system refreshes system information only when you click the Refresh button Displaying device information Select Summary from the navigation tree and click the Device Information tab to enter the page that displays information about the device ports Hover the cursor over a port and the port details appear including the port name type speed utilization and status as shown in Figure 37 The aggregation group number is also displayed if the port is added to an aggregation group For the description about the port number and its color see Figure 37 48 Figure 37 Device information System Information levice Information Port GigabitEthernett 0 2 Type 1000BASE T Speed 1000M Full Duplex Utilization 0 Status Disabled Refresh Period 30 Seconds Refresh Description of port number color Unconnected Port Connected port El Portthat has been set to inactive by user or protocol Port that has been selected by user E Fort or Module has failed POST or module is not recognized Description on port numbers Common number Number of the port BnAddto a Layer 2 aggregation group n represents the aggregation group number RmAdd to a Layer 3 aggregation group n represents the aggregation group number To set the interval for refreshing device information select one of the following options from the Refresh Period list e Ifyou select a certain period the system refreshes device informati
45. 0 1 a Select Device gt RMON from the navigation tree The Statistics tab page appears b Click Add The page in Figure 92 appears c Select GigabitEthernet1 0 1 from the Interface Name list type user1 in the Owner field and click Apply 105 Figure 92 Adding a statistics entry Statistics History Alarm Event Log Add a Statistic Group Interface Name GigabitEthernet1 0 1 Owner user Chars 1 127 Only one statistics group can be created on one interface tems marked with an asterisk are required Apply Cancel Display RMON statistics tor GigabitEthernet 1 0 1 a Click the icon s corresponding to GigabitEthernet 1 0 1 b Display this information as shown in Figure 93 Figure 93 Displaying RMON statistics DERT History Alarm Event Log Statistic Group Detail Current interface Gigabtcthemet tio Statistic Item Slatistic Valve Number of Received Bytes 34375 Humber of Racaved Packets Ad Number of Received Broadcasting Packets 180 Number of Recenved Multicast Packets 117 Number af Racead Packets With ORC Check Failed i Number of Recened Packets Smaller Than 64 Byles 0 Number of Receved Farkeis Larger Than 1518 Bytes LT Number of Received Packets Smaller Than 64 Bytes And FCS Check Failed 0 Number of Receved Packets Larger Than 1518 Bytas And FCS Check Failed O Number of Hatwark Conflicts 0 Number of Parke Discarding Events 0 Number of Racemved 64 Bytes Packets 116 Number of Received 65 to 127 Byles Pa
46. 1 Summary re Modify Remove Enter Link Aggregation Interface ID 1 8 Specify Interface Type Static LACP Disabled Note The type ofthe link aggregation interface set here o overwrites the existing LACP settings ofthe ports in the Dynamic LACP Enabled link aggregation interface Sel ect portis for the link aggregation interface Select All Select None Selected Ports Unselected Ports Mienie Der vi a Bnk eee Hd EE Hi be a Not a member of any link aggregation interface created Members of existing link aggregation interfaces Summary Aggregation Interface ID Member Ports Aggregation Interface Type 1 GE1 04N GE1 0 3 Static Apply Cancel Method 2 Create dynamic link aggregation group 1 From the navigation tree select Network gt Link Aggregation 2 Click Create 3 Configure dynamic aggregation group 1 a Enter link aggregation intertace ID 1 b Select Dynamic LACP Enabled for aggregate interface type c Select GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 on the chassis front panel 4 Click Apply 214 Figure 194 Creating dynamic link aggregation group 1 Summary Modify Remove Enter Link Aggregation Interface ID 1 8 Specify Interface Type Static LACP Disabled Note The type of the link aggregation interface set here ae AE overwrites the existing LACP settings of the ports in the Dynamic LACP Enabled link aggregation interface
47. 1 GigabitEthernet1 0 1 user Active sl Add Del Selected 2 Click Add Figure 81 Adding a statistics entry History Alarm Event Log Add a Statistic Group Interface Name GigabitEthemet1 0 2 Owner Chars 1 127 e Only one statistics group can be created on one interface tems marked with an asterisk are required Apply Cancel p Configure a statistic entry as described in Table 24 Click Apply Table 24 Configuration items ltem Description Select the name of the interface on which the statistics entry is created Interface Name Only one statistics entry can be created on one interface Owner Set the owner of the statistics entry Contiguring a history entry 1 Select Device gt RMON from the navigation tree 2 Click the History tab Figure 82 History entry Statistics Alarm Event Log f Index v Search Advanced Search Index Interface Name Buckets Buckets Interval Sec Owner Status Operation se ER VR Reguested Granted OE i j 1 GigabitEthernet1 0 1 10000 10 360 user Active ss Add Del Selected 3 Click Add Figure 83 Adding a history entry Statistics Alarm Event Log Add a History Group Interface Name GigabitEthernet1 0 1 Buckets Granted 1 65535 Interval Seconds 5 3600 Owner Chars 1 127 tems marked with an asterisk are required Apply Cancel Configure a history entry as described in Table 25 5 Click Apply Table 25 Configuration items ltem Description Interface Na
48. 131 0 0 0 0 0 o 134041 Back Retesh 103 Table 29 Field description Field Description Number of the entry in the system buffer NO Statistics are numbered chronologically when they are saved to the system buffer Time Time at which the information is saved Dropped packets during the sampling period corresponding to the MIB PrpE EIE node etherHistoryDropEvents ER Number of octets received during the sampling period corresponding to the MIB node etherHistoryOctets Pkts Number of packets received during the sampling period corresponding to the MIB node etherHistoryPkts Number of broadcasts received during the sampling period corresponding Pie to the MIB node etherHistoryBroadcastPkts ME sepies Number of multicasts received during the sampling period corresponding to the MIB node etherHistoryMulticastPkts Number of packets received with CRC alignment errors during the sampling EENDE period corresponding to the MIB node etherHistoryCRCAlignErrors Number of undersize packets received during the sampling period UndersizePkts corresponding to the MIB node etherHistoryUndersizePkts Number of oversize packets received during the sampling period OversizePkts corresponding to the MIB node etherHistoryOversizePkts Number of fragments received during the sampling period corresponding to ieder the MIB node etherHistoryFragments Number of jabbers received during the sampling period corresponding to Jab
49. 2 of device A are connected to the common root bridge port 5 and port 6 of device C form a loop and port 3 and port 4 of device D are connected downstream to the other MST regions 187 Figure 177 Port roles Connecting to the Common root bridge MST region Master port Designated port MSTP calculation involves the following port roles e Root port Forwards data for a non root bridge to the root bridge The root bridge does not have any root port e Designated port Forwards data to the downstream network segment or device e Master port Serves as a port on the shortest path from the local MST region to the common root bridge The master port is not always located on the regional root It is a root port on the IST or CIST and still a master port on the other MSTIs e Alternate port Serves as the backup port for a root port or master port When the root port or master port is blocked the alternate port takes over e Backupport Serves as the backup port of a designated port When the designated port is invalid the backup port becomes the new designated port A loop occurs when two ports of the same spanning tree device are connected so the device blocks one of the ports The blocked port acts as the backup e Boundary port Connects an MST region to another MST region or to an STP RSTP running device In MSTP calculation a boundary port s role on an MSTI is consistent with its role on the CIST But tha
50. 20 or up to 8 entries Customer VLAN like 3 5 7 ACL IPv4 3000 ACL IPv Rule Type Rule Value d Click Apply A progress dialog box appears as shown in Figure 482 e Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds 493 Figure 482 Configuration progress dialog box Current Configuration Setting ACL IPv4 OK Add a trattic behavior a Select QoS gt Behavior from the navigation tree b Click the Add tab c Enter the behavior name behavior d Click Add Figure 483 Adding a traffic behavior Summar Setup Fort Setup Remove Behavior Name behavior 1 31 Chars Add Configure actions for the traffic behavior a Click the Setup tab b Select behavior in the list c Select the Filter box and then select Deny in the following list d Click Apply A progress dialog box appears e Click Close when the progress dialog box prompts that the configuration succeeds 494 Figure 484 Configuring actions for the behavior Summary Add Port Setup Remove Please select a behavior behaviori v E CAR Enable Disable CIR kbps 16 1000000 it must be a multiple of 16 CBS byte 0 4294967294 Red Discard Pass Remark IP Precedence 0 F Dottip 0 Local Precedence 0 DSCP 0 default Queue EF Max Bandwidth KDps 8 1000000 CBS byte 32 2000000 Percent 1 100 CBS Ratio 25 500 AF Max Bandwidth kbps 8 1000000
51. 300 Default 100 Authentication ISP Domain agabbec net Authentication Information Format MAC without hyphen MAC as 0000000 MAC with hyphen MAC as N AOOAKOOE E Fixed Username Chars 1 55 E Password Apply Forts With MAC Authentication Enabled El Part Auth Fail WLAN Add Del Selected 2 Configure MAC authentication for GigabitEthernet 1 0 1 a In the Ports With MAC Authentication Enabled area click Add b Select GigabitEthernet1 0 1 from the Port list and click Apply Figure 395 Enabling MAC authentication for port GigabitEthernet 1 0 1 Enable MAC Authentication Port GigabitEthernet1 0 1 v F Enable MAC VLAN Only hybrid ports support this configration Items marked with an asterisk are required Apply Cancel ACL assignment configuration example Network requirements Chars 1 63 Operation As shown in Figure 396 the switch uses RADIUS servers to perform authentication authorization and accounting Configure MAC authentication on port GigabitEthernet 1 0 1 to control Internet access Make sure an authenticated user can access the Internet but not the FTP server at 10 0 0 1 Use MAC based user accounts for MAC authentication users The MAC addresses are not hyphenated 411 Figure 396 Network diagram RADIUS servers Auth 10 1 1 1 Acct 10 1 1 2 Internet Host Switch FTP server 192 168 1 10 10 0 0 1 Configuring IP addresses Assign an IP address to
52. 369 configuring RADIUS scheme 368 contiguring rate limit 477 configuring secure MAC addresses 427 configuring security 802 1X 332 configuring security 802 1X global 332 configuring security 802 1X portspecific 333 configuring security 802 1 X authentication 336 contiguring security ARP detection 250 configuring security MAC authentication 406 408 configuring security MAC authentication ACL assignment 411 configuring security MAC local authentication 408 contiguring SNMP community 117 configuring SNMP group 118 configuring SNMP trap function 12 configuring SNMP user 120 configuring SNMP view 115 configuring SNMPv1 124 configuring SNMPv2c 124 configuring SNMPv3 127 contiguring stack 43 configuring stack global parameters 40 configuring stack ports 4 contiguring static routing IPv4 283 contiguring static routing IPv6 287 contiguring statistics entry 97 configuring system parameters 34 configuring system time by using NTP 57 58 contiguring system time manually 56 configuring user group 382 contiguring VLAN interface 150 creating ARP static entry 245 creating DHCP server group 300 creating Ethernet link aggregation group 208 creating SNMP view 115 creating static route IPv4 280 creating static route IPv6 281 creating VLAN 139 526 creating VLAN interface 150 displaying active route table IPv4 279 displaying active route table IPv6 281 displaying all
53. 499 enabling SNMP agent 113 entering configuration wizard homepage 34 finishing configuration wizard 37 identifying node failure with traceroute 319 logging in to member device from master 42 logging in to Web interface through HTTP 6 logging out of Web interface 7 managing port 69 75 moditying port 144 modifying VLAN 143 modifying VLAN interface 152 NMM port mirroring 80 removing IP services ARP entry 245 removing Web device file 68 resetting Web device configuration 66 restoring Web device configuration 64 saving Web device configuration 65 selecting VLAN 142 setting butfer capacity and refresh interval 63 setting configuration environment 20 setting LLDP parameters for a single port 224 setting LLDP parameters for ports in batch 227 setting log host 62 setting MAC address table dynamic aging timer 1 5 setting port operation parameters 69 setting refresh period 48 setting terminal parameter 21 setting Web device super password 87 specitying Web device main boot file 68 switching to Web device management level 88 testing cable status 91 testing connectivity with ping 318 uploading Web device file 68 viewing port traffic statistics 92 protocols and standards DHCP 296 DHCP overview 292 IGMP snooping 255 LLDP 222 MLD snooping 269 MSTP 190 NMM SNMP configuration 111 RADIUS 363 368 SNMP versions 112 STP protocol packets 177 PSE detect nonstandard PDs 499 PVID con
54. A Source MLD querier Receiver Configuration procedure Configuring Router A Enable IPv multicast routing assign an IPv6 address to each interface enable IPv PIM DM on each intertace and enable MLD on GigabitEthernet 1 0 1 Details not shown Configuring Switch A 1 Create VLAN 100 a Select Network gt VLAN from the navigation tree b Click the Create tab c Enter 100 as the VLAN ID d Click Apply 274 Figure 248 Creating VLAN 100 Select VLA Port Detail Detail bodite WYLAN Modity Part Remove Create Examble 3 5 10 Create D Description 1 VLAN 0001 Modity VLAN description Note you can do this later on the Modity VLAN page Modify the description ofthe selected LAN IL Description ite Chats Assign GigabitEthernet 1 0 1 through GigabitEthernet 1 0 3 to VLAN 100 a Click the Modify Port tab b Select GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 in the Select Ports area c Select Untagged for Select membership type d Enter 100 as the VLAN ID e Click Apply 275 Figure 249 Assigning ports to VLAN 100 Select VLAN Create Port Detail Detail Modify VLAN C Remove Select Ports HEHEH mane Select All Select None C Not avaliable for selection Tagged E NotA Member Link Type PVID Enter VLAN IDs to which the port is to be assigned VLAN IDs 100 Example 1 3 5 10 Selected ports Apply Cancel Enable M
55. Configure the default accounting method and secondary accounting method for all types of users Options include HWTACACS HWTACACS accounting You must specify the HWTACACS scheme to be used Local Local accounting None No accounting RADIUS RADIUS accounting You must specify the RADIUS scheme to be used Not Set The device uses the default accounting setting which is local accounting Configure the accounting method and secondary accounting method for LAN access users Options include Local Local accounting None No accounting RADIUS RADIUS accounting You must specify the RADIUS scheme to be used Not Set The device uses the settings in the Default Accounting area for LAN access users 358 ltem Descri ption Configure the accounting method and secondary accounting method for login users Options include e HWTACACS HWTACACS accounting You must specify the HWTACACS Login Accounting scheme to be used Name e Local Local accounting Secondary Method e None No accounting e RADIUS RADIUS accounting You must specity the RADIUS scheme to be used e Not Set The device uses the settings in the Default Accounting area for login users AAA configuration example Network requirements As shown in Figure 339 configure the switch to perform local authentication authorization and accounting for Telnet users Figure 339 Network diagram Vlan int2 192 168 1 1 24
56. Description IP Address Enter an IP address for the static ARP entry MAC Address Enter a MAC address for the static ARP entry VLAN ID Enter a VLAN ID and specify a port for the static ARP entry Advanced IMPORTANT Opti Po Port The VLAN ID must be the ID of the VLAN that has already been created and the port must belong to the VLAN The corresponding VLAN interface must have been created Removing ARP entries 1 From the navigation tree select Network gt ARP Management The detault ARP Table page appears as shown in Figure 218 2 Remove ARP entries o To remove specific ARP entries select the boxes of target ARP entries and click Del Selected o To remove all static and dynamic ARP entries click Delete Static and Dynamic o To remove all static ARP entries click Delete Static o To remove all dynamic ARP entries click Delete Dynamic 245 Contiguring gratuitous ARP From the navigation tree select Network gt ARP Management 2 Click the Gratuitous ARP tab Figure 220 Gratuitous Configuring ARP page ARP Table Gratuitous ARP Disable gratuitous ARP packets learning function Send gratuitous ARP packets when receiving ARP requests from another network segment Apply 3 Configure gratuitous ARP as described in Table 81 4 Click Apply Table 81 Configuration items ltem Description Disable gratuitous ARP packets Disable learning of ARP entries from gratuitous ARP packets learning function Grat
57. Device A finds that the BPDU of the local port 0 O O AP2 is superior to the received configuration BPDU and it discards the received configuration BPDU Device A finds that both the root bridge and designated bridge in the configuration BPDUs of all its ports are itself so it assumes itself to be the root bridge It does not make any change to the configuration BPDU of each port and it starts sending out configuration BPDUs periodically Port BP1 receives the configuration BPDU of Device A 0 O O AP1 Device B finds that the received configuration BPDU is superior to the configuration BPDU of the local port 1 O 1 BP1 and it updates the configuration BPDU of BP1 Port BP2 receives the configuration BPDU of Device C 2 O 2 CP2 Device B finds that the configuration BPDU of the local port 1 0 1 BP2 is superior to the received contiguration BPDU and it discards the received contiguration BPDU Device B compares the configuration BPDUs of all its ports and determines that the configuration BPDU of BP1 is the optimum configuration BPDU Then it uses BP1 as the root port the configuration BPDUs of which will not be changed Based on the configuration BPDU of BP1 and the path cost of the root port 5 Device B calculates a designated port configuration BPDU for BP2 0 5 1 BP2 Device B compares the calculated configuration BPDU 0 5 1 BP2 with the configuration BPDU of BP2 If the calculated BPDU is s
58. EED E EN 156 Ulad re ce wre erase secs EE sees cee emcee ces ce A O EE E T T E 156 Voice VLAN assignment modes sssssssssssssssessseesesssseesssssseessssnssesssssescsssnscssssnssscsssnescsssnesssseesnieessnneseessste 156 Security mode and normal mode of voice VLANs ssssssssssssssssessseseesssesssssseesssssseeesssssesesssnneessssnnsessnnnnses 158 Recommended voice VLAN configuration procedure re EE EE ED 159 Configuring voice VLAN globally ED a a OO TE EA 160 Configuring voice VLAN on OF S SaaS 161 Adding OUI addresses to the OUI listeeeeeseesseeseeeseeeseesseeseeeseesseeseeseeeseeeseesseoseeeseeeseesseoseroseeseeeseesereseseeseeserosereseeeseeseeesee 162 Voice VLAN configuration examples RE EO EE EE 163 Configuring voice VLAN on a port in automatic voice VLAN assignment mode reer seer se seer se ee se se ee ee ee ee 163 Configuring a voice VLAN on a port in manual voice VLAN assignment mode weeer 167 Configuration guidelines EE EE EE ER O 172 Contiguring the MAC address table EER EE EE EE RE EE EE EO EA ER EE ER AE ER RE ER EE RR ER EE Ee ee EER RE EER Re EE Ee EE ee ee 173 E TAN E E E EE E T E EE OE N 173 How a MAC address entry is Created sssssssssssesssesssesssessessssssesssnssesssssecesssssesesssssssesssnssseessssecssssnsssssessssssesssnness 173 Types of MAC address en rjeseeeeeeeeeeeteeeeterertteeertereettsseettssettrsseetessetrseetessttesseet esseet erett EER RRReeeRRRRReeeRR 174 Displaying and configuring MAC address entries ss esse ees see E
59. Enabled area click Add Figure 389 Configuring MAC authentication on a port Enable MAC Authentication Port GigabitEthernet1 0 1 be F Enable MAC VLAN Only hybrid ports support this configration Items marked with an asterisk are required Apply Cancel 3 Configure MAC authentication for a port as described in Table 126 and then click Apply Table 126 Configuration items liem Description Port Selects a port on which you want to enable MAC authentication Specifies whether to enable MAC based VLAN on the port Enable MAC VLAN CD IMPORTANT You can enable MAC authentication only on hybrid ports Specifies an existing VLAN as the MAC authentication Auth Fail VLAN IMPORTANT e The MAC authentication Auth Fail VLAN has a lower priority than the 802 1X guest VLAN on a port that performs MAC based access control If a user fails both types of authentication the access port adds the user to the 802 1X guest VLAN For more information about Auth Fail VLAN 802 1X guest VLANs see Configuring 802 1 X e The MAC authentication Auth Fail VLAN function has higher priority than the quiet function of MAC authentication e The MAC authentication Auth Fail VLAN function has higher priority than the block MAC action but it has lower priority than the shutdown port action of the port intrusion protection feature For more information about port intrusion protection see Configuring port security MAC authentication
60. Figure 25 Stacking devices Stack port Master device device Slave device Slave Slave device device device To set up a stack for a group of connected devices you must log in to one device to create the stack This device is the master device for the stack You configure and monitor all member devices on the master device The ports that connect the stack member devices are called stack ports Contiguration task list Perform the tasks in Table 5 to configure a stack Table 5 Stack configuration task list Task Remarks Configuring the master device of a stack Required Configure a private IP address pool for a stack and establish the stack and meantime the device becomes the master device of the Configuring global parameters of a stack seels By default no IP address pool is configured for a stack and no stack is established Required Configure the ports of the master device that connect to member Configuring stack port AE EE a devices as stack ports By default a port is not a stack port 39 Task Configuring member devices of a stack Configuring stack ports Displaying topology summary of a stack Displaying device summary of a stack Logging in to a member device from the master Remarks Required Configure a port of a member device that connects to the master device or another member device as a stack port By default a port is not a stack port Optional
61. GET OM Telnet user Switch 192 168 1 12 24 Internet Configuration procedure 1 Enable the Telnet server function and configure the switch to use AAA for Telnet users Details not shown Configure IP addresses for the interfaces Details not shown 3 Configure a local user a Select Device gt Users from the navigation tree Click the Create tab Enter the username telnet i Select the access level Management Enter the password abed and confirm the password Select the password encryption method Irreversible Select the service type Telnet Service Click Apply gt a mp ao 359 Figure 340 Configuring a local user summary Super Password Modify Remove Switch To Management Create User Username telnet 1 55 Chars Access Level Management Password TT 1 63 Chars Confirm Password TT Password Encryption Reversible Irreversible Service Type Web J FTP Telnet Summary Username Access Level Service Type admin Management Web Note Username cannot contain Chinese characters and any of the following characters B 2 lt gt amp amp Configure ISP domain test a Select Authentication gt AAA from the navigation tree The domain contiguration page appears b Enter the domain name test c Click Apply Figure 341 Configuring ISP domain test Authentication Authorization Accounting ISP Domain Domain Name test JY 24 chars Default Domain Apply
62. ID ID of the VLAN to which the entry belongs Source Address Multicast source address If no multicast sources are specified this field displays 0 0 0 0 Group Address Multicast group address Router Port s All router ports Member Port s All member ports IGMP snooping contiguration example Network requirements As shown in Figure 234 IGMPv2 runs on Router A and IGMPv2 snooping runs on Switch A Router A acts as the IGMP querier Pertorm the configuration so Host A can receive the multicast data addressed to the multicast group 224 1 1 1 260 Figure 234 Network diagram 1 1 1 1 24 Router A Source IGMP guerier Contiguration procedure Configuring Router A Enable IP multicast routing globally enable PIM DM on each interface and enable IGMP on GigabitEthernet 1 0 1 Details not shown Configuring Switch A 1 Create VLAN 100 a From the navigation tree select Network gt VLAN b Click the Create tab c Enter 100 as the VLAN ID d Click Apply 261 Figure 235 Creating VLAN 100 Select VLAN Port Detail Detail Modifr VLAN Modify Port Remove Create VLAN IDs Example s 5 10 Create ID Description 1 VLAN 000 Modif VLAN description Mote you can do this later on the Modity VLAN page Modif the description ofthe selected VLAN IL Description tte Char Assign GigabitEthernet 1 0 1 through GigabitEthernet 1 0 3 to VLAN 100 a Click the Modify Port tab b Select GigabitEtherne
63. LACP Click Setup 3 In the Set LACP enabled port s parameters area set the port priority and select the ports in the chassis front panel 4 Click Apply in the area Figure 190 Setting the LACP priority Summary Select LACP enabled portis parameters Port Priority 0 65535 Default 32768 Select port s to apply Port Priority Select All Select None Note Click a portto toggle its state Selected LACP Enabled LACP Disabled Petween enabled and disabled Cancel Set global LACP parameters System Priority 0 65535 Default 32768 Apply Cancel Table 66 Configuration items ltem Descri ption Port Priority Set a port LACP priority Select port s to Choose the ports where the port LACP priority you set will apply on the chassis front panel 5 6 apply Port Priority You can set LACP priority on both LACP enabled ports and LACP disabled ports In the Set global LACP parameters area set the system priority Click Apply in the area Displaying LACP enabled port intormation 1 From the navigation tree select Network gt LACP The default Summary tab appears The upper part of the page displays a list of all LACP enabled ports on the device and information about them Table 67 describes the fields Select a port on the port list Click View Details 211 Detailed information about the peer port appears on the lower part of the page Table 68 describes the fields Figure 191 Displaying
64. Layer 2 device so that the device can generate and maintain IPv6 multicast forwarding entries at data link layer providing MLD querier functions Query interval Configure the MLD general query interval General Query Source Address Specify the source IPv address of MLD general queries Special Query Source 7 i l f I Address Specify the source IPv address of MLD multicast address specitic queries 271 Contiguring MLD snooping port functions Select Network gt MLD snooping from the navigation tree 2 Click the Advanced tab Figure 245 Configuring MLD snooping port functions Basic Port Configuration o Port Please select a pot VLAN ID 1 4094 example 3 5 10 Up to 10 VLAN ranges can be specified Multicast Group Limit 1 510 Default 510 Fast Leave Enable Disable tems marked with an asterisk are required Apply F VLAN ID Search Advanced Search VLAN ID Multicast Group Limit Fast Leave Operation Refresh 3 Configure the parameters as described in Table 87 4 Click Apply Table 87 Configuration items ltem Descri ption Select the port on which advanced MLD snooping features will be configured The port can be an GigabitEthernet port or Layer 2 aggregate interface After a port is selected advanced features configured on this port are displayed at the lower part of this page oa STIP Advanced MLD snooping features configured on a Layer 2 aggregate interface do not interfere with configu
65. MAC address table is fully populated Manually configuring MAC address entries With dynamic MAC address learning a device does not distinguish between illegitimate and legitimate frames For example when a hacker sends frames with a forged source MAC address to a port different from the one with which the real MAC address is associated the device creates an entry for the forged MAC address and forwards frames destined for the legal user to the hacker instead To improve port security you can manually add MAC address entries to the MAC address table of the device to bind specitic user devices to the port 173 Types of MAC address entries A MAC address table can contain the following types of entries e Static entries Manually added and never age out e Dynamic entries Manually added or dynamically learned and might age out e Blackhole entries Manually configured and never age out They are configured for filtering out frames with specitic source or destination MAC addresses For example to block all frames destined for a specific user for security concerns you can configure the MAC address of this user as a blackhole MAC address entry A static or blackhole MAC address entry can overwrite a dynamic MAC address entry but not vice versa Displaying and contiguring MAC address entries 1 Select Network gt MAC from the navigation tree The MAC tab automatically appears which shows all the MAC address entries on the
66. MLD snooping multicast forwarding entries Select Network gt MLD snooping from the navigation tree 2 Click Show Entries to display information about MLD snooping multicast forwarding entries Table 88 Displaying entry information Show Entries RO VLAN ID Search Advanced Search VLAN ID SOUrCe Group Operation 100 FF1E 101 ol 3 To view detailed information about an entry click the icon for the entry Figure 246 Detailed information about an MLD snooping multicast entry Advanced Entry Details VLAN ID 100 source Address Group Address FFIE 101 Router Port s GigabitEthemett 0A Member Fotis GigabitEfnernet1 0 3 Back Table 89 Field description Field Description VLAN ID ID of the VLAN to which the entry belongs Saree E Multicast source address If no IPv6 multicast sources are specified this field displays Group Address Multicast group address Router Ports All router ports 273 Field Description Member Ports All member ports MLD snooping contiguration example Network requirements As shown in Figure 247 MLDv1 runs on Router A and MLDv1 snooping runs on Switch A Router A acts as the MLD querier Perform the configuration so that Host A can receive the IPv6 multicast packets destined for the IPv6 multicast group FF1E 101 Figure 247 Network diagram VLAN 100 GE1 0 2 GE1 0 1 1 2 64 ApS 2001 1 64 GE1 0 1 GE1 0 3 EL Router A Switch A Host
67. O AADA example 3 5 10 Up to 10 WYLAN ranges can be specified Multicast Group Limit O A55 Fast Leave Enable Disable tems marked with an asterisk are required Apply z VLAN ID wi Search Advanced Search VLAN ID Multicast Group Limit Fast Leave Operation 3 Configure the parameters as described in Table 84 4 Click Apply 258 Table 84 Configuration items ltem Description Port Select the port on which advanced IGMP snooping features will be configured The port can be an GigabitEthernet port or Layer 2 aggregate interface After a port is selected advanced features configured on this port are displayed at the lower part of this page Qnr The advanced IGMP snooping configurations on a Layer 2 aggregate interface do not interfere with configurations on its member ports nor do they participate in aggregation calculations The configuration on a member port of the aggregate group does not take effect until the port leaves the aggregate group Specify the ID of the VLAN in which the port functions are to be configured VLAN ID The configurations made in a VLAN take effect on the ports only in this VLAN Configure the maximum number of multicast groups on a port With this feature you can limit multicast traffic on the port IMPORTANT Group Limit Fast Leave If the number of multicast groups on a port exceeds the limit that you are setting the system removes all the for
68. OUI Add by voice VIAN Configure Remove the address of an OUI that can be PREMOG identified by voice VLAN a Display MAC address information Monitor MAC LT LE MAC Create and remove MAC addresses Configure Setup Display and configure MAC address aging time Configure Display information about MST regions Monitor Region Modify MST regions Configure MSTP Global Set global MSTP parameters Configure Port Summary Display the MSTP information about ports Monitor Port Setup Set MSTP parameters on ports Configure Sunma Display information about link aggregation Mgao groups Link Aggregatio Create Create link aggregation groups Configure i Modify Modify link aggregation groups Contigure Remove Remove link aggregation groups Configure 1 Function menu Description User level Display information about LACP enabled ports and LACP summary their partner ports Range Setup Set LACP priorities Configure Display the LLDP configuration information local information neighbor information statistics Monitor Port Setup intormation and status information about a port Modify LLDP configuration on a port Configure Display global LLDP configuration information Monitor LLDP Global Setup Configure global LLDP parameters Configure Shae Display global LLDP local information and statistics Monitor Summary Neighbor Summary Display global LLDP neighbor information Monitor Display ARP table information Monitor ARP Table EE pe a EL EE E
69. Option 82 N E aeeding dime an interface is untrusted and DHCP snooping does not support functions on an interface IMPORTANT You need to specify the ports connected to the authorized DHCP servers as trusted to make sure DHCP clients can obtain valid IP addresses The trusted port and the port connected to the DHCP client must be in the same VLAN 308 Task Remarks Displaying clients IP4o MAC Optional bindings Display clients IP to MAC bindings recorded by DHCP snooping Enabling DHCP snooping e From the navigation tree select Network gt DHCP Click the DHCP Snooping tab to enter the page shown in Figure 285 a Select the Enable option next to DHCP Snooping to enable DHCP Snooping Figure 285 DHCP snooping configuration page DHCP Relay DHCP Snooping Enable Disable Interface Config po Interface Name Search Advanced Search Interface Name Interface State Operation GigabitEthernet1 0 1 Untrust A GigabitEthernet1 0 2 Untrust ES GigabitEthernet1 0 3 Untrust A GigabitEthernet1 0 4 Untrust A GigabitEthernet1 0 5 Untrust ES GigabitEthernet1 0 6 Untrust A GigabitEthernet1 0 7 Untrust A GigabitEthernet1 0 8 Untrust A GigabitEthernet1 0 9 Untrust a GigabitEthernet1 0 10 Untrust A GigabitEthernet1 0 11 Untrust ES GigabitEthernet1 0 12 Untrust A GigabitEthernet1 0 13 Untrust A GigabitEthernet1 0 14 Untrust A GigabitEthernet1 0 15 Untrust A 28 records 15 v per page page 1 2 record 1 15 Firs
70. SNMP session to access the agent or receive traps and notifications from the agent SNMPv2c Uses community names for authentication SNMPv2c is compatible with SNMPv1 but supports more operation modes data types and error codes SNMPv3 Uses a user based security model USM to secure SNMP communication You can contigure authentication and privacy mechanisms to authenticate and encrypt SNMP packets for integrity authenticity and contidentiality Recommended configuration procedure SNMPv3 differs from SNMPv1 and SNMPv2c in many ways Their configuration procedures are described in separate sections Table 31 SNMPv1 or SNMPv2c configuration task list Task Remarks Required The SNMP agent function is disabled by default IMPORTANT If SNMP agent is disabled all SNMP agent related configurations are removed Enabling SNMP agent Optional Configuring an SNMP view Atter creating SNMP views you can specify an SNMP view for an SNMP community to limit the MIB objects that can be accessed by the SNMP community Configuring an SNMP community Required Optional Allows you to configure that the agent can send SNMP traps to the NMS and configure information about the target host usually the Configuring SNMP trap function NMS of the SNMP traps The SNMP agent sends traps to inform the NMS of important events such as a reboot By default an agent is allowed to send SNMP traps to the NMS Displaying SNMP p
71. STP compatible mode when detecting that it is connected with a device running STP e MSTP Each port on a device sends out MSTP BPDUs and automatically migrates to STP compatible mode when detecting that it is connected with a device running STP Sets the maximum number of hops in an MST region to restrict the region size Max Hops The setting can take effect only when it is configured on the regional root bridge Specities the standard for path cost calculation It can be Legacy IEEE Patn Cost Standard g02 1D 1998 or IEEE 802 1T Any two stations in a switched network are interconnected through a specific path composed of a series of devices The bridge diameter or the network diameter is the number of devices on the path composed of the most devices Atter you set the network diameter you cannot set the timers Instead the Bridge Diameter device automatically calculates the forward delay hello time and max age When you configure the bridge diameter follow these guidelines e The configured network diameter is effective on CIST only not on MSTls e The bridge diameter cannot be configured together with the timers Configure the timers e Forward Delay Set the delay for the root and designated ports to transit to the forwarding state e Hello Time Set the interval at which the device sends hello packets to the surrounding devices to make sure the paths are fault free e Max Age Set the maximum length of time
72. TC Protection Threshold 1 255 default 6 Apply Configuring Switch B 1 Configure an MST region on the switch in the same way the MST region is configured on Switch A 2 Configure MSTP globally a From the navigation tree select Network gt MSTP Click the Global tab Select Enable from the Enable STP Globally list Select MSTP from the Mode list Select the box before Instance Set the Instance ID field to 2 Set the Root Type field to Primary Click Apply p gt a me ao 202 Configuring Switch C 1 Configure an MST region on the switch in the same way the MST region is configured on Switch A Configure MSTP globally p mo ao h From the navigation tree select Network gt MSTP Click Global Select Enable from the Enable STP Globally list Select MSTP from the Mode list Select the box before Instance Set the Instance ID field to 3 Set the Root Type field to Primary Click Apply Configuring Switch D 1 Contigure an MST region on the switch in the same way the MST region is configured on Switch A Configure MSTP globally qd b C d From the navigation tree select Network gt MSTP Click Global Select Enable from the Enable STP Globally list Select MSTP from the Mode list Click Apply 203 Figure 187 Configuring MSTP globally on Switch D Region Global Port Summary Port Setup Global MSTP Configuration Path Cost Standard v _ Bridg
73. Web pac Associate the HTTP service with an IPv4 ACL v HTTP To configure the IPv4 ACL to be selected select QoS gt ACL IPv4 443 Authorized IP contiguration example Network requirements In Figure 440 configure Switch to deny Telnet and HTTP requests from Host A and permit Telnet and HTTP requests from Host B Figure 440 Network diagram Host A 10 1 1 2 24 10 1 1 1 24 Switch Host B ps 10 1 1 3 24 Configuration procedure 1 Create an ACL a From the navigation tree select QoS gt ACL IPv4 b Click Create c Enter 2001 for ACL Number d Click Apply Figure 441 Creating an ACL SUMMmar Basic Setup Advanced Setup Link Layer Setup Remove ACL Murmher 2001 2000 2999 for basic ACLS 3000 3999 for advanced ACLS 4000 4999 for Ethernet frame header ACLs Match Order Description Characters 0 1 27 Apply ACL Number Type Humber of Rules Match Order Description 2 Configure an ACL rule to permit Host B 444 a Click Basic Setup C The page for configuring an ACL rule appears Select 2001 from the ACL list select Permit from the Action list select the Source IP Address box and enter 10 1 1 3 and then enter 0 0 0 0 in the Source Wildcard field Click Add Figure 442 Configuring an ACL rule to permit Host B SUmmar Create Advanced Setup Link Layer Setup Remove aot 2001 k Configure a Basic ACL C Fule ID Po 0 65534 If no ID is entered the system will specify one
74. a 4 4 a4 Result Select External or Internal for loopback test type Select an Ethernet interface from the chassis front panel 89 A Click Test After the test is complete the system displays the loopback test result Figure 76 Loopback test result Testing type External Internal Result GigabitEthernet1 D 2 Loop internal succeeded 90 Configuring VCT Overview You can use the Virtual Cable Test VCT function to check the status of the cable connected to an Ethernet port on the device The result is returned in less than 5 seconds The test covers whether short circuit or open circuit occurs on the cable and the length of the faulty cable The fiber port does not support this feature Testing cable status Select Device gt VCT from the navigation tree to enter the page for testing cable status Select the port you want to test on the chassis front panel Click Test The test result is returned within 5 seconds and displayed in the Result field Figure 77 Testing the status of the cable connected to an Ethernet port T tT Test Result GigabitEthernet1 0 2 Cable status abnormal open 1 metre s Pair Impedance mismatch no Pair skew ns Pair swap Pair polarity Insertion loss db Return loss db Near end crosstalk db Note The error of the length detected is 5 meters The result displays the cable status and length The cable status can be normal a
75. a terminal device to advertise its serial number Manufacturer Name Allows a terminal device to advertise its vendor name Model Name Allows a terminal device to advertise its model name Allows a terminal device to advertise its asset ID The typical case is that the Asset ID user specifies the asset ID for the endpoint to facilitate directory management and asset tracking Allows a network device to advertise the appropriate location identitier Location Identification information for a terminal device to use in the context of location based applications For more information about LLDPDU TLVs see the IEEE standard LLDP 802 1AB 2005 and the LLDP MED standard ANSI TIA 1057 Management address The network management system uses the management address of a device to identify and manage the device for topology maintenance and network management The management address is encapsulated in the management address TLV LLDP operating modes LLDP can operate in one of the following modes TxRx mode A port in this mode can send and receive LLDP frames Tx mode A port in this mode can only send LLDP frames Rx mode A port in this mode can only receive LLDP frames Disable mode A port in this mode cannot send or receive LLDP frames Each time the LLDP operating mode of a port changes its LLDP protocol state machine reinitializes A configurable reinitialization delay prevents frequent initializations caused by frequent changes
76. a vendor by the IEEE In this document however OUI addresses are used by the system to determine whether received packets are voice packets and they are the results of the AND operation of a MAC address and a mask For more information see Adding OU addresses to the OUI list You can remove default OUI addresses and if needed add them to the OUI list after their removal Voice VLAN assignment modes A port connected to a voice device an IP phone for example can be assigned to a voice VLAN in one of the following modes e Automatic mode The system matches the source MAC addresses in the protocol packets tagged packets sent by the IP phone upon its power on against the OUI list If a match is found the system 156 automatically assigns the receiving port to a voice VLAN issues ACL rules and configures the packet precedence You can configure an aging timer for the voice VLAN The system will remove the port from the voice VLAN when the aging timer expires if no voice packet is received on the port during the aging timer The system automatically assigns ports to or removes ports from a voice VLAN Automatic mode is suitable for scenarios where PCs and IP phones connected in series access the network through the device and ports on the device simultaneously transmit both voice trattic and data trattic as shown in Figure 148 When the voice VLAN works normally if the system reboots the system reassigns ports in automatic voice VLAN
77. address of the device Chassis ID 231 Field Description Port ID type Port ID type Port ID System capabilities supported System capabilities enabled Auto negotiation supported Auto negotiation enabled OperMau Link aggregation supported Link aggregation enabled Aggregation port ID Maximum frame Size Device class Interface alias Port component MAC address Network address Interface name Agent circuit ID Locally assigned Locally detined port ID type other than those listed above Port ID value Capabilities supported on the system Repeater Bridge Router Capabilities enabled on the system Repeater Bridge Router Indicates whether autonegotiation is supported on the port Indicates whether autonegotiation is enabled on the port Speed and duplex state on the port Indicates whether link aggregation is supported Indicates whether link aggregation is enabled Link aggregation group ID It is O if the neighbor port is not assigned to any link aggregation group Maximum frame size supported on the neighbor port MED device class Connectivity device An intermediate device that provide network connectivity Class I A generic endpoint device All endpoints that require the discovery service of LLDP belong to this category Class II A media endpoint device The class Il endpoint devices support the media stream capabilities and the capabilities of ge
78. and the capabilities of generic endpoint devices Device class e Class II A communication endpoint device The class Ill endpoint devices directly support end users of the IP communication system Providing all capabilities of generic and media endpoint devices Class III endpoint devices are used directly by end users 235 Displaying LLDP information received trom LLDP neighbors 1 From the navigation tree select Network gt LLDP 2 Click the Neighbor Summary tab to display the global LLDP neighbor information as shown in Figure 207 Figure 207 The neighbor summary tab Port Setup Global Setup Global Summary x Update Time Search Advanced Search Update Time Local Port Chassis ID Chassis ID Type Port ID Port ID Type System Name 0 days 0 hours 0 i GigabitEthernet1 0 4 0020 1316 5c00 MAC address Ethernet1 0 1 Interface name 2126 minutes 19 seconds Refresh LLDP configuration example Network requirements As shown in Figure 208 configure LLDP on Switch A and Switch B so that the NMS can determine the status of the link between Switch A and MED and the link between Switch A and Switch B Figure 208 Network diagram Switch A Switch B Configuring Switch A 1 Optional Enable LLDP on GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 By default LLDP is enabled on Ethernet ports 2 Set the LLDP operating mode to Rx on GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 a From the navigation tree select Ne
79. area Allows you to configure and display features Title area On the left displays the path of the current configuration interface in the navigation area on the right provides the Save button to quickly save the current contiguration the Help button to display the Web related help information and the Logout button to log out of the Web interface Web user level Web user levels from low to high are visitor monitor configure and management A user with a higher level has all the operating rights of a user with a lower level Visitor Users of this level can only use the network diagnostic tools ping and Trace Route They can neither access the device data nor configure the device Monitor Users of this level can only access the device data but cannot contigure the device Configure Users of this level can access device data and contigure the device but they cannot upgrade the host software add delete modify users or backup restore contiguration files Management Users of this level can perform any operations to the device Web based NM functions User level in Table 1 indicates that users of this level or users of a higher level can perform the corresponding operations Table 1 Web based NM function description Function menu Description User level Wizard IP Setup Perform quick configuration of the device Management Display global settings and port settings of a stack Configure etup Configure global par
80. assigned an IP address to the DHCP Detect client and the receiving interface The administrator can use this information to check out DHCP unauthorized servers The device puts a record once for each DHCP server The administrator needs to find unauthorized DHCP servers from the log information After the information of recorded DHCP servers is cleared the relay agent re records server information following this mechanism Enable or disable periodic refresh of dynamic client entries and set the refresh interval Dynamic Bindings A DHCP client sends a DHCP RELEASE unicast message to the DHCP server through Refresh the DHCP relay agent to relinquish its IP address In this case the DHCP relay agent simply conveys the message to the DHCP server thus it does not remove the IP address from dynamic client entries To solve this problem the periodic refresh of dynamic client entries feature is introduced With this feature the DHCP relay agent uses the IP address of a client and the MAC address of the DHCP relay agent interface to periodically send a DHCP REQUEST message to the DHCP server e If the server returns a DHCP ACK message or does not return any message within a specitic interval which means that the IP address is assignable now the DHCP Track Timer Interval relay agent ages out the client entry e If the server returns a DHCP NAK message which means the IP address is still in use the relay agent does not age it out If the Au
81. assignment mode to the voice VLAN after the reboot ensuring that existing voice connections can work normally In this case voice trattic streams do not trigger port assignment to the voice VLAN Figure 148 PCs and IP phones connected in series access the network amp S Host IP Phone Device Voice gateway Manual mode You must assign the port to a voice VLAN manually Then the system matches the source MAC addresses in the packets against the OUI addresses If a match is found the system issues ACL rules and configures the packet precedence In this mode you must manually assign ports to or remove ports from a voice VLAN Manual mode is suitable for scenarios where only IP phones access the network through the device and ports on the device transmit only voice traffic as shown in Figure 149 In this mode ports assigned to a voice VLAN transmit voice traftic exclusively which prevents the impact of data trattic on the transmission of voice traftic Figure 149 Only IP phones access the network Voice gateway IP Phone IP Phone Both modes forward tagged packets according to their tags Table 46 and Table 47 list the configurations required for ports of ditferent link types to support tagged or untagged voice traffic sent from IP phones when different voice VLAN assignment modes are configured IP phones send tagged voice traftic 157 Table 46 Required configurations on ports of different link types for them t
82. authentication server to the device after an 802 1X user or MAC authenticated user passes authentication Configuring permitted OUls 1 From the navigation tree select Authentication gt Port Security The Port Security page as shown in Figure 409 appears 2 In the Advanced Port Security Configuration area click Permitted OUls Figure 417 Permitted OUls FPermitted COL Is for ports working in the mode of 802 1 MAC Based Or DUI OUI value Add n the format H H H Only the first 24 bits make sense Ol value Operation 0001 0000 0000 il 1234 0000 0000 j 3 Enter the 48 bit MAC address in the format of H H H in the OUI Value field Click Add The system automatically saves the first 24 bits as an OUI value 429 Port security configuration examples Basic port security mode configuration example Network requirements As shown in Figure 418 configure port GigabitEthernet 1 0 3 of the switch as follows e Allow up to three users to access the port without authentication and permit the port to learn the MAC addresses of the users as secure MAC addresses e After the number of secure MAC addresses reaches 3 the port stops learning MAC addresses If an unknown MAC address frame arrives intrusion protection is triggered and the port is disabled and stays silence for 30 seconds Figure 418 Network diagram GE1 0 3 192 168 1 1 24 Internet wa Host Switch Configuring global port security settings 1 From
83. before re authentication it must also assign a VLAN at re authentication If the authentication server has assigned no VLAN before re authentication it must not assign one at re authentication Violation of either rule can cause the user to be logged off The VLANs assigned to an online user before and after re authentication can be the same or different Specifies an existing VLAN as the guest VLAN Guest VLAN For more information see Configuring an 802 1X guest VLAN Specifies whether to enable MAC based VLAN Required when MAC Based is selected for Port Control Enable MAC VLAN NOTE Only hybrid ports support the feature Specifies an existing VLAN as the Auth Fail VLAN to accommodate users that Auth Fail VLAN have failed 802 1X authentication For more information see Configuring an Auth Fail VLAN Contiguring an 802 1X guest VLAN Configuration prerequisites Create the VLAN to be specitied as the 802 1X guest VLAN If the 802 1 X enabled port performs MAC based access control configure the port as a hybrid port enable MAC based VLAN on the port and assign the port to the 802 1X guest VLAN as an untagged member Configuration guidelines The 802 1X guest VLANs on different ports can be different Assign different IDs to the port VLAN and the 802 1X guest VLAN on a port so the port can correctly process incoming VLAN tagged traffic With 802 1X authentication a hybrid port is always assigned to a VLAN
84. bursty traffic is allowed Priority mapping Concepts When a packet enters a network it is marked with a certain priority to indicate its scheduling weight or forwarding priority Then the intermediate nodes in the network process the packet according to the priority When a packet enters a device the device assigns to the packet a set of predefined parameters including the 802 1p priority DSCP values and local precedence 474 e For more information about 802 1p priority and DSCP values see Packet precedences e Local precedence is a locally significant precedence that the device assigns to a packet A local precedence value corresponds to an output queue Packets with the highest local precedence are processed preferentially The device provides the following priority trust modes on a port e Trust packet priority The device assigns to the packet the priority parameters corresponding to the packet s priority from the mapping table e Trust port priority The device assigns a priority to a packet by mapping the priority of the receiving port You can select one priority trust mode as needed Figure 462 shows the process of priority mapping on a device Figure 462 Priority mapping process Assign to a packet the priority parameters corresponding to the packet priority from the mapping table Assign local precedence to packets by mapping the priority of the receiving port i J Receiving i interfa
85. c Select Untagged for Select membership type d Enter 100 in the VLAN IDs field e Click Apply A configuration process dialog box appears f After the configuration process is complete click Close Figure 223 Adding GigabitEthernet 1 0 1 to VLAN 100 Select VLAN Create Port Detail Detail Modify VLAN Remove Select Ports BODO OCC AEEE Select All Select None C Not avaliable for selection Select membership type Untagged Tagged Not A Member Link Type PVD Enter VLAN IDs to which the port is to be assigned VLAN IDs Example 1 3 5 10 Selected ports Untagged Membership GE1 0 4 Apply Cancel Create VLAN interface 100 a From the navigation tree select Network gt VLAN Interface b Click the Create tab c Enter 100 in the VLAN ID field d Select Configure Primary IPv4 Address e Select Manual f Enter 192 168 1 2 in the IPv4 Address field g Enter 24 or 255 255 255 0 in the Mask Length field h Click Apply 248 Figure 224 Creating VLAN interface 100 SUMMA Ary Modify Remove Input a WYLAN ID 104098 Configure Primary Pwt Address DHCP BOOTP Manual Pua Address 192 168 1 2 Mask Length 255 255 255 0 E configure IPv6 Link Local Address Auto Manual P Address Apply Cancel Create a static ARP entry a From the navigation tree select Network gt ARP Management The detault ARP Table page appears Click Add Enter 192 168 1 1 in the IP Addre
86. class and assign specific IP addresses to the DHCP clients Option 66 TFTP server name option It specifies a TFTP server to be assigned to the client Option 67 Bootfile name option It specifies the bootfile name to be assigned to the client Option 121 Classless route option It specities a list of classless static routes the destination addresses in these static routes are classless that the requesting client should add to its routing table If both Option 33 and Option 121 exist Option 33 is ignored Option 150 TFTP server IP address option It specifies the TFTP server IP address to be assigned to the client For more information about DHCP options see RFC 2132 and RFC 3442 Option 82 Some options such as Option 82 have no unitied definitions in RFC 2132 Option 82 is the relay agent option It records the location information about the DHCP client When a DHCP relay agent or DHCP snooping device receives a client s request it adds Option 82 to the request message and sends it to the server 295 The administrator can use Option 82 to locate the DHCP client and further implement security control and accounting The DHCP server can use Option 82 to provide individual configuration policies for the clients Option 82 can include up to 255 sub options and must have one sub option at least Option 82 supports two sub options sub option 1 Circuit ID and sub option 2 Remote ID Option 82 has no unified definiti
87. configuring MSTP 190 199 contiguring MSTP global 192 configuring MSTP port specitic 195 configuring NMM local port mirroring 83 configuring NMM local port mirroring group 80 contiguring NMM local port mirroring group monitor port 84 contiguring NMM local port mirroring group ports 81 contiguring NMM local port mirroring group source ports 84 configuring NMM RMON 105 configuring NMM RMON alarm function 95 configuring NMM RMON statistics function 95 configuring PoE 501 501 configuring PoE interface power management 498 contiguring PoE ports 498 configuring port isolation 441 configuring port link type 140 configuring port security 423 430 configuring port security global 424 contiguring port security advanced control 428 configuring port security advanced mode 433 configuring port security basic control 425 configuring port security basic mode 430 contiguring port security permitting OUls 429 configuring priority mapping table 477 487 contiguring priority trust mode 478 configuring priority trust mode on port 488 configuring PVID for port 141 contiguring QoS 489 configuring QoS classifier behavior associations 484 configuring QoS policy 476 configuring QoS traffic class 479 configuring QoS traffic mirroring 481 configuring QoS traffic redirecting 481 configuring queue scheduling 477 configuring queue scheduling on port 485 486 configuring RADIUS common parameters
88. considers a packet belongs to a class as long as the packet matches one of the criteria in the class 2 Traffic behavior A traffic behavior identified by a name defines a set of QoS actions for packets 3 Policy You can apply a QoS policy to a port A QoS policy can be applied to only the inbound direction of one port Perform the tasks in Table 150 to configure a QoS policy 476 Table 150 Recommended QoS policy configuration procedure Ste Remarks Required 1 Adding a class Add a class and specify the logical relationship between the match criteria in the class Required 2 Configuring classification rules i Configure match criteria for the class Required Add a traffic behavior m Adding a traffic behavior 4 Configure actions for the behavior o Configuring traffic mirroring and traffic redirecting Use either method for a traffic behavior Configure various actions for the traffic behavior o Configuring other actions for a traffic behavior Required m Adding a policy Radical icy Required Associate the traffic behavior with the class in the 6 Configuring classifier behavior associations for the QoS policy policy A class can be associated with only one traffic behavior in a QoS policy Associating a class already associated with a traffic behavior will overwrite the old association l l Required 7 Applying a policy to a port Apply the QoS policy to a port Recommended queue
89. data packets sends a trap message to the terminal and deletes the corresponding MAC address forwarding entry Recommended configuration procedure Step Remarks Required 1 Configuring loopback detection globally By default loopback detection is disabled globally 2 Configuring loopback detection on a port Required By default loopback detection is disabled on a port NOTE Loopback detection takes effect on a port only after you enable loopback detection both globally and on the port Contiguring loopback detection globally 1 From the navigation tree select Security gt Loopback Detection The System Loopback Detection area appears 447 Figure 444 Loopback detection configuration page System Loopback Detection Loopback Detection Enable loopback detection on the system Interval 30 Seconds 5 300 Default 30 Apply Port Loopback Detection RO Interface Name v Search Advanced Search Interface Name Loopback Detection Detection Control Detection in VLAN GigabitEthernet1 0 1 Disable v Disable GigabitEthernet1 0 2 Disable v Disable GigabitEthernet1 0 3 Disable Disable GigabitEthernet1 0 4 Disable v Disable GigabitEthernet1 0 5 Disable v Disable GigabitEthernet1 0 6 Disable v Disable GigabitEthernet1 0 7 Disable v Disable GigabitEthernet1 0 8 Disable v Disable GigabitEthernet1 0 9 Disable v Disable GigabitEthernet1 0 10 Disable v Disable GigabitEthernet1 0 11 Disable v Disable GigabitEthernet
90. detines two logical ports for the network access port controlled port and uncontrolled port Any packet arriving at the network access port is visible to both logical ports e Controlled port Allows incoming and outgoing traffic to pass through when it is in the authorized state and denies incoming and outgoing trattic when it is in the unauthorized state as shown in Figure 299 The controlled port is set in authorized state if the client has passed authentication and in unauthorized state if the client has failed authentication e Uncontrolled port Is always open to receive and transmit EAPOL frames Figure 299 Authorization state of a controlled port Authenticator system 1 Authenticator system 2 Controlled port Uncontrolled port Controlled port Uncontrolled port Port unauthorized Port authorized In the unauthorized state a controlled port controls traffic in one of the following ways e Performs bidirectional traffic control to deny traffic to and from the client e Performs unidirectional traffic control to deny traffic from the client The device supports only unidirectional traftic control Packet formats EAP packet format Figure 300 shows the EAP packet format Figure 300 EAP packet format 0 7 15 Length 4 Data N 322 e Code Type of the EAP packet Options include Request 1 Response 2 Success 3
91. device Figure 169 The MAC tab Setup R MAC v Search Advanced Search E MAC VLAN ID Type Port Operation F 6431 5045 d29e 1 Learned GigabitEthernet1 0 15 i 001b 2188 86ff 1 Learned GigabitEthernet1 0 24 i Add Refresh Del Selected 2 Click Add in the bottom to enter the page for creating MAC address entries Figure 170 Creating a MAC address entry Setup Add MAC MAC Example 0010 dc28 a4e9 Type static v VLAN 1 Y Port GigabitEthernet1 0 1 v Items marked with an asterisk are required Apply Cancel 3 Configure a MAC address entry as described in Table 52 4 Click Apply Table 52 Configuration items ltem Description MAC Set the MAC address to be added 174 ltem Description Set the type of the MAC address entry e Static Static MAC address entries that never age out e Dynamic Dynamic MAC address entries that will age out e Blackhole Blackhole MAC address entries that never age out Type The MAC tab see Figure 169 displays the following types of MAC address entries e Config static Static MAC address entries manually configured by the users e Blackhole Blackhole MAC address entries e Learned Dynamic MAC address entries learned by the device e Other Other types of MAC address entries VLAN ID Set the ID of the VLAN to which the MAC address belongs Set the port to which the MAC address belongs This port must belong to the specitied Fo VLAN Setting the aging time of MAC addres
92. diagnostic information 54 viewing device electronic label 54 Web based NM functions 8 WRR queuing basic queuing 472 472 group based queuing 472 472 534
93. displaying SNMP packet statistics appears Figure 114 SNMP packet statistics SMMP Statistics count Messages delivered to the SMHMF entity Messages which were for an unsupported version Messages which used a SMMP community name not known Messages which represented an illegal operation forthe community supplied ASH 1 or BER errors in the process of decoding MIB objects retrieved successfully MIB objects altered successtully GethequestPOl accepted and processed GetlextRequestPOW accepted and processed SethequestPOll accepted and processed Messages passed from the SNMP entity SMMP POUs which had toobig errorstatus Maximum packet size 2000 SNMF PLUS which had nosuchMNarme errorstatus SNMF FOs which had hadwvalue errorstatus SMMP POUS which had denErr error status GetrResponse POW accepted and processed D aa OD A A A DIE A A A A DIE DE DO Trap POUs accepted and processed Refresh 123 SNMPv1 v2c contiguration example Network requirements As shown in Figure 115 the NMS at 1 1 1 2 24 uses SNMPv1 or SNMPv2c to manage the switch agent at 1 1 1 1 24 and the switch automatically sends traps to report events to the NMS Figure 115 Network diagram Switch Agent Vlan int2 D 1 1 1 1 24 Yy NMS 1 1 1 2 24 Configuring the agent 1 2 Ena b C ble SNMP Select Device gt SNMP from the navigation tree The SNMP configuration page appears Select the Enable option and select the v1 and v2c options Clic
94. displaying recent system logs 48 displaying system information 47 47 displaying system resource state 48 system time configuration 56 configuration by using NTP 58 configuring system time by using NTP 57 contiguring system time manually 56 displaying current system time 56 T table active route table IPv4 279 active route table IPv6 281 ARP static entry creation 245 IP routing 278 IP services ARP entry configuration 244 IP services ARP entry removal 245 MAC address 173 174 175 MSTP VLAN to instance mapping table 187 Telnet AAA contiguration 359 terminal setting parameters 21 testing cable status 91 time ACL time range configuration 453 Ethernet link aggregation LACP timeout interval 205 time range configuration 453 timer 802 1X 328 IP multicast IGMP snooping dynamic port aging timer 253 IPv6 multicast MLD snooping dynamic port aging timer 26 7 MAC address table dynamic aging timer 175 MAC authentication timers 405 STP forward delay 184 STP hello 184 STP max age 184 TLV LLDPDU basic management types 218 LLDPDU LLDP MED types 218 LLDPDU management address TLV 221 LLDPDU organization specific types 218 token bucket QoS traffic forwarding 473 topology STP TCN BPDU protocol packets 177 traceroute IP address retrieval 317 319 node failure detection 317 319 system maintenance 31 traffic ACL configuration 450 ACL configuration Ethernet frame header
95. each interface Make sure the RADIUS servers host and switch can reach each other Details not shown Configuring the RADIUS servers Add a user account with the host MAC address unhyphenated as both the username and password and specify ACL 3000 as the authorization ACL for the user account Details not shown For information about the RADIUS server contiguration see Configuring RADIUS Configuring a RADIUS scheme for the switch 1 Create a RADIUS scheme a From the navigation tree select Authentication gt RADIUS b Click Add c Enter the scheme name system d Select the server type Extended e Select Without domain name trom the Username Format list f Click Apply 2 Configure the primary authentication server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Configure the RADIUS authentication server Select Primary Authentication from the Server Type list Enter 10 1 1 1 in the IP Address field and enter the port number 1812 Enter expert in the Key field and the Confirm Key field c Click Apply 412 Figure 397 Configuring a RADIUS authentication server Add RADIUS Server Server Type Primary Authenticatio IP Address IPvd Pv6 10 1 1 1 Port 1612 1 65535 Default 1812 Key seesse S w 4 4 haa Confirm Key TT 1 64 Chars Apply Cancel 3 Configure the primary accounting server in the RADIUS scheme a In the RADIUS
96. entity and configure the identity information A certificate is the binding of a public key and the identity information of an entity where the DN shows the identity information of the entity A CA 1 Creating a PKI entity identifies a certificate applicant uniquely by an entity DN The DN settings of an entity must be compliant to the CA certificate issue policy Otherwise the certificate request might be rejected You must know the policy to determine which entity parameters are mandatory or optional Required Create a PKI domain setting the certificate request mode to Auto Before requesting a PKI certificate an entity needs to be configured with 2 Creating a PKI domain some enrollment information which is called a PKI domain A PKI domain is intended only for convenience of reference by other applications like IKE and SSL and has only local significance Optional AL do Destroy the existing RSA key pair and the corresponding local certificate If the certificate to be retrieved contains an RSA key pair you must destroy the existing key pair Otherwise the retrieving operation will fail 4 Retrieving and displaying a Optional certificate Retrieve an existing certificate 5 Retrieving and displayinga Optional CRL Retrieve a CRL and display its contents Creating a PKI entity 1 From the navigation tree select Authentication gt Certificate Management The PKI entity list page is displayed by default
97. event logs 104 RMON history sampling information 103 RMON statistics 101 SNMP packet statistics 123 specified operation parameter for all ports 73 stack device summary 42 stack topology summary 42 syslogs 61 Web device file 67 Web page display 16 done message IPv multicast MLD snooping 269 downloading 512 Web device file 67 DSCP QoS packet IP precedence and DSCP values 469 dst mac validity check ARP 250 dynamic ARP table entry 244 DHCP address allocation 292 Ethernet link aggregation dynamic mode 207 Ethernet link aggregation mode 206 Ethernet link dynamic aggregation group contiguration 208 IP multicast IGMP snooping dynamic port 253 IPv multicast MLD snooping dynamic port 267 MAC address table dynamic aging timer 175 MAC address table entry 174 Dynamic Host Configuration Protocol See DHCP EAP security 802 1X EAP over RADIUS 323 security 802 1X packet format 322 security 802 1X RADIUS EAP Message attribute 324 security 802 1X RADIUS Message Authentication attribute 324 security 802 1X relay authentication 326 security 802 1X relay termination 327 security 802 1X relay termination authentication mode 325 EAPOL security 802 1X authentication access device initiated 324 security 802 1X authentication client initiated 324 security 802 1X packet format 323 edge port MST 187 emulator terminal parameters 21 enabling DHCP 299 DHCP relay agent on inter
98. field follows e Packet body Content of the packet When the EAPOL packet type is EAP Packet the Packet body field contains an EAP packet EAP over RADIUS RADIUS adds two attributes EAP Message and Message Authenticator for supporting EAP authentication For the RADIUS packet format see Configuring RADIUS 323 EAP Message RADIUS encapsulates EAP packets in the EAP Message attribute as shown in Figure 302 The Type field takes 79 and the Value field can be up to 253 bytes If an EAP packet is longer than 253 bytes RADIUS encapsulates it in multiple EAP Message attributes Figure 302 EAP Message attribute format EAP packets Message Authenticator RADIUS includes the Message Authenticator attribute in all packets that have an EAP Message attribute to check their integrity The packet receiver drops the packet if the calculated packet integrity checksum is different from the Message Authenticator attribute value The Message Authenticator prevents EAP authentication packets from being tampered with during EAP authentication Figure 303 Message Authenticator attribute format 0 1 2 18 bytes Initiating 802 1X authentication Both the 802 1X client and the access device can initiate 802 1X authentication 802 1X client as the initiator The client sends an EAPOLStart packet to the access device to initiate 802 1X authentication The destination MAC address of the packet is the IEEE 802 1X specified multicast addres
99. following parameters a Select the ACL 3000 b Select Rule ID and enter the rule ID 0 417 c Select the action Deny d In the IP Address Filter area select Destination IP Address Enter the destination IP address 10 0 0 1 Enter the destination address wildcard 0 0 0 0 e Click Add Figure 406 Configuring an ACL rule Summary Add Basic Setup Link Layer Setup Remove ACL 3000 w Help Configure an Advanced ACL Rule ID oO fO KOB5534 If no ID is entered the system will specify ane Action C Mor first Fragments Only J Logging IF Address Filter D Source IP Adress O Sowcewndcard Destination IP Address 10 0 0 1 Destination Wildcard 0 0 0 0 ProtorollP w IMP Type ICMP Message cme Twee fey temp code koas TEBILDP Port TCP Connection Established sours perse ee boctnations Oaar Poe Range of Portis 0 65535 Precedence Filter DELF Mot Check TOS Mot Check w Precedence Mot Check al Time Range Add Rule ID Operation Description Time Fiat Configuring MAC authentication 1 Configure MAC authentication globally a From the navigation tree select Authentication gt MAC Authentication 418 b Select Enable MAC Authentication c Click Advanced d Select the authentication ISP domain test select the authentication information format MAC without hyphen and click Apply Figure 407 Configuring MAC authentication globally MAC Authentication Conf
100. how to configure the NMS see the NMS manual Verifying the configuration After the above contiguration an SNMP connection is established between the NMS and the agent The NMS can get and configure the values of some parameters on the agent through MIB nodes Disable or enable an idle interface on the agent and you can see the interface state change traps on the NMS SNMPv3 configuration example Network requirements As shown in Figure 121 the NMS 1 1 1 2 24 uses SNMPv3 to monitor and manage the interface status of the AP the agent at 1 1 1 1 24 and the AP automatically sends traps to report events to the NMS The NMS and the agent perform authentication when they set up an SNMP session The authentication algorithm is MD5 and the authentication key is authkey The NMS and the AP also encrypt the SNMP packets between them by using the DES56 algorithm and the privacy key prikey Figure 121 Network diagram Vlan int2 ai 1 1 1 1 24 Yy Switch NMS Agent 1 1 1 2 24 Configuring the agent 1 Enable SNMP agent a Select Device gt SNMP from the navigation tree The SNMP configuration page appears b Select the Enable option and select the v3 option c Click Apply Figure 122 Configuring the SNMP agent Community Group User Trap View Enable Disable Local Engine ID 3630303036394 13296953 13330303030 40 64 Hex Chars Maximum Packet Size 1500 Bytes 484 17940 Default 1500 Contact 1 200Chars Lo
101. if displayed in pages The PC where you configure the device is not necessarily a Web based network management terminal A Web based network management terminal is a PC used to log in to the Web interface and is required to be reachable to the device After logging in to the Web interface you can select Device gt Users from the navigation tree create a new user and select Wizard or Network gt VLAN interface to configure the IP address of the VLAN interface acting as the management interface For more information see the corresponding configuration guides of these modules Overview The device provides web based configuration interfaces for visual device management and maintenance Figure 4 Web based network management operating environment e Device Logging in to the Web interface You can use the following default settings to log in to the web interface through HTTP e Username admin e Password None e P address of VLAN interface 1 on the device IP address of the device depending on the status of the network where the device resides o If the device is not connected to the network or no DHCP server exists in the subnet where the device resides you can get the IP address of the device on the label on the device IP address is 169 254 xxx xxx If the MAC address is OBOO4EOOO102 the IP address would be 169 254 1 2 o Ifa DHCP server exists in the subnet where the device resides the device will dynamical
102. information The network shown in Figure 334 contains two RADIUS servers You can choose different servers to implement different security functions For example you can use RADIUS server 1 for authentication and authorization and RADIUS server 2 for accounting You can implement any of the three security functions provided by AAA as needed For example if your company wants employees to be authenticated before they access specific resources configure an authentication server If network usage information is needed you must also configure an accounting server 352 AAA can be implemented through multiple protocols The device supports RADIUS which is most often used For more information about RADIUS see Configuring RADIUS Domain based user management A NAS manages users based on ISP domains On a NAS each user belongs to one ISP domain A NAS determines the ISP domain for a user by the username entered by the user at login For a username in the userid isp name format the access device considers the userid part the username for authentication and the isp name part the ISP domain name In a networking scenario with multiple ISPs a NAS can connect users of different ISPs Different ISP users can have different user attributes such as username and password structure different service type and ditferent rights To manage these ISP users you need to create ISP domains and then configure AAA methods and domain attributes for each
103. list Authentication Method list o CHAP Sets the access device to perform EAP termination and use CHAP to communicate with the RADIUS server o PAP Sets the access device to perform EAP termination and use PAP to communicate with the RADIUS server o EAP Sets the access device to relay EAP packets and supports any of the EAP authentication methods to communicate with the RADIUS server When you configure EAP relay or EAP termination consider the following factors 332 o The support of the RADIUS server for EAP packets o The authentication methods supported by the 802 1X client and the RADIUS server 4 Click Advanced to expand the advanced 802 1X configuration area Figure 309 Configuring advanced 802 1X parameters wAdvanced Quiet Enable the Quiet Function Quiet Period 60 seconds 10 120 Default 60 Retry Times 2 1 10 Default 2 Ta Perind 30 seconds 10 120 Default 30 Handshake Period 15 seconds 5 1024 Default 151 Re Authentication Period 3600seconds 60 7200 Default 3600 Supplicant Timeout Time 30 seconds 1 120 Defaultt 30 Server Timeout Time 100 seconds 100 300 Default 100 5 Configure advanced 802 1X settings as described in Table 104 and then click Apply Table 104 Configuration items ltem Description Quiet Sets whether to enable the quiet timer Quiet Period Sets the value of the quiet timer Sets the maximum number of authentication request attempts The network access device
104. number of received packets with 65 to 127 octets Number of Received 65 to 127 Bytes Packets on the interface corresponding to the MIB node etherStatsPkts65to 1 27Octets l Total numker of received packets with 128 to 255 octets MOE a Nae Ryle on the interface corresponding to the MIB node Packets etherStatsPkts 128t02550Octets l Total numker of received packets with 256 to 511 octets A Ned 2 AE BIS on the interface corresponding to the MIB node Packets etherStatsPkts256to5 1 1 Octets Total number of received packets with 512 to 1023 sd of Received 512 to 1023 Bytes octets on the interface corresponding to the MIB node ackels etherStatsPkts5 1 2to 1O23Octets ea Recess NE EE Total number of received packets with 1024 to 1518 y f fi EE ENE j y octets on the interface corresponding to the MIB node ackets etherStatsPkts1024t015180Octets Displaying RMON history sampling information Select Device gt RMON from the navigation tree Click the History tab Click the icon for a history entry Figure 89 RMON history sampling information statistics Alarm Evert Log History Group Detail Current inietace GigabaEthemetliOid Time Search Advanced Search HO Time Oropevents Odes Ps BroadcasiPets MullicasiFidts CROABONEMOrS UndersizePits OversizeFkls Fragments Jabbers Collisions Ubtlization 2000 4 1 26 p 0 0 0 0 0 0 0 0 0 o 132841 2000 4 2 d6 D 0 0 DO D 0 D D 0 123441 2000 4 3 26 0 38668 348 206
105. of MSTP packets that can be sent during each Hello interval The larger the transmit limit is the more network resources will be occupied HP recommends that you use the default value e MSTP Mode Sets whether the port migrates to the MSTP mode In a switched network if a port on an MSTP or RSTP device connects to a device running STP this port will automatically migrate to the STP compatible mode After the device running STP is removed the port on the MSTP or RSTP device might not be able to migrate automatically to the MSTP or RSTP mode but will remain operating in the STP compatible mode You can set this option to enable the port to automatically migrate to the MSTP or RSTP mode Selects one or multiple ports on which you want to configure MSTP on the chassis front panel If aggregate interfaces are configured on the device the page displays a list of aggregate interfaces below the chassis front panel You can select aggregate interfaces from this list Select port s Table 61 Protection types Protection type Description Sets the port as an edge port Some ports of access layer devices are directly connected to PCs or file servers which cannot generate BPDUs You can set these ports as edge ports to achieve Edged Port fast transition for these ports HP recommends that you enable the BPDU guard function in conjunction with the edged port function to avoid network topology changes when the edge ports receiv
106. online status of a client that has passed authentication If the device receives no response after sending the maximum number of handshake requests it considers that the client has logged off For information about how to enable the online user handshake function see Configuring 802 1X on a port e Quiet timer Starts when the access device sends a RADIUS Access Request packet to the authentication server If no response is received when this timer expires the access device retransmits the request to the server e Periodic online user re authentication timer Sets the interval at which the network device periodically re authenticates online 802 1X users For information about how to enable periodic online user re authentication on a port see Configuring 802 1X on a port Using 802 1X authentication with other features VLAN assignment You can contigure the authentication server to assign a VLAN for an 802 1X user that has passed authentication The way that the network access device handles VLANs on an 802 1 X enabled port differs by 802 1X access control mode Access control VLAN manipulation Assigns the VLAN to the port as the port VLAN PVID The authenticated 802 1X eend user and all subsequent 802 1X users can access the VLAN without authentication ort base When the user logs off the previous PVID restores and all other online users are logged off e If the port is a hybrid port with MAC based VLAN enabled the dev
107. option next to Interface State as shown in Figure 290 c Click Apply Figure 290 Configuring DHCP snooping functions on GigabitEthernet 1 0 1 DHCP Relay Interface Name GigabitEthernet1 0 4 Interface State Untrust Option 82 Support Enable Disable Option 82 Strategy Replace Default Replace Apply Cancel Configure DHCP snooping functions on GigabitEthernet 1 0 72 a Click the icon of GigabitEthernet 1 0 2 on the intertace list b Select the Untrust option for Interface State shown in Figure 291 c Select the Enable option next to Option 82 Support d Select Replace tor Option 82 Strategy e Click Apply Figure 291 Configuring DHCP snooping functions on GigabitEthernet 1 0 2 DHCP Relay Interface Name GigabitEthernet1 0 2 Interface State Trust Untrust Option 82 Support Enable Disable Option 82 Strategy Replace v Default Replace Apply Cancel 312 Operation D gt D gt D gt R 2 2 2 RR PR RR DD GO Configure DHCP snooping functions on GigabitEthernet 1 0 3 a b c d e Click the icon of GigabitEthernet 1 0 3 on the intertace list Select the Untrust option for Interface State as shown in Figure 292 Select the Enable option next to Option 82 Support Select Replace for Option 82 Strategy Click Apply Figure 292 Configuring DHCP snooping functions on GigabitEthernet 1 0 3 DHCP Relay Interface Name GigabitEthernet1 0 3 Interface State Trust Untrust Option 82
108. or Failure 4 e dentifier Used for matching Responses with Requests e Length Length in bytes of the EAP packet The length is the sum of the Code Identifier Length and Data fields e Data Content of the EAP packet This field appears only in a Request or Response EAP packet The Data field comprises the request type or the response type and the type data Type 1 Identify and type 4 MD5 challenge are two examples for the type field EAPOL packet format Figure 301 shows the EAPOL packet format Figure 301 EAPOL packet format 0 T 15 PAE Ethernet type 2 Length 6 Packet body N e PAE Ethernet type Protocol type It takes the value Ox888E for EAPOL e Protocol version The EAPOL protocol version used by the EAPOL packet sender e Type Type of the EAPOL packet Table 103 lists the types of EAPOL packets supported by HP implementation of 802 1X Table 103 Types of EAPOL packets Value Type Description The client and the network access device uses EAP Packets to ia ree transport authentication information 0x01 EAPOLStart The client sends an EAPOL Start message to initiate 802 1X authentication to the network access device 0x02 EAPOL Logoff The client sends an EAPOL Logoff message to tell the network access device that it is logging off e Length Data length in bytes or length of the Packet body If packet type is EAPOL Start or EAPOLLogoff this field is set to O and no Packet body
109. organization name for the entity Organization Unit Enter the unit name for the entity Creating a PKI domain From the navigation tree select Authentication gt Certificate Management 2 Click the Domain tab Figure 370 PKI domain list Entity Certificate CRL Domain Mame CA Identifier Entity Mame Requesthlode Operation abcd CA Server entity Manual EI Add 3 Click Add 4 Click Display Advanced Config to display the advanced configuration items 390 Figure 371 PKI domain configuration page Entity Certificate CAL Add PKI Domain Domain Mame 1 15Chars 3 CA Identifier 1 6 3Chars Entity Name entity Institution CAR Requesting URL 1 127 Chars 3 LDAP IP Port 389 Version Request Mode Manual Fingerprint Hash Fingerprint Advanced Configuration B mm Polling Count 1 100 Default 50 Polling Interval 20 minutes 5 168 Default 20 Enable CRL Checking CRL Update Period Hourstl F 20 CEL URL 1 127Chars 1 tems marked with an asteriski are required Apply Cancel 5 Configure the parameters as described in Table 121 6 Click Apply Table 121 Configuration items ltem Description Domain Name Enter the name for the PKI domain Enter the identifier of the trusted CA An entity requests a certificate from a trusted CA The trusted CA takes the responsibility CA Identifi P ale Segue i of certificate registration distribution and revocation and query In o
110. packet to a single RADIUS server If the device does not receive a response to its request from the RADIUS server within the response timeout period it retransmits the RADIUS request If the number of transmission attempts exceeds the limit but the device still does not receive a response from the RADIUS server the device considers the request a failure IMPORTANT The server response timeout time multiplied by the maximum number of RADIUS packet transmission attempts must not exceed 75 Request Transmission Attempts Set the interval for sending real time accounting information The interval must be a multiple of 3 To implement real time accounting the device must send real time accounting packets to the accounting server for online users periodically Realtime Accounting Interval Different real time accounting intervals impose different performance requirements on the NAS and the RADIUS server A shorter interval helps achieve higher accounting precision but requires higher performance Use a longer interval when a large number of users 1000 or more exist For more information about the recommended real time accounting intervals see Configuration guidelines Set the maximum number of attempts for sending a real time accounting Realtime Accounting Attempts request Specify the unit for data flows sent to the RADIUS server which can be e Byte Unit for Data Flows e Kilo byte e Mega byte e Giga byte Specify t
111. page for modifying the VLANs to which a port belongs Select GigabitEthernet 1 0 1 on the chassis front device panel select the Tagged option and enter VLAN IDs 2 6 50 Click Apply A contiguration progress dialog box appears Atter the contiguration process is complete click Close in the dialog box 148 Figure 145 Assigning GigabitEthernet 1 0 1 to VLAN 2 and to VLANs 6 through 50 as a tagged member Select VLAN Create Port Detail Detail Modify VLAN Remove Select Ports AA ep ef eee Te BODE QQE HH je Solod AR Sealed None LJ Not avaliable for selection Select membership type Untagged NotA Member Link Type PVID Enter VLAN IDs to which the portis to be assigned VLAN IDs 2 6 50 Example 1 3 5 10 Selected ports Tagged Membership Cancel Contiguring Switch B Configure Switch B in the same way Switch A is contigured Details not shown Contiguration guidelines When you contigure VLANs follow these guidelines e As the default VLAN VLAN 1 can be neither created nor removed manually e You cannot manually create or remove VLANs reserved for special purposes e Dynamic VLANs cannot be removed on the page for removing VLANs e You cannot remove a VLAN that has referenced a QoS policy 149 Configuring VLAN interfaces Before creating a VLAN interface you must create the corresponding VLAN in Network gt VLAN For more information see Configuring VLANs Overview For host
112. pair EE EE EE OE EE EE EE EE EE EE 304 Retrieving ond displaying a certificape OE ee 304 Reguesting a local certificate eeeeeeeeeeereeerereseeeseeeeeesereseeeseeseeseeeseceseesseesereseceseesseeseceseceseesseoseressceseeseeosereseeeseesereseceseeeseene 306 Retrieving ond displaying ae IE ee 308 PKI configuration example trtee tere seek ee eE RSG R ERGER EE ROER GER gek EER GE GER gee EER GER GER gee GEROER GER GER gee R GER gek ee ReeR GER gek ee Roe ge Reese 399 Configuration guidelines EO EE T 403 Configuring MAC authentication sesse see Ee Ee EE Ee Ee EER ER AE ERGE Ee AE Re Re EE Re Ee ERA ER AE ER AE Re EER ER AE Ee EE Re EE Re EE ee ee 404 OVET ee eee E ee 404 User account policies E EE DE E T 404 Authentication met hodseeeeeeeeeeereeeseeeseereeesereseeeseeseeseeeseeeseesseeseeeseeeseesseosereseessreseeosereseeseeesresereeseeesreseeeseeeseeeseeseeesee 404 MAC authentication timeprs eeeeeeeeeeereeereeeseeseeeeeerereseeeseeeseeseceseeeseeseeeseceseesseeserorcesereseeeseesereseceseeesereseceseeeseesereseeeseee 405 Using MAC ET MR ER NR euros ennea EE EE eee 405 MENEER ESE EE 405 ACL assignment RE EE Ge GE T IG T 405 TA LE a HE MERE RE E AE N 405 Configuration eo 18 0 0 1 Sate 406 Recommended configuration procedure TEE EA SEEE ee 406 Configuring MAC authentication globally EE EE EE E E E EE EO E E INE 406 Configuring MAC authentication on a port mm EE EE RE EE EE 408 MAC authentication configuration examples EE TEE EO EE E T 40
113. port assuming that it is a dynamic member port receives any MLD report in response to the MLD multicast address specific query betore its aging timer expires it means that some host attached to the port is receiving or expecting to receive IPv6 multicast data for that IPv multicast group The switch resets the aging timer for the port If the port receives no MLD report in response to the MLD multicast address specitic query before its aging timer expires it means that no hosts attached to the port are still monitoring that IPv6 multicast group address The switch removes the port from the forwarding entry for the IPv multicast group when the aging timer expires Protocols and standards RFC 4541 Considerations for Internet Group Management Protocol IGMP and Multicast Listener Discovery MLD Snooping Switches Recommended contiguration procedure Step Remarks Enabling MLD snooping Required globally Disabled by default 269 Step Remarks Required Enable MLD snooping in the VLAN and configure the MLD snooping version and querier Configuring MLD snooping in By default MLD snooping is disabled in a VLAN a VLAN When you enable MLD snooping follow these guidelines e Enable MLD snooping globally before you enable it for a VLAN e MLD snooping for a VLAN takes effect only on the member ports in that VLAN Optional Configure the maximum number of IPv multicast groups and fast leave processing on a port of the
114. ports support this configration Auth Fail VLAN 1 4094 Items marked with an asterisk are required Apply Cancel Table 105 describes the configuration items Table 105 Configuration items ltem Descri ption Selects a port where you want to enable 802 1X Only ports not enabled a with 802 1X authentication are available or 802 1X contiguration takes effect on a port only after 802 1X is enabled both globally and on the port Port Control Selects an access control method for the port MAC Based or Port Based Selects a port authorization state for 802 1X e Auto Places the port initially in the unauthorized state to allow only EAPOL packets to pass and after a user passes authentication sets the port in the authorized state to allow access to the network You can use Port Authorization this option in most scenarios e Force Authorized Places the port in the authorized state enabling users on the port to access the network without authentication e Force Unauthorized Places the port in the unauthorized state denying any access requests from users on the port Max Number of Users Sets the maximum number of concurrent 802 1X users on the port Specifies whether to enable the online user handshake function This function enables the network access device to send handshake messages to online users at the interval set by the Handshake Period setting If no response is received from an online user after the maximu
115. scheduling configuration procedure Ste Remarks l Optional 1 Configuring queue scheduling on a port Configure the queue scheduling mode for a port Recommended rate limit configuration procedure Step Remarks Required 1 Configuring rate limit on a port Limit the rate of incoming packets or outgoing packets of a physical port Recommended priority mapping table configuration procedure Ste Remarks 477 Recommended priority trust mode configuration procedure Step Remarks Reguired 1 Configuring priority trust mode on a port Set the priority trust mode of a port Adding a class 1 Select QoS gt Classifier from the navigation tree 2 Click the Add tab to enter the page for adding a class Figure 463 Adding a class Summary Setup Remove Add Classifier Mame Operation Rule Count 3 Add a class as described in Table 151 A Click Add Table 151 Configuration items liem Description Classifier Name Specify a name for the classifier to be added Specify the logical relationship between rules of the classifier e and Specifies the relationship between the rules in a class as logic AND The device considers a packet belongs to a class only when the packet matches all the Operator rules in the class e or Specifies the relationship between the rules in a class as logic OR The device considers a packet belongs to a class as long as the packet matches one of the rules in
116. security level is Auth Priv Privacy Password Set the privacy password when the security level is Auth Priv The confirm privacy password must be the same with the privacy Confirm Privacy Password d password Associate a basic ACL with the user to restrict the source IP address of SNMP packets To allow or prohibit the specified NMS to access the agent by using this user name you can allow or prohibit SNMP packets with a specific source IP address ACL Contiguring SNMP trap function 1 Select Device gt SNMP from the navigation tree 2 Click the Trap tab The Trap tab appears 121 Figure 112 Traps configuration Setup Community Group ser Wiewy 7 Enable SNMP Trap Apply Trap Target Host Destination IP Address Search Advanced Search Destination IP UDP Security Security E EE Pyh PvE Domain Security Mame Pon EE E Operation F 10 1 1 2 Pd useri 152 v3 AUthiF riv fe il Add Delete Selected Select Enable SNMP Trap Click Apply to enable the SNMP trap function Click Add The page for adding a target host of SNMP traps appears Figure 113 Adding a target host of SNMP traps Setup Community Group Iser View Add Trap Target Host ad Destination IP Address IPy4 Damain Fv tt 288hars Security Name Loo Ma aaonars UDF Fort 162 0 65535 Default 162 Security Model y w Security Level tems marked with an asterisk are required Apply Cancel Configure the settings for t
117. server and the secondary accounting server and the RADIUS server at 192 168 1 3 functions as the secondary authentication server and the primary accounting server The shared key for authentication is name and the shared key for accounting is money e All users use the default authentication authorization and accounting methods of ISP domain system e The switch sends usernames without domain names to the RADIUS server Configure port GigabitEthernet 1 0 1 of the switch to perform the following operations e Allow only one 802 1X user to be authenticated e Allow up to three OUI values to be configured and allow one terminal that uses any of the OUI values to access the port Figure 424 Network diagram RADIUS server 192 168 1 2 24 GE1 0 1 192 168 1 1 24 Internet Host Switch 433 NOTE Configurations on the host and RADIUS servers are not shown Configuring a RADIUS scheme 1 3 Create a RADIUS scheme a From the navigation tree select Authentication gt RADIUS b Click Add c On the page that appears configure a RADIUS scheme Enter the scheme name system Select the service type Extended Select Without domain name from the Username Format list d Click Apply Configure the primary authentication server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Configure the primary authentication server Select the server type Primary Authentication
118. set the device type DHCP server switch or LLDP MED endpoint country code and network device address When you configure the network device address select the address Network Device information type from the list enter the address information in the Address field below and click Add next to the field to add the information to the address information list below To remove an address information entry select the entry from the list and click Delete The civic address information can include language province state country city street house number name postal zip code room number post office box and if necessary additional information 226 Setting LLDP parameters for ports in batch 1 From the navigation tree select Network gt LLDP By default the Port Setup tab is displayed Select one or multiple ports on the port list Click Modify Selected to enter the page for modifying these ports in batch Figure 200 Modifying LLDP settings on ports in batch Global Setup Global Summary Neighbor Summary Interface Name GigabitEthernet1 0 1 GigabitEthernet1 0 2 GigabitEthernet1 0 3 Basic Settings Encapsulation LLDP Operating Mode TxRx TERA ETHII v CDP Operating Mode Disable v LLDP Polling Interval seconds 1 30 LLDP Trapping Disable hd Base TLV Settings Port Description L System Capabilities L System Description System Name T Management Address String v Addtional Settin
119. snooping 2 Click Enable for IGMP snooping 3 Click Apply Figure 229 Enabling IGMP snooping globally Advance IGMP Snooping Enable Disable Apply VLAN Configuration k VLAN ID j Search Advanced Search Uer WYLAN IGMP Drop l General Query Special Query ID Snooping version Unknown auerier ei Source IF Source IP Operation 1 Disabled 2 Disabled Disahled EO 0 0 0 0 0 0 0 0 p 999 Disabled 2 Disabled Disabled 60 0 0 0 0 0 0 0 0 eel Show Entries 256 Contiguring IGMP snooping in a VLAN 1 From the navigation tree select Network gt IGMP snooping 2 Click the icon for the VLAN Figure 230 Configuring IGMP snooping in a VLAN Advanced VLAN Configuration VLAN ID 1 IGMP Snooping Enable Disable Version nD 3 Querier Enable Disable Query Interval Seconds 2 300 Default 60 General Query Source IF IP Address Default 0 0 0 0 Special Query Source IF IP Address Default 0 0 0 0 tems marked with an asterisk are required Apply Cancel 3 Configure the parameters as described in Table 83 4 Click Apply Table 83 Configuration items ltem Description Enable or disable IGMP snooping in the VLAN IGMP snooping You can proceed with the subsequent configurations only if Enable is selected here The default setting is IGMPv2 By configuring an IGMP snooping version you actually configure the versions of IGMP messages that IGMP snooping can process e IGMPv2 sno
120. spanning tree Device A With priority 0 ba Device B With priority 1 Device C With priority 2 183 The configuration BPDU forwarding mechanism of STP The configuration BPDUs of STP are forwarded according to these guidelines e Upon network initiation every device regards itself as the root bridge generates configuration BPDUs with itself as the root and sends the configuration BPDUs at a regular hello interval e Ifthe root port received a configuration BPDU and the received configuration BPDU is superior to the configuration BPDU of the port the device increases the message age carried in the configuration BPDU following a certain rule and it starts a timer to time the configuration BPDU while sending this configuration BPDU through the designated port e Ifthe configuration BPDU received on a designated port has a lower priority than the configuration BPDU of the local port the port immediately sends its own contiguration BPDU in response e fa path becomes faulty the root port on this path no longer receives new configuration BPDUs and the old contiguration BPDUs will be discarded because of timeout The device generates configuration BPDUs with itself as the root and sends the BPDUs and TCN BPDUs This triggers a new spanning tree calculation process to establish a new path to restore the network connectivity However the newly calculated configuration BPDU cannot be propagated throughout the network immedia
121. stack Select Stack from the navigation tree and click the Topology Summary tab to enter the page shown in Figure 27 Figure 27 Topology Summary tab Setup Device Summary Device ID Device Role 1 Slave 0 Master Table 7 Field description Fields Description Member ID of the device in the stack e Value O indicates that the device is the master device of the stack Device ID e A value other than O indicates that the device is a member device and the value is the member ID of the member device in the stack Device Role Role of the device in the stack master or slave Displaying device summary of a stack Select Stack from the navigation tree and click the Device Summary tab to enter the page shown in Figure 28 On this page you can view interfaces on the panel of each stack member by clicking the tab of the corresponding member device Figure 28 Device summary the master device Setup Topology Summary Logging in to a member device trom the master Select Stack from the navigation tree click the Device Summary tab and click the tab of a member device to enter the page shown in Figure 29 Click the Configuring the Device hyperlink you can log in to the Web interface of the member device to manage and maintain the member device directly 42 Figure 29 Device summary a member device Setup Topology Summary Stack contiguration example Network requirements As shown in Figure 30 Switch A Switch B Switch C an
122. starts an aging timer for the port e fa forwarding entry matches the group address and the receiving port is in the forwarding entry for the group the switch restarts the aging timer for the port A switch does not forward an IGMP report through a non router port If the switch forwards a report message through a member port the IGMP report suppression mechanism running on hosts causes all attached hosts that monitor the reported multicast address to suppress their own reports In this case the 254 switch cannot determine whether the reported multicast group still has active members attached to that port Leave message An IGMPv1 host silently leaves a multicast group and the switch is not notified of the leaving However because the host stops sending IGMP reports as soon as it leaves the multicast group the switch removes the port that connects to the host from the forwarding entry for the multicast group when the aging timer for the port expires An IGMPv2 or IGMPv3 host sends an IGMP leave message to the multicast router when it leaves a multicast group When the switch receives an IGMP leave message on a dynamic member port the switch first examines whether a forwarding entry matches the group address in the message and if a match is found whether the forwarding entry for the group contains the dynamic member port e If no forwarding entry matches the group address or if the forwarding entry does not contain the port the
123. status of LLDP Enable Admin status Rx Only Trap flag No Folling interval Os Number of neighbors 0 Number of MED neighbors di Number of CDP neighbors di Number of sent optional TLV 23 Number of received unknown TLV 0 240 LLDP configuration guidelines When you configure LLDP follow these guidelines To make LLDP take effect on a port enable LLDP both globally and on the port To advertise LLDP MED TLVs other than the LLDP MED capabilities TLV include the LLDP MED capabilities TLV To remove the LLDP MED capabilities TLV remove all other LLDP MED TLVs To remove the MAC PHY configuration TLV remove the LLDP MED capabilities set TLV first When the advertising of LLDP MED capabilities TLV and MAC PHY configuration status TLV is disabled if the LLDP MED capabilities set TLV is included the MAC PHY configuration status TLV is included automatically When you contigure LLDP settings for ports in batch if you do not set the TLVs each port uses its own ILV settings 241 Configuring ARP Overview ARP resolves IP addresses into MAC addresses on Ethernet networks ARP message format ARP uses two types of messages ARP request and ARP reply Figure 216 shows the format of the ARP request reply messages Numbers in the figure refer to field lengths Figure 216 ARP message format Hardware address length Protocol address length HardwarelProtocol Sender hardware Sender protocol Target hardware arget pr
124. supported in this release Recommended configuration procedure To contigure basic port security mode Step Remarks Required 1 Configuring global settings for This function enables port security globally and configures intrusion port security protection actions By default port security is disabled globally Required This function configures the basic port security mode maximum secure 2 Configuring basic port security MAC addresses intrusion protection and outbound restriction for a control port By detault port security is disabled on all ports and access to the ports is not restricted Optional Secure MAC addresses never age out or get lost if saved before the device restarts One secure MAC address can be added to only one port in the same VLAN You can bind a MAC address to one port in the same VLAN Secure MAC addresses can be learned by a port in basic port security mode or manually configured in the Web intertace 3 Configuring secure MAC addresses When the maximum number of secure MAC addresses is reached no more can be added The port allows only packets sourced from a secure MAC address to pass through By default no secure MAC addresses are contigured To configure advanced port security mode 423 Step Remarks Required Configuring global settings for This function enables port security globally and configures intrusion port security protection actions By default port se
125. switch directly discards the IGMP leave message e fa forwarding entry matches the group address and the forwarding entry contains the port the switch forwards the leave message to all router ports in the VLAN Because the switch does not know whether any other hosts attached to the port are still listening to that group address the switch does not immediately remove the port from the forwarding entry for that group Instead it restarts the aging timer for the port After receiving the IGMP leave message the IGMP querier resolves the multicast group address in the message and sends an IGMP group specific query to the multicast group through the port that received the leave message After receiving the IGMP group specitic query the switch forwards it through all its router ports in the VLAN and all member ports of the multicast group The switch also performs one of the following actions for the port that received the IGMP leave message e Ifthe port assuming that it is a dynamic member port receives an IGMP report in response to the group specific query before its aging timer expires it means that some host attached to the port is receiving or expecting to receive multicast data for the multicast group The switch restarts the aging timer for the port e Ifthe port receives no IGMP report in response to the group specific query before its aging timer expires it means that no hosts attached to the port are still listening to that group addres
126. system software image at the CL ere EER EER ER ER ER ER ER ER EE ER ER ER ER ER ER ee ees 32 Configuration TEE ee 34 Basic service setup AR EE ARE EE OE EE EE EE 34 Entering the configuration wizard homepage EE RE EE OE EE OE OE EE EE nnv i 34 Configuring system parameters EE TTT 34 Configuring management PERE sees 36 Finishing configuration wizard EE Ee 37 Contiguring ed EE ee 30 VIEW EE ER EE ana E T 39 Configuration TREE OES EO EEOO ESCO Se ere eee reser reeerreeerreeerreerrreerreeer reser recerrreerrretrrreerrreerrreerreeerreeerreesrre 39 Configuring global parameters EET ee AO Configuring stack ports EE TTET A Displaying topology summary OF a SHACK Te A Displaying device summary of a stack eeeeeeeeeeseeeseeeseeeeeesereseeeseesseeseesereseeeseesseeseroseceseeesreseroscesereseeessereseeseeeseesseesereseeeseee 42 Logging in to a member device from the master EER EE EE EE EER EE EER EE EER EE ee EE EER EE ee EER EER ER ee ee ee Re Ee ee ee A Stack configuration example EE EE EE N 43 Configuration guidelines ET E EO RE RE EE T 46 Displaying system and device information EES AE TE We verde N ee AE AA ER O E TEEN ee ve dd ME A7 Displaying system TIER RE ee 47 Displaying basic system PIET ER RT ee eeee estes eseeeeseeneseeseeesceueseeueseeuesceueseeeeseeeeseeeesseuesseuesseueseeuesseeeeeeees A7 Displaying the system resource Slt EG 48 Displaying recent system logs ER EE E ET E EN A8 Setting the refresh period RE RE EE EE EE TT ET 48 Dis
127. the Port Setup tab Select Manual in the Voice VLAN port mode list Select Enable in the Voice VLAN port state list Enter 2 in the VLAN IDs field Select GigabitEthernet 1 0 1 on the chassis front panel Click Apply g mo BP 170 Figure 165 Configuring voice VLAN on GigabitEthernet 1 0 1 Summary Setup OUl Summary OUI Add OUl Remove Voice VLAN port mode Manual Voice VLAN port state Enable Voice VLAN ID Items marked with an asterisk are required Select ports Select All Select None Ports selected for voice VLAN GE1 0 4 Apply Cancel 5 Add OUl addresses to the OUI list a Click the OUI Add tab b Enter OUI address 0011 2200 0000 c Select FFFF FFOO 0000 as the mask d Enter description string test e Click Apply Figure 166 Adding OUI addresses to the OUI list summary Setup Fort Setup OUI Summary OUI Remove Specify an OUl and click Apply to add itto the list There can be 6 entries at most OUI Address 0011 2200 0000 Example 0010 dc28 a4e9 Mask FFFF FF00 0000 Description test tems marked with an asterisk are required Apply Cancel OUI Address Mask Description 0003 6b00 0000 fiff fO0 0000 Cisco phone O0e0 7500 0000 TTOO DODO Polycom phone Verifying the configuration 1 When the preceding configurations are complete the OUI Summary tab is displayed by default as shown in Figure 167 You can view the information about the newly added OUI address 171 Figure
128. the device Description Use ipsetup dhcp to specify VLAN interface 1 to obtain an IPv4 address through DHCP Use ipsetup ip address ip address mask mask length to assign an IPv4 address to VLAN intertace 1 By default the device automatically obtains its IPv4 address through DHCP if fails it uses the assigned IP address If there is no VLAN interface 1 either command creates VLAN interface 1 first and then specifies its IPv4 address Examples Create VLAN interface 1 and specify the interface to obtain an IPv4 address through DHCP lt Sysname gt ipsetup dhcp 25 Create VLAN interface 1 and assign 192 168 1 2 to the interface and specify 192 168 1 1 as the default gateway lt Sysname gt ipsetup ip address 192 168 1 2 24 default gateway 192 168 1 1 ipsetup ipv6 Syntax ipsetup ipv6 auto address jipv address pretix length ipv6 address pretix length default gateway ipv address Parameters auto Enables the stateless address autocontiguration function With this function enabled VLAN intertace 1 can automatically generate a global unicast address and link local address address Enables manual configuration of a global unicast IPv address for VLAN interface 1 ipv address Specifies an IPv6 address pretix length Prefix length in the range of 1 to 128 default gateway ipv address Specifies the IPv6 address of the default gateway With this argument and keyword combination configur
129. the existing Selected ports However the state of link aggregation member ports might change after a reboot Dynamic aggregation mode LACP is enabled on member ports in a dynamic aggregation group In a dynamic aggregation group a Selected port can receive and send LACPDUs An Unselected port can receive and send LACPDUs only when it is up and has the same configurations as the aggregate interface In a dynamic aggregation group the local system the actor negotiates with the remote system the partner to determine the aggregation state of each port in the following steps 1 The systems compare the system IDs A system ID contains the system LACP priority and the system MAC address The lower the LACP priority the smaller the system ID If LACP priority values are the same the two systems compare their system MAC addresses The lower the MAC address the smaller the system ID 2 The system with the smaller system ID chooses the port with the smallest port ID as the reference port A port ID contains a port priority and a port number The port with the lower priority value is chosen If two ports have the same aggregation priority the system compares their port numbers The port with the smaller port number becomes the reference port 3 Ifa port in up state is with the same port attributes and class two configuration as the reference port and the peer port of the port is with the same port attributes and class two configurations
130. the path Ping operation The Web interface does not support IPv ping To perform a ping operation 1 From the navigation tree select Network gt Diagnostic Tools The ping contiguration page appears Figure 294 Ping configuration page Trace Route Destination IP address orhostname a Summar 2 Enter the IP address of the destination device in the Destination IP address or host name field 3 Click Start A View the output in the Summary area 318 Figure 295 Ping operation result Summary FING 192 166 1 16 56 data bytes Reply from 192 168 1 16 bytes 56 Sequence l1 ttl 126 tine 4 ma Reply from 192 168 1 16 bytes 56 Sequence 2 ttl 1265 time 4 ms Reply from 192 166 1 16 bytes 56 Sequence 3 ttl 126 time 3 ma Reply from 192 1668 1 16 bytes 56 Sequence 4 ttl 126 time 3 ms Reply from 192 1668 1 16 bytes 56 Sequence 5 ttl 126 time 3 ma HEHE 192 166 1 16 ping statistics 5 packetis transmitted 5 packet s received 0 005 packet loss round trip bin favg Max 3 3 74 me Traceroute operation The Web interface does not support IPv6 traceroute Betore performing a traceroute operation perform the following tasks e Enable sending of ICMP timeout packets by executing the ip ttl expires enable command on intermediate devices e Enable sending of ICMP destination unreachable packets by executing the ip unreachables enable command on the destination device To perform a traceroute operati
131. them as one The relationship between different VLAN IDs is logical OR ACL IPv4 Define an IPv4 ACLbased rule ACL ACL IPv6 Define an IPv6 ACL based rule Adding a traffic behavior 1 Select QoS gt Behavior from the navigation tree 2 Click the Add tab to enter the page for adding a traffic behavior Figure 465 Adding a traffic behavior Summary Setup Port Setup Remove Add 3 Add a traffic behavior as described in Table 153 A Click Add Table 153 Configuration items ltem Description Behavior name Specify a name for the behavior to be added 480 Configuring traffic mirroring and traffic redirecting tor a trattic behavior 1 Select QoS gt Behavior from the navigation tree 2 Click Port Setup to enter the port setup page for a traffic behavior Figure 466 Port setup page for a traffic behavior Summary Add Setup Remove Please select a behavior Select a behavior E Mirror To Enable Redirect Enable Please selecta port Behavior Detail 3 Configure traffic mirroring and traffic redirecting as described in Table 154 4 Click Apply Table 154 Configuration items liem Description Please select a behavior Select an existing behavior in the list Mirror To Set the action of mirroring traffic to the specified destination port Redirect Set the action of redirecting traffic to the specified destination port Specify the port to be configured as the destination port of traffic mirrori
132. time manually 56 user group 382 VCT 91 VLAN interface 150 Web device configuration management 64 Web device user management 86 Web interface 2 Web service management 314 315 console terminal parameters 21 controlling security 802 1X controlled uncontrolled port 322 cost STP path cost 179 creating ARP static entry 245 DHCP server group 300 Ethernet link aggregation group 208 SNMP view 115 static route IPv4 280 static route IPv6 281 VLAN 139 VLAN interface 150 critical PoE interface power management 498 CST MST region connection 18 D default static route 2 9 designated MST port 187 STP bridge 178 STP port 178 destination NMM port mirroring 79 detecting security ARP detection configuration 250 device basic settings configuration 50 CLI contiguration 20 contiguring MAC authentication global 406 511 contiguring MAC authentication port specitic 408 DHCP overview 292 DHCP relay agent contiguration 303 idle timeout period contiguration 50 LLDP contiguration 217 236 MAC authentication timers 405 NMM local port mirroring configuration 83 NMM local port mirroring group monitor port 84 NMM port mirroring configuration 79 NMM SNMP configuration 111 port management 69 5 security MAC authentication 404 security MAC authentication ACL assignment 411 security MAC authentication configuration 404 406 408 security MAC local authentication co
133. to pass e Deny Drops matched packets Select this box to apply the rule to only non first fragments Non First Fragments Only If you do no select this box the rule applies to all fragments and non fragments Select this box to keep a log of matched packets A log entry contains the ACL rule number operation for the matched packets protocol number source destination address source destination port number and number of matched packets Logging This function is not supported Source IP Address Select the Source IP Address box and enter a source Pv4 address and a source wildcard mask in dotted decimal Source Wildcard mg IP Address Filter Destination IP Address Select the Source IP Address box and enter a source IP address Destnaion Wildcard and a source wildcard mask in dotted decimal notation Select the protocol number If you select 1 ICMP you can configure the ICMP message type Protocol and code If you select 6 TCP or 17 UDP you can configure the TCP or UDP port ICMP Message Specify the ICMP message type and code ICMP Type These items are available only when you select 1 ICMP from the ICMP Type Protocol list If you select Other from the ICMP Message list you need to type ICMP Code values in the ICMP Type and ICMP Code fields Otherwise the two fields will take the default values which cannot be changed 458 ltem Description Select this box to make the rule match packets used for
134. to the current local date configuration and the time setting does not change o Select the year month date and time and then click OK 4 Click Apply on the system time configuration page to save your configuration Contiguring system time by using NTP Select Device gt System Time from the navigation tree 2 Click the Network Time Protocol tab The page for contiguring the system time through NTP appears Figure 47 NTP configuration page System Time Clock status unsynchronized Source Interface HET 1 4294967295 Key String 1 32 Chars Key 2 ID 1 4294967295 Key String 1 32 Chars External Reference Source NTP Server 1 Reference Key ID NTP Server 2 7 Reference Key ID Set System Timezone TimeZone GMT 00 00 Casablanca Monrovia ad Apply 3 Configure the system time as described in Table 11 4 Click Apply 57 Table 11 Configuration items ltem Description Clock status Display the synchronization status of the system clock Source Interface Set the source interface for an NTP message This configuration makes the source IP address in the NTP messages the primary IP address of this interface If the specified source interface is down the source IP address is the primary IP address of the egress interface Q TIP If you do not want the IP address of an interface on the local device to become the destination address of response messages specify the source interface for NTP messag
135. to the same accounting server If you remove the accounting server real time accounting requests and stop accounting requests for the user can no longer be delivered to the server o If you remove an authentication or accounting server in use the communication of the device with the server will soon time out and the device will look for a server in the active state by checking any primary server first and then the secondary servers in the order they are configured o When the primary server and secondary servers are all in the blocked state the device communicates with the primary server If the primary server is available its statues changes to active Otherwise its status remains to be blocked o If one server is in the active state but all the others are in the blocked state the device only tries to communicate with the server in the active state even if the server is unavailable o After receiving an authentication accounting response from a server the device changes the status of the server identitied by the source IP address of the response to active if the current status of the server is blocked Set a proper real time accounting interval based on the number of users Table 117 Recommended real time accounting intervals Number of users Real time accounting interval in minutes 1 to 99 3 100 to 499 6 500 to 999 12 gt 1000 gt 15 379 Configuring users You can configure local users and create groups to m
136. tree 2 Click Show Entries in the basic VLAN configuration page to display information about MLD snooping multicast forwarding entries Figure 252 Displaying MLD snooping multicast forwarding entries Show Entries R VLAN ID Search Advanced Search VLAN ID SOUrCE Group Operation 100 FFIE 101 A 3 Click the icon for the multicast entry FFIE 101 to display detailed information about this entry Figure 253 Displaying detailed information about the entry Advanced Entry Details VLAN ID 100 source Address Group Address FF1E 101 Router Portis GigabitEthemett 0A Member Port s GigabitEthernet1 Di3 Back The output shows that GigabitEthernet 1 0 3 of Switch A is listening to multicast streams destined for IPv multicast group FF1E 101 277 Configuring IPv4 and IPv routing The term router in this chapter refers to both routers and Layer 3 switches Overview A router selects an appropriate route according to the destination address of a received packet and forwards the packet to the next router The last router on the path is responsible for sending the packet to the destination host Routing provides the path information that guides the forwarding of packets Routing table A router selects optimal routes from the routing table and sends them to the forwarding information base FIB table to guide packet forwarding Each router maintains a routing table and a FIB table Routes discovered by
137. v per page page 1 6 record 1 5 Next Last 1 GO Enable Disable Table 6 Configuration items ltem Description Configure a private IP address pool for the stack The master device of a stack must be configured with a private IP address pool to make sure it can automatically allocate an available IP address to a member device l when the device joints the stack Private Net IP Mask IMPORTANT When you configure a private IP address pool for a stack the number of IP addresses in the address pool needs to be equal to or greater than the number of devices to be added to the stack Otherwise some devices might not be able to join the stack automatically for lack of private IP addresses Enable the device to establish a stack After you enable the device to establish a stack the device becomes the master device of the stack and automatically adds the devices connected to its stack ports to Build Stack the stack Q IMPORTANT You can delete a stack only on the master device of the stack The Global Settings area on a member device is grayed out Configuring stack ports Select Stack from the navigation tree to enter the page shown in Figure 26 You can configure stack ports in the Port Settings area e Select the box before a port name and click Enable to configure the port as a stack port e Select the box before a port name and click Disable to configure the port as a non stack port 4 Displaying topology summary of a
138. 0 0 0 GigabitEthernet1 0 12 300 0 0 0 0 0 0 GigabitEthernet1 0 13 300 0 0 0 0 0 0 GigabitEthernet1 0 14 300 0 0 0 0 0 0 GigabitEthernet1 0 15 300 22 145 3334 14900 1 1 28 records 15 v per page page 1 2 record 1 15 First Prey Next Last 1 GO Refresh When the bandwidth utilization is lower than 1 1 is displayed 92 Configuring RMON Overview Remote Network Monitoring RMON is an enhancement to SNMP It enables proactive remote monitoring and management of network devices and subnets An RMON monitor periodically or continuously collects traffic statistics for the network attached to a port on the managed device The managed device can automatically send a notification when a statistic crosses an alarm threshold so the NMS does not need to constantly poll MIB variables and compare the results RMON uses SNMP notifications to notify NMSs of various alarm conditions such as broadcast traffic threshold exceeded In contrast SNMP reports function and interface operating status changes such as link up link down and module failure HP devices provide an embedded RMON agent as the RMON monitor An NMS can perform basic SNMP operations to access the RMON MIB Working mechanism RMON monitors typically take one of the following forms e Dedicated RMON probes NMSS can obtain management information from RMON probes directly and control network resources NMSs can obtain all RAON MIB information by using this method e RMON a
139. 0 0000 Cisco phone O0e0 7500 0000 ff f00 0000 Polycom phone 3 Add an OUI address to the list as described in Table 51 4 Click Apply Table 51 Configuration items ltem Description OUI Address Set the source MAC address of voice traffic Mask Set the mask length of the source MAC address Description Set the description of the OUI address entry 162 Voice VLAN configuration examples Contiguring voice VLAN on a port in automatic voice VLAN assignment mode Network requirements As shown in Figure 153 e Configure VLAN 2 as the voice VLAN allowing only voice traffic to pass through e The IP phone connected to hybrid port GigabitEthernet 1 0 1 sends untagged voice traffic e GigabitfEfhernet 1 0 1 operates in automatic VLAN assignment mode Set the voice VLAN aging timer to 30 minutes e Configure GigabitEthernet 1 0 1 to allow voice packets whose source MAC addresses match the OUI addresses specified by OUI address 0011 2200 0000 and mask ffff f00 0000 The description of the OUI address entry is test Figure 153 Network diagram Switch A Switch B Internet VLAN 2 010 1001 0755 2002 OUI 0011 2200 0000 Mask ffff ff00 0000 Configuring Switch A 1 Create VLAN 2 a Select Network gt VLAN from the navigation tree b Click the Create tab c Enter VLAN ID 2 d Click Create 163 Figure 154 Creating VLAN 2 Select VLAN Port Detail Detail Modify VLAN Modify Port Remove Create Create
140. 0001 AUIS extensions Kalld3 Subject Key Identifier ND IET i Requesting a local certiticate 1 From the navigation tree select Authentication gt Certificate Management 2 Click the Certificate tab 3 Click Request Cert 396 Figure 377 Local certificate reguest page Entity Domain CRL Request Certificate Domain Name Password 1 31 Chars Enable Offline Mode tems marked with an asterisk are required Apply Cancel Contigure the parameters as described in Table 123 Table 123 Configuration items ltem Description Domain Name Select the PKI domain for the certificate Password Enter the password for certificate revocation Enable Offline Mode Select this box to request a certificate in offline mode that is by an out of band means like FTP disk or email Click Apply If you select the online mode the system shows a prompt that the certificate request has been submitted In this case click OK to finish the operation If you select the offline mode the offline certificate request information page appears In this case you must submit the information by an out of band way to the CA to request a local certificate Figure 378 Offline certificate request information page Entity Domain GEL Offline Certificate Request Information MIIEWICBEAIBADALMOSECOTDYOOGERTITDLTIEMMAAGALUEAKMDENFERMIGEMAOGE SAG SIKALOEBADOAAAGMNALCBiOEBdAlICO Vis vol lsryNrtupzEhdllmudEi loeg3 FEEIME wadhd
141. 02 Support and other resources Contacting HP For worldwide technical support information see the HP support website http www hp com support Before contacting HP collect the following information e Product model names and numbers e Technical support registration number if applicable e Product serial numbers e Error messages e Operating system type and revision level e Detailed questions Subscription service HP recommends that you register your product at the Subscriber s Choice for Business website http www hp com go wwalerts After registering you will receive email notitication of product enhancements new driver versions firmware updates and other product resources Related information Documents To find related documents browse to the Manuals page of the HP Business Support Center website http 7 www hp com support manuals e For related documentation navigate to the Networking section and select a networking category e For a complete list of acronyms and their definitions see HP FlexNetwork Technology Acronyms Websites e HP com http www hp com e HP Networking http www hp com go networkin e HP manuals http www hp com support manuals e HP download drivers and software http www hp com support downloads e HP software depot http www software hp com e HP Education http www hp com learn 503 Conventions This section describes the conventions used in this document
142. 03 Bel TEIT ER es ee esses eee esses es eee esas esses es ees esas ees eeeeseseseeseseeeeseseseeseseeeesesees 503 ME NT esse esse esewenesee esse eee eseeeeeeaneeeeeewens 503 GELEE eee ee eteseeeeseeeeeeseseceeeseeeeeeseseeees esse esse esses esses eens eee es esses esas esses es eee es es eee es es eee esas esses es eee eter eeeeseseeeesereeee tes 504 Fats on Eee eee OE N EE erect N rer renter cere E errr ee terre treet te 506 xi Overview The HP 1920 Switch Series can be configured through the command line interface CLI Web interface and SNMP MIB These configuration methods are suitable for different application scenarios e The Web interface supports all 1920 Switch Series configurations e The CLI provides configuration commands to facilitate your operation To perform other configurations not supported by the CLI use the Web interface Configuring the switch in the Web interface Restrictions and guidelines To ensure a successtul login verify that your operating system and Web browser meet the requirements and follow the guidelines in this section Operating system requirements The device supports the following operating systems o Windows XP o Windows 2000 o Windows Server 2003 Enterprise Edition o Windows Server 2003 Standard Edition o Windows Vista o Windows 7 o Linux o MAC OS If you are using a Windows operating system turn off the Windows firewall The Windows firewall limits the number of TCP conn
143. 1 0 12 Disable v Disable GigabitEthernet1 0 13 Disable Disable GigabitEthernet1 0 14 Disable Disable GigabitEthernet1 0 15 Disable v Disable 28 records 15 v per page page 1 2 record 1 15 Next Last 1 GO Apply Enable All Disable All 2 Configure the global loopback detection settings as described in Table 134 and then click Apply Table 134 Configuration items ltem Description Enable loopback detection on the system Sets whether to enable loopback detection globally Loopback Detection Interval Sets the loopback detection interval Contiguring loopback detection on a port 1 From the navigation tree select Security gt Loopback Detection The Port Loopback Detection area appears 2 Configure loopback detection on a port as described on Table 135 and then click Apply Table 135 Configuration items liem Description Loopback Detection Sets whether to enable loopback detection on the target port Sets whether the system disables the target trunk or hybrid port from forwarding Detection Control data packets when the device detects a loop on it This configuration item is available only for a trunk or hybrid port 448 ltem Descri ption Sets whether the system performs loopback detection in all VLANs for the target trunk or hybrid port Detection in VLAN If you select Disable the system performs loopback detection only in the default VLAN of the target trunk or hybrid port This configuration item is av
144. 1 0 9 za gt gt gt gt ARP Packet Validity Check Discard the ARP packet whose sender MAC address is different from the source MAC address in the Ethernet header Discard the ARP packet whose target MAC address is all Os all 1s or inconsistent with the destination MAC address in the Ethernet header Discard the ARP request whose source IP address is all Os all 1s or a multicast address and discard the ARP reply whose source and destination IP addresses are all Os all 1s or multicast addresses Apply 2 Configure ARP detection as described in Table 82 3 Click Apply Table 82 Configuration items ltem Description Select VLANs on which ARP detection is to be enabled To add VLANs to the Enabled VLANs list select one or multiple VLANs from the Disabled VLAN Settings VLANs list and click the lt lt button To remove VLANs from the Enabled VLANs list select one or multiple VLANs from the list and click the gt gt button Select trusted ports and untrusted ports To add ports to the Trusted Ports list select one or multiple ports from the Untrusted Ports list Trusted Ports and click the lt lt button To remove ports from the Trusted Ports list select one or multiple ports from the list and click the gt gt button Select ARP packet validity check modes e Discard the ARP packet whose sender MAC address is different from the source MAC address in the Ethernet header e Discard the ARP pa
145. 1 11 24 1 0 1 12 24 Device A Switch B Configuring the system time 1 Configure the local clock as the reference clock with the stratum of 2 Enable NTP authentication set the key ID to 24 and specify the created authentication key aNiceKey as a trusted key Details not shown 2 On Switch B configure Device A as the NTP server a Select Device gt System Time from the navigation tree b Click the Network Time Protocol tab c Enter 24 in the ID field enter aNiceKey in the Key String field for key 1 enter 1 0 1 11 in the NTP Server 1 field and enter 24 in the Reference Key ID field d Click Apply Figure 49 Configuring Device A as the NTP server of Switch B System Time Clock status unsynchronized Source Interface ID 24 1 4294967295 Key Sting sseseses Key 2 ID 1 4294967295 Key String External Reference Source NTP Severd 10111 Reference KeyID 24 NTP Server Reference Key ID Set System Timezone TimeZone GMT 00 00 Casablanca Monrovia Apply Verifying the configuration 1 32 Chars 1 32 Chars After the configuration verify that Device A and Switch B have the same system time Configuration guidelines When you configure the system time follow these guidelines e A device can act as a server to synchronize the clock of other devices only after its clock has been synchronized If the clock of a server has a stratum level higher than or equal to the level of a client s c
146. 1 Setting the log host Laglist Log Setup Loghost w Pv4 Domain IPv6 Loghost IP Domain 1 255Chars tems marked with an asterisk are required Apply Please select the loghost IP Loghost Pe address Domain IPv6 address Select All Select None Remove Note The maximum number of loghosts that can be configured is 4 3 Configure the log host as described in Table 13 62 A Click Apply Table 13 Configuration items liem Description IPv4 Domain Specify the IPv4 address or domain name Loghost IP Domain of the log host OD IMPORTANT IPv You can specify up to four log hosts Set the IPv address of the log host Pet up 9 Loghost IP Setting buffer capacity and retresh interval Select Device gt Syslog from the navigation tree 2 Click the Log Setup tab The syslog configuration page appears Figure 52 Syslog configuration page Loolist Loghost Buffer Set Buffer Capacity 512 Item s 1 1024 default 512 Refresh set Apply 3 Configure buffer capacity and refresh interval as described in Table 14 4 Click Apply Table 14 Configuration items liem Description Butfer Capacity Set the number of logs that can be stored in the log buffer Set the log refresh interval You can select manual refresh or automatic refresh Retresh Interval e Manual Click Refresh to view the latest log information e Automatic Select to refresh the Web interface every 1 minute 5 minutes or 10
147. 167 Displaying the current OUI list of the device Summary Setup Port Setup DUI Add OUI Remove OUI Address Mask Description 0003 6b500 0000 fiff f00 0000 Cisco phone 0011 2200 0000 T TO0 0000 O0e0 7500 0000 fi f00 0000 Palycom phone 2 Click the Summary tab where you can view the current voice VLAN information Figure 168 Displaying the current voice VLAN information Setup Port Setup DUI Summary OUI Add DUI Remove Voice VLAN security Enabled Voice VLAN aging time 1440 minutes Maximum of voice VLANs 1 Current number of voice VLANs 1 Ports enabled for voice VLAN Port Name Voice VLAN ID Mode GigabitEfnernet1 0 1 2 Manual Contiguration guidelines When you configure the voice VLAN function follow these guidelines e To remove a VLAN functioning as a voice VLAN disable its voice VLAN function first e Only one VLAN is supported and only an existing static VLAN can be configured as the voice VLAN e Do not enable the voice VLAN function on a link aggregation group member port e After you assign a port operating in manual voice VLAN assignment mode to the voice VLAN the voice VLAN takes effect 172 Configuring the MAC address table MAC address configurations related to interfaces apply to Layer 2 Ethernet interfaces and Layer 2 aggregate interfaces only This document covers only the configuration of unicast MAC address entries including static dynamic and blackhole entries Overview To reduce sing
148. 2 GigabitEthernet 1 0 1 of Switch A and GigabitEthernet 1 0 1 of Switch B are router ports A switch records all its local router ports in its router port list Do not confuse the router port in MLD snooping with the routed interface commonly known as the Layer 3 interface The router port in MLD snooping is a Layer 2 interface e Member port Multicast receiverside port As shown in Figure 242 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 of Switch A and GigabitEthernet 1 0 2 of Switch B are member ports A switch records all local member ports in its MLD snooping forwarding table Unless otherwise specitied router ports and member ports in this document include both dynamic and static ports NOTE When MLD snooping is enabled all ports that receive IPv PIM hello messages or MLD general queries with source addresses other than 0 0 are considered dynamic router ports Aging timers for dynamic ports in MLD snooping Timer Description Message received Action after the timer before the timer expires expires When a port receives an MLD general query with the source address other than 0 0 or IPv PIM hello message the switch starts or resets an aging timer When the timer expires the dynamic router port ages out Dynamic router port aging timer MLD general query with the source address other than O O or IPv PIM hello message The switch removes this port from its router port list
149. 20 Network diagram Console cable IP network ae Wire Console port GE1 0 1 PC Switch Gateway TFTP server Configuration procedure 1 Run the TFTP server program on the TFTP server and specify the path of the file to be loaded Omitted 2 Configure the switch Configure the IP address of VLAN interface 1 of the switch as 192 168 1 2 24 and specify the default gateway as 192 168 1 1 lt Switch gt ipsetup ip address 192 168 1 2 24 default gateway 192 168 1 1 Download the software package file Switch1920 bin on the TFTP server to the switch and upgrade the system software image in the package lt Switch gt upgrade 192 168 10 1 Switch1920 bin runtime File will be transferred in binary mode Downloading file from remote TFTP server please wait TETP 10262144 bytes received in 71 second s File downloaded successfully Download the software package file Switch1920 bin on the TFTP server to the switch and upgrade the Boot ROM image lt Switch gt upgrade 192 168 10 1 Switch1920 bin bootrom The file flash Switch1920 bin exists Overwrite it Y N sy Verifying server file 32 Deleting the old file please wait File will be transferred in binary mode Downloading file from remote TFTP server please wait TETP 10262144 bytes received in 61 second s File downloaded successfully BootRom file updating finished Reboot the switch lt Switch gt reboot After getting the new image fi
150. 3 dynamic group configuration 208 dynamic mode 207 group configuration 208 group creation 208 LACP 205 LACP priority 211 LACP enabled port 211 member port state 205 modes 206 operational key 205 port contiguration dlass 206 static group configuration 208 static mode 206 evaluating QoS traffic 473 event NMM RMON event group 94 event eniry configuration 99 extending DHCP IP address lease extension 293 F feature MAC authentication Auth Fail VLAN 405 using 802 1X authentication with other features 329 using MAC authentication with other features 405 FIB IP routing table 278 filtering ACL packet fragments 452 QoS traffic mirroring configuration 481 QoS traffic redirecting configuration 481 finishing configuration wizard 37 flow interval contiguration 92 viewing port traffic statistics 92 format AAA RADIUS packet format 365 ARP message format 242 DHCP message 294 LLDP frame encapsulated in Ethernet Il 217 LLDP frame encapsulated in SNAP format 217 security 802 1X EAP packet format 322 security 802 1X EAPOL packet format 323 security 802 1X packet 322 forwarding ACL configuration 450 ACL configuration advanced 456 463 ACL contiguration basic 455 462 ACL configuration Ethernet frame header 459 ACL configuration IPv4 454 ACL configuration IPv6 461 MST forwarding port state 188 QoS token bucket 473 STP BPDU forwarding 184 STP forward delay timer 184 fragment
151. 388 Figure 368 PKI entity list Domain Certificate CEL Entity Common FODN CountwRegion Organization IF Mame Name Code nit Address entity aaa CN 11110 Bi fj State Locality Organization Operation Add 2 Click Add on the page Figure 369 PKI entity configuration page Domain Certificate CRL Add PKI Entity Entity Name 1 15 Chars Common Name 1 31 Chars IP Address FODN 1 127 Chars Country Region Code m Country Region name symboal two characters compliantto ISO 3166 standard state 1 31 Chars Locality 1 31 Chars Organization 1 31 Chars Organization Unit 1 31 Chars tems marked with an asterisk are required Apply Cancel 3 Configure the parameters as described in Table 120 4 Click Apply Table 120 Configuration items liem Description Entity Name Enter the name for the PKI entity Common Name Enter the common name for the entity IP Address Enter the IP address of the entity Enter the FQDN for the entity An FQDN is a unique identifier of an entity on the network It consists of a host FQDN name and a domain name and can be resolved to an IP address For example www whatever com is an FQDN where www indicates the host name and whatever com the domain name Country Region Code Enter the country or region code for the entity 389 ltem Description State Enter the state or province for the entity Locality Enter the locality for the entity Organization Enter the
152. 6 contiguration 2 configuration wizard 34 contiguring authorized IP 443 444 configuring port link type 140 contiguring PVID for port 141 contiguring VLAN interface 150 creating VLAN 139 creating VLAN interface 150 device basic settings configuration 50 device configuration backup 64 device configuration management 64 device configuration reset 66 device configuration restoration 64 device configuration save 65 device tile displaying 67 device file download 67 device file management 67 device file removing 68 device file upload 68 device idle timeout period configuration 50 device local user adding 86 device main boot file specifying 68 device management 52 device privilege level switching 88 device reboot 53 device software upgrade 52 device stack configuration 39 43 device super password setting 87 device system name configuration 50 device user management 86 displaying interface statistics 132 entering configuration wizard homepage 34 finishing configuration wizard 37 icons on webpage 16 interface 7 intertace HTTP login 6 interface login restrictions 2 interface logout 7 management IP address configuration 36 moditying port 144 moditying VLAN 143 modifying VLAN interface 152 page display functions 16 search function 17 selecting VLAN 142 service management 314 315 sort function 19 system parameters contiguration 34 user level 8 VCT configuration 91 viewing device
153. 7 Retrieving the CRL Entity Domain Certificate Domain Mame Operation torsa Retrieve CELIMIew CRL Verifying the configuration After the configuration select Authentication gt Certificate Management gt Certificate from the navigation tree to view detailed information about the retrieved CA certificate and local certificate or select 402 Authentication Certificate Management CRL from the navigation tree to view detailed information about the retrieved CRL Contiguration guidelines When you contigure PKI follow these guidelines Make sure the clocks of entities and the CA are synchronous Otherwise the validity period of certiticates will be abnormal The Windows 2000 CA server has some restrictions on the data length of a certificate request If the PKI entity identity information in a certiticate request goes beyond a certain limit the server will not respond to the certificate request The SCEP plug in is required when you use the Windows Server as the CA In this case specity RA as the authority for certificate request when you configure the PKI domain The SCEP plug in is not required when you use the RSA Keon software as the CA In this case specify CA as the authority for certificate request when you configure the PKI domain 403 Configuring MAC authentication Overview MAC authentication controls network access by authenticating source MAC addresses on a port It does not require client software
154. 8 Local MAC authentication configuration example TE E E EI ontaIn En 408 ACL assignment configuration example ee Rd Al Configuring port security PE AEAT E eo hi AAE A E EE A E T T A AT E E A E De de A EA 42 Oveni EE EE EE ER RE OE N EE EE EE EE aAA 421 Port security features eeeeeerereereeesereseeeseeeseeserseceseeeseesereseceseeeseeseroseceseeesresereseceseeesesseesereseeeseeosereseeesreseeesereseeeseeseresee 42 Port security EE tere rere t teeter reereeereeer tere rerereer reer rterreerteerreerreerreeereeere 421 Configuration guidelines EE EE EE OE RA OD EE re er ee 423 Recommended configuration procedure AE EE natal 423 Configuring global settings for port security ME EE E EE EE E A E 424 Configuring basic port security TT ee 425 Configuring secure MAC addresses esse EE EE EE EE EE EE EE Oe EER EER Oe EE Ee Ee Re EER Re EE RAAR Ee Re BE EE Oe EE ee EE Ee ee ed AD7 Configuring advanced port security controlssss sesse ees EE EE EE EO GE EERDER SO REGEER ORDE EO Re EE EES Re GEE ROGER Ee Reed 428 Configuring permitted OU 429 Port security configuration examples EE E EEA E AE E E EE A OE EE 430 Basic port security mode configuration example ER EE E EEE 430 Advanced port security mode configuration example a T 433 Configuring port ETE EEEE REESE CTT reer eer reeerreerrcererecrresrrreerrrerreecerecrreerrrecerecereerrreerreerrrecrrreerre AAO Configuring the isolation OrOUD vereer ee ees ee ee EE EE EER RE EE EE EE EE ER ER ER ER EER ER ER ER ER E
155. 8 400 e Data bits 8 e Parity None e Stop bits 1 e Flow control None e Emulation VT100 To set terminal parameters for example on a Windows XP HyperTerminal 1 Select Start gt All Programs gt Accessories gt Communications gt HyperTerminal The Connection Description dialog box appears 2 Enter the name of the new connection in the Name field and click OK Figure 15 Connection description Connection Description KIE ai Hew Connection Enter a name and choose an icon for the connection Name E witcH Ilcon 3 Select the serial port to be used from the Connect using list and click OK 21 Figure 16 Setting the serial port used by the HyperTerminal connection ConnectTo ET 4 Set Bits per second to 38400 Data bits to 8 Parity to None Stop bits to 1 and Flow control to None and click OK Figure 17 Setting the serial port parameters COMI Properties 5 Select File gt Properties in the HyperTerminal window 22 Figure 18 HyperTerminal window Switch HyperTerminal Click the Settings tab set the emulation to VT100 and click OK in the Switch Properties dialog box Figure 19 Setting terminal emulation in Switch Properties dialog box 23 Logging in to the CLI The login process requires a username and password The default username for first time configuration is admin no password is required Usernames and passwords are case sensitive To log in to
156. 9 GigabitEthernet1 0 10 Select All 3 Configure rate limit on a port as described in Table 160 4 Click Apply Table 160 Configuration items ltem Descri ption Please select an interface type Select the types of interfaces to be configured with rate limit 486 ltem Descri ption Rate Limit Enable or disable rate limit on the specified port Select a direction in which the rate limit is to be applied e Inbound Limits the rate of packets received on the specified port Direction e Outbound Limits the rate of packets sent by the specified port e Both Limits the rate of packets received and sent by the specified port CIR Set the committed information rate CIR the average traftic rate Specify the ports to be configured with rate limit Please select port s Click the ports to be configured with rate limit in the port list You can select one or more ports Contiguring priority mapping tables 1 Select QoS gt Priority Mapping from the navigation tree Figure 473 Configuring priority mapping tables Mapping Type CoS to Queue v Input Value Output Value Input Value Output Value Input Value Output Value Input Value Output Value 0 2 v 1 0 v 2 1 3 3 v 4 4 Y 5 5 v 6 6 hd 7 7 v Restore Apply Cancel 2 Configure a priority mapping table as described in Table 161 3 Click Apply Table 161 Configuration items ltem Description Select the priority mapping table to be configured Mappi
157. 97 501 501 PoE interface power management 498 PoE ports 498 port isolation 440 441 port link type 140 port security 421 423 430 port security global 424 port security advanced control 428 port security advanced mode 433 510 port security basic control 425 port security basic mode 430 port security permitted OUls 429 port based VLAN 135 priority mapping table 487 priority trust mode 488 PVID 141 QoS 489 QoS classifier behavior associations 484 QoS policy 466 QoS traffic class 479 QoS traftic mirroring 481 QoS traffic redirecting 481 queue scheduling on port 485 486 RADIUS 363 374 RADIUS common parameter 369 RADIUS scheme 368 secure MAC addresses 427 security 802 1X 321 332 security 802 1X global 332 security 802 1 X port specitic 333 security 802 1X authentication 336 security ARP attack protection 250 security ARP detection 250 security MAC authentication 404 406 408 security MAC authentication ACL assignment 411 security MAC local authentication 408 setting environment 20 SNMP community 117 SNMP group 118 SNMP trap function 121 SNMP user 120 SNMP view 115 SNMPv1 124 SNMPv2c 124 SNMPv3 127 stack 39 43 stack global parameters 40 stack ports 41 static routing IPv4 283 static routing IPv6 287 statistics entry 97 system name 50 system parameters 34 system time 56 system time by using NTP 57 58 system
158. ANs mapped to CIST MST region MSTI A multiple spanning tree region MST region consists of multiple devices in a switched network and the network segments among them All these devices have the following characteristics e A spanning tree protocol enabled e Same region name e Same VLAN to instance mapping configuration e Same MSTP revision level e Physically linked with one another Multiple MST regions can exist in a switched network You can assign multiple devices to the same MST region In Figure 176 the switched network comprises four MST regions MST region AO through MST region DO and all devices in each MST region have the same MST region configuration MSTP can generate multiple independent spanning trees in an MST region and each spanning tree is mapped to a range of VLANs Each spanning tree is referred to as a multiple spanning tree instance MSTI In Figure 176 multiple MSTIs can exist in each MST region each MSTI corresponding to the specified VLANs 186 VLAN to instance mapping table CST IST CIST As an attribute of an MST region the VLAN to instance mapping table describes the mapping relationships between VLANs and MSITIs In Figure 176 the VLAN to instance mapping table of region AO is VLAN 1 is mapped to MSTI 1 VLAN 2 to MSTI 2 and the rest to CIST MSTP achieves load balancing by means of the VLAN fo instance mapping table The common spanning tree CST is a single spanning
159. Access MDI Auto Speed Auto 1000M o Duplex Auto Ful Max MAC Count NoLimit Broadcast Suppression 100 o Multicast Suppression 100 Unicast Suppression 100 Pawer Save Disabled Description GigabitEthernet1 0 3 Interface The table shows the configured values for the selected port while those inside the square brackets are the actual values of the selected port 3 Reselect GigabitEthernet 1 0 3 to refresh its data 30 seconds later Figure 423 shows that the port state is active 432 Figure 423 Displaying port state Summary Setup Select a Port Port State En abled Active E PVID E 1 00 2 Flow Control Disabled Link Type Access MDI Auto Speed Auto 1000M Duplex Auto Full M ax MAC Count Ho Limit Broadcast Suppression 100 Multicast Suppression 100 Unicast Suppression 100 g ooo Power Save Disabled Description GigabitEfhernet1 0 3 Interface The table shows the configured values for the selected port while those inside the square brackets are the actual values ofthe selected port If you remove MAC addresses from the secure MAC address list the port can continue to learn MAC addresses Advanced port security mode contiguration example Network requirements As shown in Figure 424 the switch authenticates the client with a RADIUS server If the authentication succeeds the client is authorized to access the Internet e The RADIUS server at 192 168 1 2 functions as the primary authentication
160. BPDU on a port the device compares the priority of the received configuration BPDU with that of the configuration BPDU generated by the port It takes one of the following actions e If the former priority is lower the device discards the received configuration BPDU and keeps the configuration BPDU the port generated e If the former priority is higher the device replaces the content of the configuration BPDU generated by the port with the content of the received configuration BPDU The device compares the configuration BPDUs of all the ports and chooses the optimum configuration BPDU The following are the principles of contiguration BPDU comparison a The contiguration BPDU with the lowest root bridge ID has the highest priority b If all the configuration BPDUs have the same root bridge ID their root path costs are compared For example the root path cost in a configuration BPDU plus the path cost of a receiving port is S The configuration BPDU with the smallest S value has the highest priority If all configuration BPDUs have the same root bridge ID and S value their designated bridge IDs designated port IDs and the IDs of the receiving ports are compared in sequence The configuration BPDU that contains a smaller designated bridge ID designated port ID or receiving port ID is selected P A tree shape topology forms when the root bridge root ports and designated ports are selected Example of STP calculation Fi
161. C address Type Data LLDPU n bytes Table 70 Fields in a SNAP encapsulated LLDP frame Field Description MAC address to which the LLDP frame is advertised It is fixed to nele ME oa 0x0180 C200 000E a multicast MAC address MAC address of the sending port If the port does not have a MAC n A e address the MAC address of the sending bridge is used A SNAP type for the upper layer protocol It is OxAAAA 0300 0000 88CC for LLDP Data LLDPDU ECS Frame check sequence a 32 bit CRC value used to determine the validity of the received Ethernet frame LLDP uses LLDPDUs to exchange information An LLDPDU comprises multiple TLVs Each TLV carries a type of device information as shown in Figure 197 Figure 197 LLDPDU encapsulation format Chassis ID TLV Port ID TLV Time To Live TLV Optional TLV ae Optional TLV End of LLDPDU TLV An LLDPDU can carry up to 28 types of TLVs Mandatory TLVs include Chassis ID TLV Port ID TLV Time to Live TLV and End of LLDPDU TLV Other TLVs are optional A TLV is an information element that contains the type length and value fields LLDPDU TLVs include the following categories 218 e Basic management TLVs e Organizationally IEEE 802 1 and IEEE 802 3 specific TLVs e LLDP MED media endpoint discovery TLVs Basic management TLVs are essential to device management Organizationally specific TLVs and LLDP MED TLVs are used for improved device management They are de
162. Common Configuration Server Type Extended w Username Format Without domain name FAdvanced Authentication Key esee te Chars Confirm Authentication Key esee tt Chars Accounting Key eseese tt Chars Confirm Accounting Key essee tg Chars Quiet Time htinutesen 258 Default 5 Sever Response Timeout Time 5 kerongstie 0 Default 3 Request Transmission Attempts Bt Default 3 Realtime Accounting Interval 15 Minutesto B0 Default 12 must be a multiple of 3 Realtime Accounting Attempts 1 255 Default 5 Unit for Data Flows Byte Unit far Packets One packet Security Policy Server RADIUS Packet Source IP IPv4 IPv6 it Buffer stop accounting packets Stop Accountind Attempts Co 0 65535 Default 500 Fi Send accounting on packets Attribute J RADIUS Server Configuration Server Type IF Address Operation Primary Authentication Backup Authentication Primary Accounting Backup Accounting Add tems marked with an asteriski are required Apply Cancel Configure the primary authentication server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Select the server type Primary Authentication c Enter the IP address 10 1 1 1 and enter the port number 1812 399 d Click Apply The RADIUS Server Configuration area displays the primary authentication server you have configured 3 Configure the backup authentication server in the RADIUS schem
163. Create tab c Enter for Destination IP Address select O from the Prefix Length list and enter 4 2 for Next Hop d Click Apply 287 Figure 263 Configuring a default route Summary Remove Destination IP Address Prefix Length _ Preference sd 2858 Default 60 Next Hop 7 CJ nterface tems marked with an asteriski are required Apply Configured Static Route Information Prefix Destination IP Address Length Protocol Preference Mext Hop Interface 2 Configure a static route to Switch A and Switch C on Switch B a Select Network gt IPv Routing from the navigation tree of Switch B b Click the Create tab The page for contiguring a static route appears c Enter 1 for Destination IP Address select 64 trom the Prefix Length list and enter 4 1 for Next Hop d Click Apply 288 Figure 264 Configuring a static route Summary Remove Destination IF Address Prefix Length Preference 288 Default B0 J interface tems marked with an asteriski are required Apply Configured Static Route Information Pretix Destination IP Address Length Protocol Preference Fest Hop Interface e Enter 3 for Destination IP Address select 64 trom the Prefix Length list and enter 5 1 for Next Hop f Click Apply Configure a default route to Switch B on Switch C a Select Network gt IPv Routing from the navigation tree of Switch C b Click the Create tab c Enter for Destination IP Address sel
164. DIUS server authenticates the username and password If the authentication succeeds the server returns an Access Accept message containing the user s authorization information If the authentication fails the server returns an Access Reject message 4 The RADIUS client permits or denies the user according to the returned authentication result It it permits the user it sends a startaccounting request Accounting Request to the RADIUS server The RADIUS server returns an acknowledgement Accounting Response and starts accounting 6 The user accesses the network resources 364 The host requests the RADIUS client to tear down the connection and the RADIUS client sends a stop accounting request Accounting Request to the RADIUS server The RADIUS server returns an acknowledgement Accounting Response and stops accounting for RADIUS packet format RADIUS uses UDP to transmit messages To ensure smooth message exchange between the RADIUS server and the client RADIUS uses a timer management mechanism a retransmission mechanism and a backup server mechanism Figure 348 shows the RADIUS packet format Figure 348 RADIUS packet format 15 31 Authenticator Attributes The following describes the fields of a RADIUS packet The Code field 1 byte long indicates the type of the RADIUS packet Table 112 Main values of the Code field Code Packet type Description From the client to the server A packet of this type carri
165. Description InOctets Total octets of all packets received on the intertace InUcastPkts Number of received unicast packets InNUcastPkts Number of received non unicast packets InDiscards Number of valid packets discarded in the inbound direction InErrors Number of received invalid packets InUnknownProtos Number of received unknown protocol packets OutOctets Total octets of all packets sent through the interface OutUcastPkts Number of unicast packets sent through the interface OutNUcastPkts Number of non unicast packets sent through the interface OutDiscards Number of valid packets discarded in the outbound direction OutErrors Number of invalid packets sent through the interface Last statistics clearing time Last time when the statistics were cleared 132 Configuring VLANs Overview Ethernet is a network technology based on the CSMA CD mechanism As the medium is shared collisions and excessive broadcasts are common on an Ethernet To address the issue virtual LAN VLAN was introduced to break a LAN down into separate VLANs VLANs are isolated from each other at Layer 2 AVLAN is a bridging domain and all broadcast traffic is contained within it as shown in Figure 130 Figure 130 A VLAN diagram VLAN 2 Switch B Router VLAN 5 A VLAN is logically divided on an organizational basis rather than on a physical basis For example all workstations and servers used by a particular workgroup can be assigned to th
166. E EE Oe DE EE ee EE Ee ee ge Ee 336 802 1X configuration examples EE EE EE EE eS 336 MAC based 802 1X configuration example EE TE EE N IT 336 802 X with ACL assignment configuration example EE EE adele anai enter 343 Configuring TYE EE EE EG 359 DEd EE EE EE N Todo eniglustasid ered savedeneset 359 AAA application ee ee ee 359 Domain based user management reer ee Reekse ER ER ER EERS GE Re R EER GE GER gee ee ROER GER GeR gek gee ReE GER gek gee eee ee ee ee Roe Reese 353 Configuration ed DBE EE 353 Recommended configuration procedure EE A T T 353 Configuring ASTE ET 354 Configuring authentication methods for the ISP domainesssssssssssssssseessssssessseeessssssnessesessssnnneesseeeesssnnneessees 355 Configuring authorization methods for the ISP domain ees EER RR RR RE EERRRRR Re EER RR RR RR e ee RR RRRR ee 356 Configuring accounting methods for the ISP domain sesse ese ee ee EE EE ee EE EE eed EE ee ee EE ee ee Ee 357 AAA configuration example Po LE IE OO ee ee ee ee 359 Configuring ND EE EE Ee ee 363 OVE AA AE AA EE 363 Client server model tees se seek ee se ER ER ee Ee ER R Ee Ee RE R ee Ee Ee ER ER ee ERK e Ee be ER ER ee Re EER e Ee Ke ERK ee Ee Ee R ee ee ER ee Re ee ER ee Ee Ee Re R ee ee ee 363 Security and authentication MECHANISMS EE EE EE EE EE EE EE ee EE EE ee ER ER Ee ee ER ee Ee ee Ee Ee ee Ee ee ee 364 Basic RADIUS message exchange process vers ssrstsstssisssssessneesneennesssecntecncenseensecnsennceanecascenssenesanenenceese
167. E EE ie 87 Switching to the management Jeyel erererreseeseeseeseeseeseeeseeroseeseeseeseesseseeeeeeseeseesroseoseeseeseeseesresresresrosseesresresrosroseesressesseeseee 88 Contiguring q loopback TE ee 89 Configuration guidelines EE EER E EE OE EE EE EE 89 Configuration procedure ME ER EE DE EE N OE EE OE OR EE EE 89 Contiguring VCT Ee 9 OVE ee ee 9 Testing ER TT REECE SETS EE OOO OOeeOe Sree eee rerr rere reee reer eeereererecererrreerreerreetereerreerreerreerreerrrerr eer reeereerreseree 9 Contiguring the EET EE esau neues 92 Viewing port ET ETE ET ee 92 Configuring ASTE ee 93 6 EE ee 93 Working mechanism EE REESE OOeeO eee r eee tee etter teeter reer err rerr rere reerreere reer reer reerreerreerreeereeeen 93 Me KETEL EE 93 RMON configuration TREE CORES TOES TO eee Teer reer rere re eeereeereeerreeer reer rece tree eerretertetrrreeerreeerresereee 95 Configuring a statistics entry EE E E E 97 Configuring a history entry ME EE EE EE EE EE EE EE EE OE EE EE 98 Configuring an event entry EE RE T T EA E E E 99 Configuring an alarm entry EE E E EE AE OE 100 Displaying ASTE 101 Displaying RMON history sampling TT ER RE ee eeeeeeeeeeeseeesseseeneeeeceeeasseeesseeenseeeeseeeeseeesceuesseeeeseeees 103 Displaying RMON KLEE EE EE EG 104 RMON configuration example ER LE EE OE E S ness sceeaus 105 Contiguring energy saving OE EE N OE AT EE DO OE EE EE EE N Ee NE EI EO OER ee 109 Configuring energy saving on a port E LE EE EA T E aaaa 109 Configuring Ve 11
168. E ee EE ee EE EE EER EER Oe RE EE ee Ee Re RE EER EER ee EE ee EE Ee ee ed 174 Setting the aging time Of MAC address entries sees see sesse Ee ee GE EE Oe EER ee RE EER EE EE Oe EER Re RE ER Re EE EE Re EER ee EE Ee RE Ee ee 175 MAC address table configuration example EE EE 175 Network reguirements eeeereeeeeee ke eeeRR RR eeERRRReEERRRReEERRRRReeERRRRROeERRRRROeeRRRRReERRRRReeERRRRGeERRRRReeERRRRReeRRRRReeRRRRRegeeeRR Roe 175 Creating a static MAC address entry EE EE OE EE EE EE Ee EE Ee EE 176 Contiguring MSTP EE OE EE ER we nih WAS ea EE ER N aa hewn eos EE IE 177 TE EE EE O EN 177 Introduction SASIE ee 177 STP protocol packets EE EA AR AR RE EE EE EE EE N ER 177 Basic concepts in STP reeeeeee sees EERS REEKSE GER GERS GE GER GERS RGeR GER GER GER GER GER gek gek gek gek gek ge ReeR GER GER GeR GER GER GER ee R GER eek gek ee ee eene 178 Calculation process of the STP algorithm aia aro tend sre aan mw ied OO EEEE EEEE 179 Introduction to NE esse nese esse seue neue nessa eeueeeee nese nese eeeeeeeweeeeeseeeeeee ees 184 Introduction to MS TP ree ee EE EE EE EE EER EE EE EE EE EE EE EER EE EE EE EE EE EE ER RR EER EER EER EE EER EE ER Ee ee EE EE EER nese nese ER ee Ee ee esse ee EE ee ees 185 N SE ER EA EL Ce ee 185 MSTP basic Concepts treer ee EER eE GER GERS Ge GER GERS R GER GER GER GER GER GER ee R ee Ree GER GER Ge GER GeR ee R GER GER Ge RR Ge gee ee ee ee ee ee ee Reese 185 ART SEE EE OE RE EE rr rr re err 189 MSTP implementation EET EE
169. ED ARP Add modify and remove ARP entries Configure Manageme Display the configuration information about nt tous ARP Monitor Gratuitous ARP 9rotuitous ARF Configure gratuitous ARP Configure ARP Display ARP detection configuration information Monitor Aan Aiae ARP Detection nti Attac Configure ARP detection Configure Display global IGMP snooping configuration information or the IGMP snooping configuration Menier Bade information in a VLAN and the IGMP snooping multicast entry information IGMP Snooping Configure IGMP snooping globally or ina VLAN Configure Display the IGMP snooping configuration EDS Advanced information on a port Configure IGMP snooping on a port Configure Display global MLD snooping configuration information or the MLD snooping configuration anita Bake information in a VLAN and the MLD snooping Rea multicast entry information MLD Snooping Configure MLD snooping globally or ina VLAN Configure Display the MLD snooping configuration rd Mavaneea information on a port Configure MLD snooping on a port Contigure Summary Display the IPv4 active route table Monitor IPv4 Routing Create Create an IPv4 static route Configure Remove Delete the selected IPv4 static routes Configure Function menu Description User level Auth entic ation IPv Routing DHCP Service Diagnostic Tools MAC Authenticati on 802 1X Port Security Summary Create Remove DHCP Relay DHCP Snooping Se
170. EO EE EES 59 Configuration guidelines RE EE EE EE EE 59 Configuring syslog ER EE E EE OE T A ER EE E EE RE 61 Displaying syslogs ER EE cia a Ww OE EE nnd EE N EE 6 Setting the log ee 62 Setting buffer capacity and refresh interval ee EE EE EE EER EER EER EER EER ERA ERA EE ee ERA ERA ERA ERA Ee ee 63 Managing the configuration EE EE N EE EI EE EE N EN AE OE E 64 Backing Up the configuration EA OE OE EE EE N EE EE aden anemone arenes 64 Restoring the configuration AA EE EE OE EE AI E EE 64 Saving the configuration EE ER OE OE OE EE OE EE EE ES 65 Resetting the configuration EE EE aes EE EE cee E ER EE 66 Managing AE Ee 67 Displaying files eeeeeeeseeseereeeseeeseeeseesseeseceseeeseeneseesereseceseeeseeseesereseceseeeseesereseresecesreserosereseeeserosereseeesresseesereseeeseeesresereseeeseeeseese 67 Downloading TE IE ee 67 Uploading a file seeeeeseeeeeeseeeseeeseeeseeseeeseeeseeeseeseeeseeseceseenseeseresereseeeseeserosereseeesreseeesereseeeseesereeseceseeseesseesereseeeseeeseesereseeeseeeseese 68 Removing TE Ee 68 Specifying the main boot file eeeeeeeeeseerseeeeeesereseeeseeseeseeeseeeseenseesseeseeeseeeseesseeseesereseeeseessreserosecesesesseeseresreeseesseesereseeeseesseese 68 Managing ports EE EE REE Te OTT Lee EET ES LETTS Te NT OE TEE TTT TET Tee LEC TET OR OT ETT Tee CTT OE Cer CTT TT ree ere 69 Setting operation parameters fora port AE ecu EE EE EE EE EE EE EE 69 Displaying port operation parameters AE EE Ridin owe Adi awd SRS A
171. ET 73 Displaying d specified operation parameter for all ports EE EE EE 73 Displaying all the operation parameters fora port EE OE EE EE EE EE 74 Port management configuration example RE OR RE EN EE OE ER 75 Network requirements EE ER EE EE dba isis cro E EE 75 Configuring thee SWIICh EE esse esses esse esse esse eeew esse seeeeeee ness 75 Configuring port mirroring ER EE RA E EE ER EE E EE T S E OD 79 Terminology EE EE EE EE EE EO EE EE EE ER 79 MEE MEE EG 70 Mirroring REST RE eee eeeeeeeeeeeeeceseeseessenseueseunseueseeeseeeseeeeeeeeee esse eeeeneeueseueseeeeeeeseee nese esau nese eeeueeeeeeeees 79 Mirroring direction eeeeeeeeeeeeeeeeereereereereeeereeereeeeseesreseoseoseeseeseeseesseeseoseesrosresesreseeseeeseesresresrosreesresresresresreseeseeseesreeseeseee 79 Mirroring Qroup EE EG 79 Local port mirroring EE EE N EE OE EE 79 Configuration restrictions and guidelines E E EE 80 Recommended configuration procedures EE EE EE RE EE EE OE EE 80 Contiguring a mirroring Tee EE EE EE 80 Configuring ports for the mirroring OUP EE EE EE EE 8 Local port mirroring configuration example EE EE HE nena EE EO RE EE iaasE 83 Network requirements EE OE RE OO EE EE EE ER EE OE ENEP EVENES SPESSE USSE EE E rE rsss sss isss 83 Configuration procedure ER ER EE OE OR EA EE EE RO EE 83 MEERENSEE EE EE EG 96 Adding a local User ss Ee EE EE EES GE EE SA Re EE A EE RA GER EE EE DO Pe EE EE SA Re EE EE DA ee 86 Setting the super password EE EE OE EE EE EE EE EE EE E
172. F GigabitEthernet1 0 5 Enabled TxRx A F GigabitEthernet1 0 7 Disabled TxRx A E GigabitEthernet1 0 8 Disabled TxRx ES GigabitEthernet1 0 9 Disabled TxRx A F GigabitEthernet1 0 11 Enabled TxRx A F GigabitEthernet1 0 12 Enabled TxRx A F GigabitEthernet1 0 15 Disabled TXRX A 28 records 15 v per page page 1 2 record 1 15 Firsi Next Last 1 GO 19 Configuring the switch at the CLI The HP 1920 Switch Series can be contigured through the CLI Web interface and SNMP MIB among which the Web interface supports all 1920 Switch Series contigurations These configuration methods are suitable for ditferent application scenarios As a supplementary to the Web interface the CLI provides some configuration commands to facilitate your operation which are described in this chapter To perform other configurations not supported by the CLI use the Web interface You will enter user view directly after you log in to the device Commands in the document are all performed in user view Getting started with the CLI As a supplementary to the Web interface the CLI provides some configuration commands to facilitate your operation For example if you forget the IP address of VLAN interface 1 and cannot log in to the device through the Web interface you can connect the console port of the device to a PC and recontigure the IP address of VLAN interface 1 at the CLI This section describes using the CLI to manage the device Setting up the co
173. Fail VLAN You can contigure an Auth Fail VLAN on a port to accommodate MAC authentication users that have failed MAC authentication on the port Users in the Auth Fail VLAN can access a limited set of network resources such as a software server to download anti virus software and system patches If no MAC Auth Fail VLAN is configured the user that fails MAC authentication cannot access any network resources 405 If a user in the Auth Fail VLAN passes MAC authentication it is removed from the Auth Fail VLAN and can access all authorized network resources If not the user is still in the Auth Fail VLAN A hybrid port is always assigned to an Auth Fail VLAN as an untagged member After the assignment do not re configure the port as a tagged member in the VLAN Contiguration prerequisites Before you contigure MAC authentication complete the following tasks 1 Configure an ISP domain and specify an AAA method For more information see Configuring AAA o For local authentication you must also create local user accounts including usernames and passwords and specify the lan access service for local users o For RADIUS authentication make sure the device and the RADIUS server can reach each other and create user accounts on the RADIUS server If you are using MAC based accounts make sure the username and password for each account are the same as the MAC address of each MAC authentication user 2 Make sure the port security
174. Global Setup Global Summary Neighbor Summary Interface Name GigabitEthernet1 0 1 GigabitEthernet1 0 2 Basic Settings s Encapsulation LLDP Operating Mode Rx v TEA ETHII v CDP Operating Mode Disable v LLDP Polling Interval seconds 1 30 LLDP Trapping Disable v Base TLV Settings Port Description System Capabilities System Description System Name Management Address String v Addtional Settings Apply Cancel Enable global LLDP a Click the Global Setup tab as shown in Figure 211 b Select Enable from the LLDP Enable list Click Apply A progress dialog box appears Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds Figure 211 The global setup tab Fort Setup Global Summary Neighbor Summary Global Setup LLDP Enable CDF Compatibility Fast LLDPDU Count 1 10 Default 3 TTL Multiplier 4 2 10 Default 4 Trap Interval 6 Second5 3600 Default 5 Reinit Delay 2 Second 0 Default 2 Tx Delay 2 Seeanatt 8192 Default 2 Tx Interval 30 Serond f 327E8 Default 30 238 Contiguring Switch B 1 Optional Enable LLDP on port GigabitEthernet 1 0 1 By default LLDP is enabled on Ethernet ports Set the LLDP operating mode to Tx on GigabitEthernet 1 0 1 a From the navigation tree select Network gt LLDP By default the Port Setup tab is displayed b Click the flicon for port GigabitEthernet 1 0 1 c Select Tx from the LLDP O
175. HAP t F Advanced Apply Ports With 602 74 Enabled Ziu Max rt Re Guest Auth Fail Port O Port Control Handshake authentication ae VLAN VLAN Authorization PEratlon Add Del Selected 2 Configure 802 1X for GigabitEthernet 1 0 1 a In the Ports With 802 1X Enabled area click Add b Select GigabitEthernet1 0 1 from the Port list c Click Apply Figure 332 Configuring 802 1X for GigabitEthernet 1 0 1 Apply 802 1X Port Configuration Port GigabitEthernet1 0 1 X Port Control MAC Based v Port Authorization Auto T Max Number of Users 256 1 256 Default 256 Fj Enable Handshake Enable Re Authentication Guest VLAN 1 4094 E Enable MAC VLAN Only hybrid ports support this configration Auth Fail VLAN 1 4094 Items marked with an asterisk are required Apply Cancel Verifying the configuration After the user passes authentication and gets online use the ping command to test whether ACL 3000 takes eftect 1 From the navigation tree select Network gt Diagnostic Tools The ping page appears 2 Enter the destination IP address 10 0 0 1 Click Start 350 Figure 333 shows the ping operation summary Figure 333 Ping operation summary Summary FING 10 0 0 1 Request tine Request tine Request time Request time Request time Af out out out out out data bytes 1O O O 1 ping statistics 5 packet 3 transmitted DO packets received 100 00 packet loss 351
176. HP 1920 Gigabit Ethernet Switch Series User Guide Part number 5998 5627 Software version Release 1102 Document version 5W 100 20140620 Legal and notice information Copyright 2014 Hewlett Packard Development Company L P No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett Packard Development Company L P The information contained herein is subject to change without notice HEWLETT PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE Hewlett Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing performance or use of this material The only warranties tor HP products and services are set forth in the express warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein Contents Cen EE sre ences rarer EE NG enka Configuring the switch in the Web interface Ee EE EE AE EE EE EE EE EE OE EO EER ER AE ER AE Ee RE Ee EER EER EE Re ERA EE ee ee ee ee 2 Restrictions and guidelines TREE ER EE EE een 2 Operating system requirements EA ER EE EE EE EE N OR EE EE 2 Web browser req
177. I Figure 182 The port summary tab Region Global Select a port Fort Setup T par Instance 0 Bort1 GigabitEthernet1 oO 1 DOWN Port Protocol Port Bole Port Priority Port Cost Legacy Daag Bridge Port Port Edged Point to point Instance renabled CIST Disabled Bort 2128 rContig aute Active 200000 rBZ768 00e0 rfco0 3620 128 1 Config enabled Active enebled Conftig auto Active false T Friority 197 Table 62 Field description Field Description FORWARDING The port is in forwarding state so the port learns MAC addresses and forwards user traffic LEARNING The port is in learning state so the port learns MAC addresses but does not forward user traffic DISCARDING The port is in discarding state so the port does not learn MAC addresses or forward user traffic DOWN The port is down Port Protocol Whether STP is enabled on the port Role of the port which can be Alternate Backup Root Designated Master Port Role or Disabled Port Priority Priority of the port Path cost of the port The field in the bracket indicates the standard used for Port Cost Legacy port path cost calculation which can be legacy dot1d 1998 or dott Config indicates the configured value and Active indicates the actual value Designated bridge ID and port ID of the port Desg Bridge Port The port ID displayed is insignificant for a port that does not support port priority
178. IGMP snooping concepts This section lists the basic IGMP snooping concepts IGMP snooping related ports As shown in Figure 228 IGMP snooping runs on Switch A and Switch B Host A and Host C are receivers in a multicast group 252 Figure 228 IGMP snooping related ports Router A Switch A eek A GE1 0 1 SE OE oh ROUTER GE1 0 3 GE1 0 1 6 GE1 0 2 S V GE1 0 2 amp amp gt g Wr Host B Receiver Source Switch B O Router port O Member port gt Multicast packets Host D The following describes the ports involved in IGMP snooping e Router port Layer 3 multicast device side port Layer 3 multicast devices include designated routers and IGMP queriers In Figure 228 GigabitEthernet 1 0 1 of Switch A and GigabitEthernet 1 0 1 of Switch B are router ports A switch records all its local router ports in its router port list Do not contuse the router port in IGMP snooping with the routed interface commonly known as the Layer 3 interface The router port in IGMP snooping is the Layer 2 interface e Member port Multicast receiverside port In Figure 228 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 of Switch A and GigabitEthernet 1 0 2 of Switch B are member ports A switch records all its member ports in the IGMP snooping forwarding table Unless otherwise specitied router ports and member ports in this document include both dynamic and
179. IP to MAC binding as described in Table 97 5 Click Apply Table 97 Configuration items lem Description IP Address Enter the IP address of a DHCP client MAC Address Enter the MAC address of the DHCP client Select the Layer 3 interface connected with the DHCP client IMPORTANT The interface of a static binding entry must be configured as a DHCP relay agent Otherwise address entry conflicts might occur Interface Name 302 DHCP relay agent configuration example Network requirements As shown in Figure 279 VLAN interface 1 on the DHCP relay agent Switch A connects to the network where DHCP clients reside The IP address of VLAN interface 1 is 10 10 1 1 24 and the IP address of VLAN interface 2 is 10 1 1 1 24 VLAN interface 2 is connected to the DHCP server whose IP address is 10 1 1 1 24 The switch forwards DHCP messages between DHCP clients and the DHCP server Figure 279 Network diagram DHCP client DHCP client Vlan int2 10 1 1 2 24 Vlan int1 10 10 1 1 24 Switch A DHCP relay agent DHCP server DHCP client DHCP client Configuring Switch A 1 Enable DHCP a From the navigation tree select Network gt DHCP to enter the default DHCP Relay page b Select the Enable option next to DHCP Service as shown in Figure 280 c Click Apply 303 Figure 280 Enabling DHCP DHCP Snooping DHCP Service Enable Disable Display Advanced Configuration Apply Cancel Sener Group
180. ISP domain On the NAS each user belongs to an ISP domain If a user provides no ISP domain name at login the NAS considers the user belongs to the default ISP domain AAA allows you to manage users based on their access types e LAN users Users on a LAN who must pass 802 1X or MAC address authentication to access the network e Login users Users who want to log in to the device including SSH users Telnet users Web users FTP users and terminal users In addition AAA provides command authorization for login users to improve device security Command authentication enables the NAS to defer to the authorization server to determine whether a command entered by a login user is permitted for the user and allows login users to execute only authorized commands Contiguration prerequisites To deploy local authentication configure local users on the access device See Configuring users To deploy remote authentication authorization or accounting configure the RADIUS schemes to be referenced See Configuring RADIUS Recommended configuration procedure Step Remarks Optional Create ISP domains and specify one of them as the default ISP 1 Configuring an ISP domain domain By detault there is an ISP domain named system which is the default ISP domain Optional 2 Configuring authentication Fel ee i AR Configure authentication methods for various types of users By default all types of users use local authen
181. IUS server EAP packets over LAN EAP packets over RADIUS e E authentication gt In EAP relay mode the client must use the same authentication method as the RADIUS server On the network access device you only need to enable EAP relay Some network access devices provide the EAP server function so you can use EAP relay even if the RADIUS server does not support any EAP authentication method or no RADIUS server is available EAP termination mode In EAP termination mode the network access device terminates the EAP packets received from the client encapsulates the client authentication information in standard RADIUS packets and uses PAP or CHAP to authenticate to the RADIUS server as shown in Figure 305 Figure 305 EAP termination Client Deuce RADIUS server EAP packets over LAN RADIUS EAP authentication gt PAP CHAP authentication gt Comparing EAP relay and EAP termination Packet exchange method Benefits Limitations e Supports various EAP auihanicaionamehods The RADIUS server must support the EAP Message and Message Authenticator attributes and the EAP authentication method used by the client EAP relay e The configuration and processing is simple on the network access device 325 Packet exchange method Benefits Limitations e Supports only MD5 Challenge EAP authentication and the username Works with any RADIUS password EAP authentication in
182. If the check fails a dialog box appears telling you that the current configuration and the saved configuration are inconsistent and the device is not rebooted In this case save the current configuration manually before you can reboot the device o If you do not select the box the system reboots the device directly 53 Electronic label Electronic label allows you to view information about the device electronic label which is also known as the permanent configuration data or archive information The information is written into the storage medium of a device or a card during the debugging and testing processes and includes card name product bar code MAC address debugging and testing dates and manufacture name 1 Select Device gt Device Maintenance from the navigation tree 2 Click the Electronic Label tab to view the electronic label information Figure 42 Electronic label Softaars Upgrade Metso Diagnostic Information I Darcie T earch Advanced Search Li i i diy pil ya Device SoD SubSIMID Name Serial Number MA MES i 1 1 i HP 182N 2A4G Swit Bos PTSD AAA t7 p020 1824 013 84 HP Diagnostic information Each functional module has its own running information Generally you view the output for each module one by one To receive as much information as possible in one operation during daily maintenance or when system failure occurs the diagnostic information module allows you to save the running statistics of multiple fun
183. In EAP termination mode the network access device rather than the authentication server generates an MD5 challenge for password encryption see Step 4 The network access device then sends the MD5 challenge together with the username and encrypted password in a standard RADIUS packet to the RADIUS server 802 1X timers This section describes the timers used on an 802 1X device to guarantee that the client the device and the RADIUS server can interact with each other correctly e Username request timeout timer Starts when the device sends an EAP Request Identity packet to a client in response to an authentication request If the device receives no response before this timer expires it retransmits the request The timer also sets the interval at which the network device sends multicast EAP Request Identity packets to detect clients that cannot actively request authentication e Client timeout timer Starts when the access device sends an EAP Request MD5 Challenge packet to a client If no response is received when this timer expires the access device retransmits the request to the client e Server timeout timer Starts when the access device sends a RADIUS Access Request packet to the authentication server If no response is received when this timer expires the access device retransmits the request to the server 328 e Handshake timer Sets the interval at which the access device sends client handshake requests to check the
184. LAN ModifyPort Remove WYLAN range display select an option to view all available VLANs or a subset of configured VLANs Display all VLANs Mote This option may reduce browser response time 1 100 Display a subset of all configured VLANS example 3 5 10 EE WYLAN Summary ID Description Untagged Memhership Tagged Membership d Click Modify VLAN to enter the page for modifying the ports in a VLAN e Select 100 VLAN 0100 in the Please select a VLAN to modify list select the Untagged option and select GigabitEthernet 1 0 1 on the chassis front device panel f Click Apply 147 A configuration progress dialog box appears g After the contiguration process is complete click Close Figure 144 Assigning GigabitEthernet 1 0 1 to VLAN 100 as an untagged member Select VLAN Create Port Detail Detail Modify Port Remove Please select a VLAN to modify Modify Description optional 100 VLAN 0100 X VLAN 0100 1 32 Chars Apply Select membership type LJ Not avaliable for selection L Untagged i E Tagged E Not A Member Select ports to be modified and assigned to this VLAN ET 00CC CCAA EEHEEHE NOLE Select All Select None Note You can assign multiple ports in different membership types to this VLAN Summary Untagged Membership Tagged Membership GE1 0 4 Apply Cancel Assign GigabitEthernet 1 0 1 to VLAN 2 and VLAN 6 through VLAN 50 as a tagged member b Click Modify Port to enter the
185. LAN the link type of the port is automatically changed into hybrid Modifying ports 1 2 From the navigation tree select Network gt VLAN Click Modify Port to enter the page for modifying ports Figure 139 Modifying ports Select VLAN Create Port Detail Detail Modify VLAN Remove Sel ect Ports Select All Select None Not avaliable for selection Select membership type Untagged Tagged Not A Member Link Type PVD Enter VLAN IDs to which the port is to be assigned VLAN IDs Example 1 3 5 10 Selected ports Untagged Membership Apply Cancel Modify the VLANs of a port as described in Table 42 Click Apply A progress dialog box appears Click Close on the progress dialog box when the dialog box prompts that the configuration succeeds Table 42 Configuration items ltem Description Select Ports Select the ports to be moditied 144 ltem Description Set the member types of the selected ports to be modified in the specitied VLANs e Untagged Contigures the ports to send the traffic of the VLANs after removing the VLAN Select ige Tagged Configures the ports to send the traffic of the VLANs without removing the VLAN tags e Nota Member Removes the ports from the VLANs Set the IDs of the VLANs to or from which the selected ports are to be assigned or removed When you set the VLAN IDs follow these guidelines e You cannot configure an access port as an untagged member
186. LAN IDs for the voice VLAN the PVID of the access port and the 802 1X guest VLAN for the functions to operate normally e f an IP phone sends untagged voice traffic to deliver the voice VLAN function you must configure the PVID of the access port as the voice VLAN As a result 802 1X authentication does not take effect Security mode and normal mode of voice VLANs Depending on their inbound packet filtering mechanisms voice VLAN enabled ports operate in one of the following modes e Normal mode In this mode both voice packets and non voice packets are allowed to pass through a voice VLAN enabled inbound port When receiving a voice packet the port forwards it without checking its source MAC address against the OUI addresses configured for the device If 158 the PVID of the port is the voice VLAN and the port operates in manual VLAN assignment mode the port forwards all received untagged packets in the voice VLAN In normal mode the voice VLANs are vulnerable to traffic attacks Vicious users can forge a large amount of untagged packets and send them to voice VLAN enabled ports to consume the voice VLAN bandwidth affecting normal voice communication e Security mode In this mode only voice packets whose source MAC addresses comply with the recognizable OUI addresses can pass through the voice VLAN enabled inbound port but all other packets are dropped In a sate network you can contigure the voice VLANs to operate in norma
187. LD snooping globally a Select Network gt MLD snooping from the navigation tree b Select Enable c Click Apply Figure 250 Enabling MLD snooping globally Advanced MLD Snooping Enable Disable Apply VLAN Configuration R VLAN ID Search Advanced Search VLAN ID Es Version Querier EED EE General Query Source Address Special Query Source Address Operation eee EE NN N Mad BE 1 Disabled 1 Disabled 125 FEBOC2FFFFEFFFEOI FESOC2FFFFEFFFEOO 1 Ee 100 Disabled 1 Disabled 125 FE amp O 2FF FFFF FEOO 1 FESOC2FF FFFFFEOO 1 E 200 Disabled 1 Disabled 125 FESOC2FF FFFF FEDO1 FESOC2FF FFFF FEOO1 E 300 Disabled 1 Disabled 125 FESO 2FF FFFF FEOO 1 FESO 2FF FFFF FEOX1 ER Show Entries Refresh Enable MLD snooping a Click the icon for VLAN 100 b Select Enable for MLD snooping c Select 1 for Version 276 d Click Apply Figure 251 Enabling MLD snooping in VLAN 100 Advanced VLAN Configuration VLAN ID 100 MLD Snooping Enable Disable Version 4 2 Querier Ei Enable Disable Query Interval 125 Seconds 2 300 Default 125 General Query Source Address FESO 2FF FFFF FE00 1 Pv6 linklocal address Default FE80 2FF FFFF FEQ0 1 Special Query Source Address 9 FESOU2FF FFFF FEOO 1 Pv6 linklocal address Default FE80 2FF FFFF FEQ0 1 Items marked with an asterisk are required Apply Cancel Veritying the contiguration Select Network gt MLD snooping from the navigation
188. LDP operating mode on the port or ports you are contiguring Base ran aver e TxRx Sends and receives LLDP frames Settings me Tx Sends but does not receive LLDP frames e Rx Receives but not does not send LLDP frames e Disable Neither sends nor receives LLDP frames 224 ltem Descri ption Base TLV Settings Encapsulation Format CDP Operating Mode LLDP Polling Interval LLDP Trapping Port Description System Capabilities System Description System Name Management Address Set the encapsulation for LLDP frames e ETHII Encapsulates outgoing LLDP frames in Ethernet Il frames and processes an incoming LLDP frame only if its encapsulation is Ethernet Il e SNAP Encapsulates outgoing LLDP frames in Ethernet Il frames and processes an incoming LLDP frame only if its encapsulation is Ethernet Il LLDP CDP PDUs use only SNAP encapsulation Set the CDP compatibility of LLDP e Disable Neither sends nor receives CDP frames e TxRx Sends and receives CDP frames To enable LLDP to be compatible with CDP on the port you must enable CDP compatibility on the Global Setup tab and set the CDP operating mode on the port to TxRx Enable LLDP polling and set the polling interval If no polling interval is set LLDP polling is disabled With the polling mechanism LLDP periodically detects local configuration changes If a configuration change is detected an LLDP frame is sent to inform the LLDP neigh
189. MS access right e Read only The NMS can perform read only operations to the MIB objects Access Right when it uses this community name to access the agent e Read and write The NMS can perform both read and write operations to the MIB objects when it uses this community name to access the agent Specity the view associated with the community to limit the MIB objects that can be accessed by the NMS View Associate the community with a basic ACL to allow or prohibit the access to ACL the agent from the NMS with the specified source IP address Contiguring an SNMP group Select Device gt SNMP from the navigation tree 2 Click the Group tab The Group tab appears Figure 108 SNMP group Setup Community ser Trap WE search Advanced Search C Group Name Security Level Read view Write View Notify view ACL Operation draup1 MoAUTh OP rivy View Default ViewDefault View Default 2001 ES i Add Delete Selected 118 3 Click Add The Add SNMP Group page appears Figure 109 Creating an SNMP group Setup Community ser Trap WIE Add SHMP Group Group Name tt 20hars 3 Security Level Read View Write View Notify View ACL zn0 2999 tems marked with an asteriski are required Apply Cancel Contigure SNMP group as described in Table 36 5 Click Apply Table 36 Configuration items ltem Description Group Name Set the SNMP group name Select the security level for the SNMP group e NoAuth NoPriv N
190. N and select RADIUS as the authentication mode c Select system from the Name list to use it as the authentication scheme d Click Apply A configuration progress dialog box appears e After the contiguration process is complete click Close Figure 359 Configuring the AAA authentication method for the ISP domain Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain test Default Auth RADIUS Name system Secondary Method I LAN access AuthN Name Secondary Method E Login Authn Name Secondary Method PPP AuthN Name Secondary Method Portal Auth Name Secondary Method Figure 360 Configuration progress dialog box Current Configuration Setting Default Auth OK Select the Authorization tab to configure the authorization scheme a Select the domain name test b Select Default AuthZ and select RADIUS as the authorization mode c Select system from the Name list to use it as the authorization scheme d Click Apply A contiguration progress dialog box appears e After the contiguration process is complete click Close 377 Figure 361 Configuring the AAA authorization method for the ISP domain Domain Setup Authentication Accounting Authorization Configuration of AAA Select an ISP domain test Default Autnz RADIUS system Secondary Method El LAN access Auth Name Secondary Method El Login AuthZ Name Secondary Method PPP AuthZ Name Secondary Method
191. No authentication This method trusts all users and is not for general use RADIUS RADIUS authentication You must specify the RADIUS scheme to be used Not Set The device uses the settings in the Default AuthN area for LAN access users Configure the authentication method and secondary authentication method for login users Options include Name Secondary Method Login AuthN e Name Secondary Method HWTACACS HWTACACS authentication You must specify the HWTACACS scheme to be used Local Local authentication None No authentication This method trusts all users and is not for general use RADIUS RADIUS authentication You must specify the RADIUS scheme to be used Not Set The device uses the settings in the Default AuthN area for login users Contiguring authorization methods tor the ISP domain 1 Select Authentication gt AAA from the navigation tree 2 Click the Authorization tab Figure 337 Authorization method configuration page Domain Setup Authentication Accounting Authorization Configuration of AAA select an ISP domain system Default Auth Local Name Secondary Method LAN access Authz Name Secondary Method Login Authz Name Secondary Method PPP Auth Name Secondary Method Portal Authz Name Secondary Method Command Authz Name 3 Select the ISP domain and specify authorization methods for the ISP domain as described in Table 110 4 Click Apply 356 Table 110 Configura
192. OSSOSSOSSOSSSOSEESOOSEESOESEESEESE O17 LLDP operating EER EG 272 Working mechanism EE ee 221 Protocols and standards ee see EE EE EE EER EER EE EE EE EE EER EE EE EER EE EE ER ER EE EE EE EE ER Ee EE EE EE ER ER ER ee EE EER ER ER EER ER EE ER ee EE ee ee EE ee ee 222 Recommended LLDP configuration procedure RE AE EE EE EE IE 227 Enabling LLDP on ports eeteeeeetetteeeersetteeeestttteeesttteeessstteeesssttteeesssstteeesssstteeeesssstteeessstteeeseessstteeesssstteeesssnteeeessssteeeent 293 Setting LLDP parameters on ports EE EE EA ER EE EE 224 Setting LLDP parameters for a single port EE E E EE EE A E A 224 Setting LLDP parameters for ports in Dalch EE 207 Configuring LLDP globally RE EE EE EE RE EE EE EE EE tre 227 Displaying LLDP information for a port N EE EE ERR E 229 Displaying global LLDP information ee ee Ee ee ee Ee Ee EER EER EER EER EER EER EER EER EER EE Re EE EER EE Ee ees ee 234 Displaying LLDP information received from LLDP neighbors EE EE OE 236 LLDP configuration example ED OE EE a EE EE EE RE OE EE EE 236 Network requirements EE OE EE EE EE Ee 236 Configuring ETE 236 Configuring ST EE nese seeeeseeeenes 239 Verifying the configuration EE EE EE Gwinn EE OE 239 LLDP configuration guidelines E E E EE RE AE E N ER EE EE 241 Configuring UR ee 242 Overy EE EE RE ENEE ATENEA 242 NEER FEE EE EE 2472 ARP operating mechanism Ke 242 ARP EE EE EE EE EE EE EE 243 ET SE Ee 244 Configuring ETER 244 Displaying EST Te 244 Creating a stat
193. P relay agent EE EE N OE RE EE EE EO EE N 297 EA EE ER EE EE EE OE 207 Recommended configuration procedure EE EE RE N N OE OE OE EE 298 Enabling DHCP and configuring advanced parameters for the DHCP relay agent eers es es es es en ee ee ee sees ee ee ee eng 299 Creating a DHCP server group ELE EE tetett 300 Enabling the DHCP relay agent ON an interface OE 30 Configuring and displaying clients IP4o MAC bindings ssssssssssseessesessseseesssssseessseeessssnnsesseceesssssnnesseeessssnnnesssees 302 DHCP relay agent configuration example ME EE EE OE bm eb EE EE EE EL OE EE EE EE N 303 Configuring DHCP snooping EE AE EE N E E E ENE EE EO A E A EE Ie 306 OTA E E EE EE EE N EE EE er 306 Application of trusted ports ME EE EE OE OE EE IN 306 DHCP snooping support for Option 82 sette sesse sek eek eek gee GER geR Roe R gee Rae R Gee RGER Gee RGER GER gee Roe Rae R GER gee RGeR gee Re ERGER gee tetett 308 Recommended configuration procedure TER RE EE EE EO EA 308 Enabling DHCP snooping EE EE RR TR OE N 309 Configuring DHCP snooping functions on an interface ss rssssrssssessessssssesessseessneessssecssnecesnseessncssaneceaseeessnseeansesen 309 Displaying clients IP to oMAC bindings EE EE EE OE ME DS 310 DHCP snooping configuration example EE EE EE EE EE EE N 311 METER TEE EE EE EG 314 N EE IE TE OE Ee anaes 314 Managing EE EE EE EET 315 Using diagnostic ole ERR ERECT EE EOE eee reer eer eee eee eee reer eer eee reer eererreer eer erreereeererreerer
194. PKI domains Add modify and delete a PKI domain Display the certificate information about PKI domains and the contents of a certificate Generate a key pair destroy a key pair retrieve a certificate request a certificate and delete a certificate Display the contents of the CRL Receive the CRL of a domain Display port isolation group information Configure the ports in an isolation group Display the configurations of authorized IP the associated IPv4 ACL list and the associated IPv6 ACL list Configure authorized IP Display and configure system loopback detection parameters and port loopback detection parameters Display time range configuration information Create a time range Delete a time range Display IPv4 ACL configuration information Create an IPv4 ACL Configure a rule for a basic IPv4 ACL Configure a rule for an advanced IPv4 ACL Monitor Management Management Management Monitor Management Monitor Management Monitor Configure Monitor Configure Monitor Configure Monitor Configure Monitor Configure Management Management Configure Monitor Configure Configure Monitor Configure Configure Configure Function menu Description User level Link Setup Create a rule for a link layer ACL Contigure Remove Delete an IPv4 ACL or its rules Configure Summary Display IPv6 ACL configuration information Monitor Create Create an Pv ACL Contigure ACL IPv
195. PSE You can also connect a PD to a redundant power source for reliability The PSE supplies power over category 3 5 twisted pair cable for a PoE interface in the following two modes e Over signal wires The PSE uses data pairs pins 1 2 and 3 6 to supply DC power to PDs e Over spare wires The PSE uses spare pairs pins 4 5 and 7 8 to supply DC power to PDs A PSE can supply power to a PD only when the selected power supply mode is supported by both the PSE and PD If the PSE and PD support different power supply modes for example the PSE does not support power over spare wires while the PD supports power over spare wires you have to change the order of the lines in the twisted pair cable to supply power to the PD Figure 488 PoE system diagram PoE power PD 497 Contiguring PoE Betore contiguring PoE make sure the PoE power supply and PSE are operating correctly Otherwise either you cannot configure PoE or the PoE configuration does not take effect Contiguring PoE ports 1 Select PoE gt PoE from the navigation tree 2 Click the Port Setup tab Figure 489 Port Setup tab Summary PSE Setup Select Port HD Oe aoe EEIEIEE AE H H HH Select All Select None Note The Select Al and the Select None are only applied to current unit A Selected C Power Supplied ia Power Enabled E Power Disabled C Not Supported C Power Fault Power State No Change v Power Max 1000 40000 milliwa
196. Percent 1 100 WFQ 16 4096 V Filter Deny X Accounting Enable Apply Behavior Detail User Defined Behavior Information Behavior behavior1 none 8 Adda policy a Select QoS gt QoS Policy from the navigation tree b Click the Add tab c Enter the policy name policy d Click Add Figure 485 Adding a policy SUMMA Setup Remove Policy Name policy 1 31 Chars Add 9 Configure classitier behavior associations for the policy 495 10 n n e Click the Setup tab Select policy1 Select class1 from the Classifier Name list Select behavior1 from the Behavior Name list Click Apply Figure 486 Configuring classifier behavior associations for the policy Summary Add Remove Please select a policy policy w Classifier Name class 1 31 Chars Behavior Name 1 31 Chars Apply Classifier Behavior Apply the QoS policy in the inbound direction of interface GigabitEthernet 1 0 1 a 0 Qa g Select QoS gt Port Policy trom the navigation tree Click the Setup tab Select policy1 from the Please select a policy list Select Inbound from the Direction list Select port GigabitEthernet 1 0 1 Click Apply A configuration progress dialog box appears Click Close when the progress dialog box prompts that the contiguration succeeds Figure 487 Applying the QoS policy in the inbound direction of GigabitEthernet 1 0 1 Summary Remove Please
197. Portal Auth Name secondary Method Command Authz Name 5 Select the Accounting tab to configure the accounting scheme a b c d e f Select the domain name test Select Accounting Optional and select Enable from the list Select Default Accounting and select RADIUS as the accounting mode Select system from the Name list to use it as the accounting scheme Click Apply A configuration progress dialog box appears After the configuration process is complete click Close Figure 362 Configuring the AAA accounting method for the ISP domain Domain Setup Authentication Authorization Accounting Configuration of AAA Select an ISP domain test Accounting Optional Enable Default Accounting RADIUS Name system Secondary Method E LAN access Accounting Name Secondary Method E Login Accounting Name Secondary Method PPP Accounting Name Secondary Method Portal Accounting Name secondary Method Contiguration guidelines When you contigure the RADIUS client follow these guidelines e Accounting for FTP users is not supported 378 If you remove the accounting server used for online users the device cannot send real time accounting requests and stop accounting messages for the users to the server and the stop accounting messages are not buffered locally The status of RADIUS servers blocked or active determines which servers the device will communicate with or turn to when the current servers are not availa
198. Ports Enabled With Advanced Features Figure 415 Ports Enabled With Advanced Features area Advanced Port Security Configuration wPorts Enabled With Advanced Features Port Security Mode Intrusion Protection Outbound Restriction gnore Operation Authorizaiton GigabitEthernet1 0 4 MAC Auth Disable A Add Del Selected gt Permitted OUls for ports working in the mode of 802 1X MAC Based Or OUI 3 Click Add The page for configuring advanced port security control appears Figure 416 Configuring advanced port security control Apply Advanced Port Security Configuration Port GigabitEthernet1 0 2 v Security Mode MAC Auth v Enable Intrusion Protection Disable Port Temporaril Enable Outbound Restriction Only MAC Known Unicasts Ignore Authorization Apply Cancel 4 Configure advanced port security control as described in Table 131 5 Click Apply Table 131 Configuration items ltem Description Selects a port where you want to configure port security eae By default port security is disabled on all ports and access to the ports is not restricted Selects a port security mode Security Mode For more information about advanced security modes see Table 127 428 ltem Description Enable Intrusion Protection Enable Outbound Restriction Ignore Authorization Specifies whether to enable intrusion protection and selects an action to be taken upon detection of illegal frames Available actio
199. R ER ER Ee ere AAO Port isolation configuration example EE tes EEE E E E 44 Configuring authorized OE ee 443 Configuration procedure EE EE EE EE EE EN 443 Authorized IP configuration example ER ER 444 ETA ME EE 444 Configuration procedure EE EE DE EE EE Ee eee 444 Contiguring loopback detection eeeeereererrereeseereeeeeeeeeesecseereeseescereeeceeeseeseerceseereseeseoreescercsecsreseoseereeseesrereeresecseeseeseeeeee 447 Recommended configuration procedurer eeeeeeeeeteeerttreerttreeertesserettrsseettrrstttessettessettesset tessen tessetteesneeeerseeen 447 Configuring loopback detection globally AO EE RE AS 447 Configuring loopback detection on a pOr heeeeeereerereereereereereereerrereereereereereereereereereereereereereererresrerrereerreereereereereereereereee 448 Configuring OE EEEECESETeSETeeereeeeerreerreerreerreereeereserecerecrrerreerreer reer reer reer ecerecrrerreerreerreerretrreereerree 450 OE MA EE EE HR 450 ACL categories lt sssssrssssrssesssssessssssecssssssesssseccssnsecsssnscssssscsssssecsssssscessascessnsscesssssessssssesssassccssassesssanscsssneseessnsses 450 ET EE ee TE E A 450 Implementing time based ACL ry egseeeeeeeeseerseeeeeesereseeeseesseeseeeseeeseesseeseeeseceseeeseeseeosereseeeseesseosereseeseeeseesseesereseceseee 452 IPv4 fragments filtering with ACLs eeeeeeeeeeteeeettteeertteeerrtteeertttreseettessentteesentessentersseetererseetteretttesseeteesseeteereen 452 Configuration guidelines E EE EE EE OT ET 452 Recommend ACL
200. RTANT Uploading a file takes some time HP recommends not performing any operation on the Web interface during the upload 1 Select Device gt File Management from the navigation tree to enter the tile management page see Figure 57 In the Upload File area select the medium for saving the file from the Please select disk list Click Browse to navigate to the file to be uploaded Click Apply Removing a file 1 Select Device gt File Management trom the navigation tree to enter the tile management page see Figure 57 Do one of the following o Click the i icon of a file to remove the file o Select a file from the file list and click Remove File To remove multiple files repeat step 2 or select the tiles from the file list and click Remove File Specitying the main boot file 1 Select Device gt File Manage from the navigation tree to enter the tile management page see Figure 57 From the Please select disk list select the medium that holds the application file to be used as the main boot file Select the application file bin or app file from the file list Click Set as Main Boot File 68 Managing poris You can use the port management feature to set and view the operation parameters of a Layer 2 Ethernet port and an aggregate interface e For a Layer 2 Ethernet port these operation parameters include its state speed duplex mode link type PVID description MDI mode flow control sett
201. Required yore MEP alba Enable STP globally and configure MSTP parameters By default STP is enabled globally All MSTP parameters have default values Optional 3 Configuring MSTP on a Enable MSTP on a port and configure MSTP parameters pad By default MSTP is enabled on a port and all MSTP parameters adopt the default values 190 Step Remarks Optional Display MSTP information of a port in MSTI O the MSTI to which the port belongs and the path cost and priority of the port 4 Displaying MSTP information of a port Contiguring an MST region 1 From the navigation tree select Network gt MSTP By default the Region tab is displayed Figure 178 MST region Global Fot Summary Fort Setup Format Selector Region Name Revision Level O OOeDfcO0IG0 g Modify Instance WLAN Mapped O 1 to 4094 2 Click Modify Figure 179 Configuring an MST region Global Port Summary Port Setup Region Name 00e0fc003620 1 32 Chars Manual Modulo Instance DIT sv VLAN ID Fe xampte t 3 5 10 Apply Remove Instance ID VLAN Mapped Activate Cancel 3 Configure the MST region information as described in Table 58 and click Apply 191 Table 58 Configuration items ltem Description MST region name Region Name The MST region name is the bridge MAC address of the device by default Revision Level Revision level of the MST region Manual Instance ID and Manually add VLAN to instance mappings Clic
202. S field Bis 0 123 45 6 7 DS Field for IPv4 ToS octet and for IPv6 Traffic Class octet Class Selector codepoints Currently Unused Differentiated Services Codepoint DSCP RFC 2474 As shown in Figure 455 the ToS field of the IP header contains 8 bits According to RFC 2474 the ToS field of the IP header is redefined as the differentiated services DS field where a differentiated services code point DSCP value is represented by the first 6 bits O to 5 and is in the range of O to 63 The remaining 2 bits 6 and 7 are reserved Table 145 Description on IP Precedence IP Precedence decimal IP Precedence binary Description O 000 Routine 1 001 priority 2 010 immediate 3 011 flash 4 100 flash override 5 101 critical 6 110 internet 7 111 network 469 Table 146 Description on DSCP values DSCP value decimal DSCP value binary Description 46 101110 ef 10 001010 atl 12 001100 of12 14 001110 af13 18 010010 at2 1 20 010100 at22 22 010110 af23 26 011010 af31 28 011100 af32 30 011110 af33 34 100010 at4 36 100100 at42 38 100110 at43 8 001000 cs 16 010000 cs2 24 011000 cs3 32 100000 cs4 40 101000 cs5 48 110000 cs 56 111000 cs O 000000 be default 802 1p priority 802 1p priority lies in Layer 2 packet headers and applies to occasions where Layer 3 header analysis is not needed and QoS must be assured at Layer 2 Figure 456 An Ethernet frame with an 802 1Q tag heade
203. SIEM AAA LAUNCHED Ape 26 120200 243 200 SHELL Information SHELL_ Cup Tas keaurlPAddr ls rsadmin Command is sav Apr 26 120TET 427 M00 SHELL Information SHELL Clip TaskeaubPAjdre Usersaimin Command is qui Apr 26 1201 48 259 2000 SHELL Information SHELL Clip Taskeaul PAj e Lgersaimin Command is dis hh Taska a gare AE Bul Ape 2612014288 2000 SHELL information SHELL SECLOG Ag Re Ag ersadmin Command is authorzalon atinibute ide Apt 26 TAUTU 184 OU SHELL mirengna HELL UHU SKEURE US BESIN COMMAND IE AIS M yi records 15 per page sage 13 tacai 1 15 Mad Last 1 GO View system logs 61 Table 12 Field description Field Description Time Date Displays the time date when the system log was generated Source Displays the module that generated the system log Displays the severity level of the system log The information is classified into eight levels by severity e Emergency The system is unusable e Alert Action must be taken immediately e Critical Critical condition neve e Error Error condition e Warning Warning condition e Notification Normal but significant condition e Information Informational message e Debug Debug level message Digest Displays the brief description of the system log Description Displays the content of the system log Setting the log host Select Device gt Syslog from the navigation tree 2 Click the Loghost tab The log host configuration page appears Figure 5
204. See port security security 802 1X configuration 333 security MAC authentication ACL assignment 411 security MAC authentication configuration 404 406 408 security MAC local authentication contiguration 408 specitied operation parameter for all ports 73 STP designated port 178 STP root port 178 VLAN port link type 135 port isolation configuration 440 441 Ethernet link aggregation class two configuration class 206 port link type configuration 140 port mirroring adding local group 83 configuration 79 configuration restrictions 80 destination 79 direction bidirectional 79 direction inbound 79 direction outbound 79 local 79 local configuration 80 local group monitor port 84 local group port 81 local group source port 84 local mirroring configuration 83 mirroring group 9 recommended procedure 80 source 9 terminology 79 port security 802 1X authentication configuration 336 802 1X authorization status 322 802 1X configuration 321 332 802 1X configuration global 332 802 1X configuration port specitic 333 802 1X controlled uncontrolled 322 advanced control configuration 428 advanced mode configuration 433 authentication modes 421 basic control contiguration 425 basic mode configuration 430 configuration 421 423 430 configuration global 424 contiguration guidelines 423 features 421 intrusion protection feature 421 outbound restriction 421 permitted OUls
205. Server Configuration area click Add b Configure the primary accounting server Select the server type Primary Accounting Enter the IP address 10 1 1 2 and enter the port number 1813 Enter expert in the Key field and the Confirm Key field c Click Apply Figure 398 Configuring a RADIUS accounting server Add RADIUS Server Server Type Primary Accounting IP Address IPyd Pv6 10 1 1 2 Port 1613 R 65535 Default 1813 Key TELLI 1 64 Chars Confirm Key TELIT 1 64 Chars Apply Cancel 4 On the RADIUS configuration page click Apply 413 Figure 399 RADIUS configuration Add RADIUS Scheme Scheme Name 1 32 Chars Common configuration Serer Type Extended ka Username Format Without domain name PAdvanced RADIUS Serer Configuration Server Type IP Address Primary Authentication eae i Operation Primary Accounting 10 1 1 2 i Add tems marked with an asterisk are required Apply Cancel Configuring AAA for the scheme 1 Create an ISP domain a From the navigation tree select Authentication gt AAA b On the Domain Setup page enter test in the Domain Name field and click Apply 414 2 Figure 400 Creating an ISP domain Authentication Authorization Accounting ISP Domain Domain Name test 24 chars Default Dorain Apply Please selectthe ISF domains Domain Mame Default Domain Configure AAA authentication method for the ISP domain a Cl
206. Support Enable D Disable Option 82 Strategy Replace vDefault Replace Cancel 313 Managing services Overview Service management allows you to manage the following types of services FTP Telnet SSH SFTP HTTP and HTTPS You can enable or disable the services modify HTTP and HTTPS port numbers and associate the FTP HTTP or HTTPS service with an ACL to block illegal users FTP service FTP is an application layer protocol for sharing files between server and client over a TCP IP network Telnet service Telnet is an application layer protocol that provides remote login and virtual terminal functions SSH service Secure Shell SSH offers an approach to securely logging in to a remote device By encryption and strong authentication it protects devices against attacks such as IP spoofing and plain text password interception SFTP service The secure file transfer protocol SFTP is a new feature in SSH2 0 SFTP uses the SSH connection to provide secure data transter The device can serve as the SFTP server allowing a remote user to log in to the SFTP server for secure file management and transfer The device can also serve as an SFTP client enabling a user to login from the device to a remote device for secure file transfer HTTP service HTTP is used for transferring webpage information across the Internet It is an application layer protocol in the TCP IP protocol suite You can log in to the device by using the H
207. TTP protocol with HTTP service enabled accessing and controlling the device with Web based network management HTTPS service The Hypertext Transfer Protocol Secure HTTPS refers to the HTTP protocol that supports the Security Socket Layer SSL protocol The SSL protocol of HTTPS enhances the security of the device in the following ways e Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the illegal clients e Encrypts the data exchanged between the HTTPS client and the device to ensure the data security and integrity e Defines certificate attribute based access control policy for the device to control user access 314 Managing services 1 Select Network gt Service from the navigation tree to enter the service management configuration page as shown in Figure 293 Figure 293 Service management FTF _ Enable FTP service Telnet v Enable Telnet service SSH _ Enable 8H service SFTP _ Enable SFTP service HTTP Enable HTTP service PHTTPS JEnable HTTPS service Certificate tems marked with an asterisk are required Apply Cancel 2 Enable or disable services on the page Table 102 describes the detailed contiguration items 3 Click Apply Table 102 Configuration items ltem Description Enable FTP Enable or disable the FTP service service The FTP service is disabled by default FTP Associate the FTP service with an ACL Only the clients that pass the ACL
208. The rule configuration page for a basic IPv6 ACL appears Figure 451 Configuring a rule for a basic IPv ACL Summary Add Advanced Setup Remove Select Access Control List ACL Selectan ACL Configure a Basic ACL Cl Rule ID fs 0 65534 Ifno ID is entered the system will specify one Operation check Fragment check Logging Source IP Address Source Prefix Time Range Cancel Rule ID Operation Description Time Rat 3 Adda rule for a basic IPv6 ACL A Click Add Table 143 Configuration items ltem Description eri Control Select the basic IPv ACL for which you want to configure rules 462 ltem Description Select the Rule ID box and enter a number for the rule If you do not specify the rule number the system will assign one automatically Rule ID If the rule number you specify already exists the following operations modify the contiguration of the rule Select the operation to be performed for IPv packets matching the rule Operation e Permit Allows matched packets to pass e Deny Drops matched packets Select this box to apply the rule to only non tirst fragments Check Fragment If you do no select this box the rule applies to all fragments and non fragments Select this box to keep a log of matched IPv packets A log entry contains the ACL rule number operation for the matched packets protocol Check Logging number source destination address source des
209. U of the port Indicates the power state control configured on the sending port including the following Power Stateful Control e Power supply mode of the PSE PD e PSE PD priority e PSE PD power The power stateful control TLV is detined in IEEE P802 3at D1 0 The later versions no longer support this TLV HP devices send this type of TLVs only after receiving them LLDP MED TLVs LLDP MED TLVs provide multiple advanced applications for VoIP such as basic configuration network policy contiguration and address and directory management LLDP MED TLVs provide a cost effective and easy to use solution tor deploying voice devices in Ethernet LLDP MED TLVs are shown in Table 74 Table 74 LLDP MED TLVs Type Description LLDP MED Capabilities Allows a network device to advertise the LLDP MED TLVs that it supports Allows a network device or terminal device to advertise the VLAN ID of the Network Policy specific port the VLAN type and the Layer 2 and Layer 3 priorities for specific applications 220 Type Description Extended Allows a network device or terminal device to advertise power supply Power via MDI capability This TLV is an extension of the Power Via MDI TLV Hardware Revision Allows a terminal device to advertise its hardware version Firmware Revision Allows a terminal device to advertise its firmware version Software Revision Allows a terminal device to advertise its software version Serial Number Allows
210. VLANs 134 Port based VLAN Port based VLANs group VLAN members by port A port forwards traffic for a VLAN only after it is assigned to the VLAN Port link type You can configure the link type of a port as access trunk or hybrid The link types use the following VLAN tag handling methods Access port An access port belongs to only one VLAN and sends traffic untagged It is usually used to connect a terminal device unable to identify VLAN tagged packets or when it is unnecessary to separate different VLAN members As shown in Figure 133 Device A is connected to common PCs that cannot recognize VLAN tagged packets and you must configure Device A s ports that connect to the PCs as access ports Trunk port A trunk port can carry multiple VLANs to receive and send traffic for them Except traffic from the port VLAN ID PVID traffic sent through a trunk port will be VLAN tagged Usually ports that connect network devices are contigured as trunk ports As shown in Figure 133 Device A and Device B need to transmit packets of VLAN 2 and VLAN 3 and you must configure the ports interconnecting Device A and Device B as trunk ports and assign them to VLAN 2 and VLAN 3 Hybrid port A hybrid port allows trattic of some VLANs to pass through untagged and trattic of some other VLANs to pass through tagged Usually hybrid ports are configured to connect devices whose support for VLAN tagged packets are uncertain As shown in Figure 133 Devic
211. Whether the port is an edge port Port Edged e Config The configured value e Active The actual value Whether the port is connected to a point to point link Point to point e Config The configured value e Active The actual value Transmit Limit Maximum number of packets sent within each Hello time Protection type on the port e Root Root guard Protection Type e Loop Loop guard e BPDU BPDU guard e None No protection Format of the MST BPDUs that the port can send which can be legacy or MST BPDU Format 802 1s Config indicates the configured value and Active indicates the actual value Port Config Whether digest snooping is enabled on the port Digest Snooping Rapid transition Whether the current port rapidly transits to the forwarding state Num of Vlans Mapped Number of VLANs mapped to the current MSTI 198 Field Description Major parameters for the port e Hello Hello timer e MaxAge Max Age timer ees e FWDly Forward delay timer e MsgAge Message Age timer e Remain Hop Remaining hops BPDU Sent Statistics on sent BPDUs BPDU Received Statistics on received BPDUs Protocol Status Whether MSTP is enabled Protocol Std MSTP standard Version MSTP version CIST Bridge Prio Priority of the current device in the CIST MAC address MAC address of the current device Max age s Maximum age of a configuration BPDU Forward delay s Port state transition delay in seconds Hello
212. a CIST tree is also the process of configuration BPDU comparison During this process the device with the highest priority is elected as the root bridge of the CIST MSTP generates an IST within each MST region through calculation At the same time MSTP regards each MST region as a single device and generates a CST among these MST regions through calculation The CST and ISTs constitute the CIST of the entire network MSTI calculation Within an MST region MSTP generates different MSTIs for different VLANs based on the VLAN to instance mappings For each spanning tree MSTP performs a separate calculation process which is similar to spanning tree calculation in STP RSTP For more information see Calculation process of the STP algorithm In MSTP a VLAN packet is forwarded along the following paths e Within an MST region the packet is forwarded along the corresponding MSTI e Between two MST regions the packet is forwarded along the CST MSTP implementation on devices MSTP is compatible with STP and RSTP STP and RSTP protocol packets can be recognized by devices running MSTP and used for spanning tree calculation In addition to basic MSTP functions the device provides the following functions for ease of management e Root bridge hold e Root bridge backup e Root guard e BPDU guard 189 e Loop guard e TCBPDU a message that notifies the device of topology changes guard e Support for the hot swapping of interface boar
213. a configuration BPDU can be Timers held by the device When you configure timers follow these guidelines e The settings of hello time forward delay and max age must meet a certain formula Otherwise the network topology will not be stable HP recommends you to set the network diameter and then have the device automatically calculate the forward delay hello time and max age e The bridge diameter cannot be configured together with the timers Sets the role of the device in the MSTI or the bridge priority of the device which is one of the factors deciding whether the device can be elected as the root bridge Role of the device in the MSTI Not Set Not set you can set the bridge priority of the device when selecting this role Instance Instance ID Root Type and Bridge Priority e Primary Configure the device as the root bridge you cannot set the bridge priority of the device when selecting this role e Secondary Configure the device as a secondary root bridge you cannot set the bridge priority of the device when selecting this role 194 ltem Description Selects whether to enable TC BPDU guard When receiving topology change TC BPDUs the device flushes its forwarding address entries If someone forges TC BPDUs to attack the device the device will receive a large number of TC BPDUs within a short time and frequently poes on flushes its forwarding address entries This affects network stability Wi
214. acity and refresh interval 63 contiguration environment 20 LACP priority 211 LLDP parameters for a single port 224 LLDP parameters for ports in batch 227 log host 62 MAC address table dynamic aging timer 175 port operation parameters 69 refresh period 48 terminal parameters 21 Web device super password 87 Simple Network Management Protocol Use SNMP SNAP LLDP frame encapsulated in SNAP format 217 SNMP agent 111 agent enabling 113 community configuration 117 configuration 111 group configuration 118 manager 11 mechanism 111 MIB 111 NMM RMON configuration 93 105 packet statistics displaying 123 protocol versions 112 SNMPv1 configuration 124 SNMPv2c configuration 124 SNMPv3 configuration 127 trap function configuration 121 user configuration 120 view configuration 115 view creating 115 SNMP view rules adding 116 SNMPv1 configuration 124 protocol version 112 SNMPv2c configuration 124 protocol version 112 SNMPv3 contiguration 127 protocol version 112 snooping contiguring DHCP snooping functions on interface 309 DHCP snooping Option 82 support 308 sorting ACL auto match order sort 450 ACL contig match order sort 450 source NMM port mirroring 79 security ARP sremac validity check 250 SP queuing classifications 471 471 specifying Web device main boot file 68 stack configuration 43 stack device summary displaying 42 stack ports Web configuration 41 stack topology su
215. acket statistics Optional 112 Table 32 SNMPv3 configuration task list Task 1 Enabling SNMP agent 2 Configuring an SNMP view 3 Configuring an SNMP group 4 Configuring an SNMP user 5 Configuring SNMP trap function 6 Displaying SNMP packet statistics Enabling SNMP agent Remarks Required The SNMP agent function is disabled by default IMPORTANT If SNMP agent is disabled all SNMP agent related configurations are removed Optional After creating SNMP views you can specify an SNMP view for an SNMP group to limit the MIB objects that can be accessed by the SNMP group Required Atter creating an SNMP group you can add SNMP users to the group when creating the users Therefore you can realize centralized management of users in the group through the management of the group Required Before creating an SNMP user you need to create the SNMP group to which the user belongs IMPORTANT Atter you change the local engine ID the existing SNMPv3 users become invalid and you must re create the SNMPv3 users For more information about engine ID see Enabling SNMP agent Optional Allows you to configure that the agent can send SNMP traps to the NMS and configure information about the target host usually the NMS of the SNMP traps The SNMP agent sends traps to inform the NMS of important events such as a reboot By default an agent is allowed to send SNMP traps to the NMS O
216. aging ports To contigure the link type of a port From the navigation tree select Network gt VLAN a EN oe p p Click Apply Click Modify Port Select the port that you want to configure on the chassis front panel Select the Link Type option Set the link type to access hybrid or trunk A progress dialog box appears 7 Click Close on the progress dialog box when the dialog box prompts that the configuration succeeds 140 Figure 135 Modifying ports Select VLAN Create Port Detail Detail Modify VLAN Remove Select Ports Select All Select None L Hot avaliable for selection Select membership type Untagged Tagged E Not A Member Link Type PVID Link Type Access Selected ports Link Type GE1 0M GE1 0 4 Apply Cancel Setting the PVID for a port You can also configure the PVID of a port on the Setup tab of Device gt Port Management For more information see Managing ports To set the PVID for a port 1 2 3 4 From the navigation tree select Network gt VLAN Click Modify Port Select the port that you want to configure on the chassis front panel Select the PVID option The option allows you to modify the PVID of the port Set a PVID for the port By selecting the Delete box you can restore the PVID of the port to the default which is VLAN 1 The PVID of an access port must be an existing VLAN Click Apply A progress dialog box appears Click Clos
217. ail to receive LLDP frames to update information about the device you are configuring before it is aged out Tx Interval Displaying LLDP intormation tor a port 1 From the navigation tree select Network gt LLDP By default the Port Setup tab is displayed 2 On the port list click a port name to display its LLDP information at the lower half of the page 229 By default the Local Information tab is displayed Table 77 describes the fields Figure 202 The local information tab Neighbor Information Statistic Information Status Information LLDP local information of port 4 GigabitEthernef1 0 4T Part ID subtype Interface name Part ID GigabitEfhernet1 O0 d Port description GigabitEfhermet1 Did Interface Management address type ipva Management address 192 168 12 Management address interface type Ifindex Management address interface ID 30 Management address OID 0 Port VLAN ID PVIDY 1 fed Table 77 Field description Field Description Port ID subtype e Interface alias e Port component e MAC address Port ID subtype e Network address e Interface name e Agent circuit ID e Locally assigned Locally defined port ID type other than those listed above PoE port class Power port class e PSE Power sourcing equipment e PD Powered device Power class of the PD e Unknown p e ClassO ort power classification e Class e Class2 e Class3 e Class4 Media policy type e Unknown e Vo
218. ailable only for a trunk or hybrid port 449 Configuring ACLs Unless otherwise stated ACLs refer to both IPv4 and IPv ACLs throughout this document Grayed out options on Web configuration pages cannot be configured Overview An access control list ACL is a set of rules or permit or deny statements for identifying traffic based on criteria such as source IP address destination IP address and port number ACLs are essentially used for packet filtering A packet filter drops packets that match a deny rule and permits packets that match a permit rule ACLs are also widely used by many modules for example QoS and IP routing for traffic identification ACL categories Category ACL number IP version Match criteria IPv4 Source IPv4 address Basic ACLs 2000 to 2999 IPv6 Source Pv address Source destination IPv4 address protocol number oi and other Layer 3 and Layer 4 header fields Advanced ACLs 3000 to 3999 IPv Source destination IPv6 address protocol number and other Layer 3 and Layer 4 header fields EERS Pv4 and Layer 2 header fields such as source and destination ad AG 4000 to 4999 Pye MAC addresses 802 1p priority and link layer protocol type Match order The rules in an ACL are sorted in certain order When a packet matches a rule the device stops the match process and performs the action defined in the rule If an ACL contains overlapping or conflicting rules the matching result and actio
219. ain Click the Domain tab Click Add The page in Figure 383 appears Enter torsa as the PKI domain name enter myca as the CA identitier select aaa as the local entity select CA as the authority for certiticate request enter http 4 4 4 133 446 c95e970f632d27be5e8cbf80e97 1d9c4a9a93337 as the URL for certificate request the URL must be in the format of http host port Issuing Jurisdiction ID where Issuing Jurisdiction ID is the hexadecimal string generated on the CA and select Manual as the certificate request mode Click the collapse button before Advanced Configuration In the advanced contiguration area click the Enable CRL Checking box and enter http 4 4 4 133 447 myca crl as the CRL URL Click Apply A dialog box appears asking Fingerprint of the root certificate not specified No root certificate validation will occur Continue Click OK 400 Figure 383 Creating a PKI domain Entity Certificate ZAL Add PEKI Domain Domain Name 1 15Chars 3 CA Identifier 1 6 3Chars 3 Entity Mame Institution Requesting URL Attp4 4 4 1 33 446co5e9 TO IZAAT he Se rhfe Oe gr 1ddrdadadaaar 1 127 Chars LOAF IF Port 389 Version Request Mode Fingerprint Hash Fingerprint wTAdvanced Configuration Falling Count s50 1 100 Default 50 Folling Interval 20 minutes 5 168 Default 20 Enable CRL Checking CRL Update Period hourstl 7 20 CEL URL hied d d 133 447 myca crl te
220. alidity periods of certificates and revokes certificates as needed by publishing CRLs An RA is an extended part of a CA or an independent authority An RA can implement functions including identity authentication CRL management key pair generation and key pair backup It only examines the qualifications of users It does not sign certificates Sometimes a CA assumes the registration management responsibility and no independent RA exists The PKI standard recommends that an independent RA be used for registration management to achieve higher security of application systems PKI repository A PKI repository can be an LDAP server or a common database It stores and manages information like certificate requests certificates keys CRLs and logs and it provides a simple query function LDAP is a protocol for accessing and managing PKI information An LDAP server stores user information and digital certificates trom the RA server and provides directory navigation service From an LDAP server an entity can retrieve digital certificates of its own and other entities How PKI works In a PKl enabled network an entity can request a local certificate from the CA and the device can check the validity of certiticate The following describes how it works 1 An entity submits a certificate request to the CA 2 The RA verifies the identity of the entity and then sends the identity information and the public key with a digital signature to the CA
221. ame header 459 Packet precedence 469 parameter terminal 21 PD maximum PoE interface power 498 periodic time range ACL 452 periodic time range configuration ACL 453 522 ping address reachability determination 317 318 system maintenance 31 PoE configuration 497 501 501 detect nonstandard PDs enable 499 displaying 500 interface power management configure 498 maximum PoE interface power configure 498 PD 497 PI 497 port contiguration 498 PSE 497 policy QoS policy configuration 466 security MAC authentication user account policies 404 port 802 1X port based access control method 321 all operation parameters for a port 74 configuring energy saving 109 contiguring IGMP snooping 260 contiguring MLD snooping 274 DHCP snooping trusted port 306 DHCP snooping untrusted port 306 Ethernet aggregate interface 205 Ethernet link aggregation aggregate interface 209 Ethernet link aggregation and LACP contiguration 213 Ethernet link aggregation configuration 205 Ethernet link aggregation dynamic mode 207 Ethernet link aggregation group 205 Ethernet link aggregation group contiguration 208 Ethernet link aggregation group creation 208 Ethernet link aggregation LACP 205 Ethernet link aggregation LACP priority 21 Ethernet link aggregation LACP enabled port 211 Ethernet link aggregation member port state 205 Ethernet link aggregation modes 206 Ethernet link aggregation operationa
222. ameters and stack ports Management Stack Topology ed Display the topology summary of a stack Configure als Display the control panels of stack members Configure Summary System Display the basic system information system Mone Information resource state and recent system operation logs Summary Device l l Display the port information about the device Monitor Information System Name Display and configure the system name Configure Basic Web Idle Display and configure the idle timeout period for ia J P Configure Devi Timeout logged in users ce N Software Upload upgrade file from local host and upgrade Managemen Maintenance Upgrade the system software Reboot Reboot the device Management System Time Syslog Configurati on File Manageme nt Port Manageme nt Port Mirroring Users Electronic Label Diagnostic Information System Time Net Time Loglist Loghost Log Setup Backup Restore Save Initialize File Management Summary Detail Setup Summary Add Remove Modify Port Summary Super Password Create Modify Remove Display the electronic label of the device Generate diagnostic information file and view or save the file to local host Display and configure the system date and time Display the synchronization status of the system clock and configure the network time Display and refresh system logs Clear system logs Display and configure
223. anage them A local user represents a set of user attributes configured on a device such as the user password use type service type and authorization attribute and is uniquely identified by the username For a user to pass local authentication you must add an entry for the user in the local user database of the device For more information about local authentication see Configuring AAA A user group consists of a group of local users and has a set of local user attributes You can configure local user attributes for a user group to implement centralized management of user attributes for the local users in the group All local users in a user group inherit the user attributes of the group However if you configure user attributes for a local user the settings for the local user take precedence over the settings for the user group By default every newly added local user belongs to a user group named system which is created automatically by the system Contiguring a local user 1 Select Authentication gt Users from the navigation tree to enter the Local User tab which displays all local users Figure 363 Local user list User Group R Search Advanced Search User Service ser ser Expire F EE TAE Level VLAN ACL Profile Group User Type Time Operation C admin ad Management system pea EI Add BatchDelete 2 Click Add The page for adding a local user appears 380 3 4 Figure 364 Local user configuration page
224. and extends 802 1X and MAC authentication to provide MAC based network access control It applies networks that require different authentication methods for different users on a port Port security prevents unauthorized access to a network by checking the source MAC address of inbound trattic and prevents access to unauthorized devices by checking the destination MAC address of outbound traffic Port security can control MAC address learning and authentication on a port to make sure the port learns only source trusted MAC addresses A trame is illegal if its source MAC address cannot be learned in a port security mode or if it is from a client that has failed 802 1X or MAC authentication The port security feature automatically takes a predetined action on illegal frames This automatic mechanism enhances network security and reduces human intervention For scenarios that require only 802 1X authentication or MAC authentication HP recommends you contigure 802 1X authentication or MAC authentication rather than port security for simplicity For more information about 802 1X and MAC authentication see Configuring 802 1X and Configuring MAC authentication Port security features Outbound restriction The outbound restriction feature is not supported in this release The outbound restriction feature prevents traffic interception by checking the destination MAC addresses in outbound frames The feature guarantees that frames are sent only t
225. and then import it into the local PKI system By default the retrieved certificate is saved in a file under the root directory of the device and the filename is domain name ca cer for the CA certificate or domain name_local cer for the local certificate To retrieve a certificate 1 From the navigation tree select Authentication gt Certificate Management 2 Click the Certificate tab 3 Click Retrieve Cert 394 Figure 375 PKI certificate retrieval page Entity Domain CRL Retrieve Certificate Domain Name Certificate Type CA C Enable Offline Mode tems marked with an asterisk are required Apply Cancel 4 Configure the parameters as described in Table 122 5 Click Apply Table 122 Configuration items ltem Description Domain Name Select the PKI domain for the certificate Certificate Type Select the type of the certificate to be retrieved which can be CA or local Click this box to retrieve a certificate in offline mode that is by an out of band means like FTP disk or email and then import the certificate into the local PKI system Enable Offline Mode The following configuration items are displayed if this box is selected Get File From Specify the path and name of the certificate file to import Device e If the certificate file is saved on the device select Get File From Device and then specify the path and name of the file on the device If no file is specified the system by default gets t
226. arch function example 2 Advanced Search LLDP Status Equal to Disabled And Or Match Case Search in the result Apply Figure 12 Advanced search function example 3 Ro LLDP Status Search Advanced Search Port Name LLDP Status LLDP Work Mode Operation GigabitEthernet1 0 7 Disabled TXRX A GigabitEthernet1 0 8 Disabled TxRx A GigabitEthernet1 0 9 Disabled TXRX A GigabitEthernet1 0 15 Disabled TxRx A Sort function On some list pages the Web interface provides the sorting function to display the entries in a certain order The Web interface provides you with the sorting functions to display entries in certain orders On a list page you can click the blue heading item of each column to sort the entries based on the heading item you selected After your clicking the heading item is displayed with an arrow beside it as shown in Figure 13 The upward arrow indicates the ascending order and the downward arrow indicates the descending order Figure 13 Sort display BO Port Name v Search Advanced Search Port Name LLDP Status LLDP Work Modet Operation GigabitEthernet1 0 6 Disabled Rx A GigabitEthernet1 0 10 Enabled Rx ES F GigabitEthernet1 0 4 Enabled Tx A F GigabitEthernet1 0 13 Disabled Tx A F GigabitEthernet1 0 14 Enabled Tx A F GigabitEthernet1 0 4 Enabled TXRX A F GigabitEthernet1 0 2 Enabled TxRx ES GigabitEthernet1 0 3 Enabled TxRx A
227. as an untagged member After the assignment do not reconfigure the port as a tagged member in the VLAN Use Table 106 when you contigure multiple security features on a port 335 Table 106 Relationships of the 802 1X guest VLAN and other security features Feature Relationship description Only the 802 1X guest VLAN take effect A user that fails MAC authentication will not be assigned to the MAC authentication guest VLAN MAC authentication guest VLAN on a port that performs MAC based access control 802 1X Auth Fail VLAN on a port that performs MAC based access control The 802 1X Auth Fail VLAN has a higher priority The 802 1X guest VLAN function has higher priority Port intrusion protection on a port that performs than the block MAC action but it has lower priority MAC based access control than the shutdown port action of the port intrusion protection feature Configuring an Auth Fail VLAN Configuration prerequisites Create the VLAN to be specified as the 802 1X Auth Fail VLAN If the 802 1 X enabled port performs MAC based access control configure the port as a hybrid port enable MAC based VLAN on the port and assign the port to the Auth Fail VLAN as an untagged member Configuration guidelines The 802 1X Auth Fail VLANs on different ports can be different Assign different IDs to the port VLAN and the 802 1X Auth Fail VLAN on a port so the port can correctly process VLAN tagged incoming traffic Us
228. as the peer port of the reference port consider the port as a candidate selected port Otherwise the port is placed in the Unselected state The number of Selected ports in an aggregation group is limited When the number of Selected ports is under the limit all the member ports are set to Selected state When the limit is exceeded the system sets the ports with smaller port IDs as the Selected ports and place other ports in the Unselected state At the same time the peer device being aware of the changes sets the aggregation state of local member ports the same as their peer ports The system places the ports that cannot aggregate with the reference port in the Unselected state for example as the result of the inter board aggregation restriction When you contigure static and dynamic aggregation modes follow these guidelines e In an aggregation group a Selected port must have the same port attributes and class two configurations as the reference port To keep these configurations consistent you should configure the port manually e Any port attribute or class two configuration change might affect the aggregation state of all member ports and ongoing traffic If you need to make this change make sure you understand its impact on the live network 207 Contiguration procedures Contiguring a static aggregation group Step Remarks Create a static aggregate interface and configure member 1 Creating a link aggregation gr
229. atable Partner Port State e D The sending system considers the link is synchronized e E The sending system considers the incoming frames are collected e F The sending system considers the outgoing frames are distributed e G The sending system receives frames in the default state e H The sending system receives frames in the expired state Oper Key Operational key of the local port Table 68 Field description Field Description Unit Number of the remote system Port Name of the remote port Partner ID LACP priority and MAC address of the remote system Partner Port Priority LACP priority of the remote port Partner Oper Key Operational key of the remote port Link aggregation and LACP configuration example Network requirements As shown in Figure 192 create a link aggregation group on Switch A and Switch B to load share incoming and outgoing trattic across the member ports Figure 192 Network diagram Switch A Link aggregation Switch B Method 1 Create static link aggregation group 1 1 From the navigation tree select Network gt Link Aggregation 2 Click Create 3 Configure static link aggregation group 1 213 Enter link aggregation intertace ID 1 Select Static LACP Disabled for the aggregate interface type c Select GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 on the chassis front panel 4 Click Apply Figure 193 Creating static link aggregation group
230. atch configuring the port speed Summary Detail Basic Configuration Port State No Change Speed Auto 100 bd Duplex No Change Link Type No Change E PVD 1 4094 Description Chars 1 80 Advanced Configuration MDI No Change EE No Change Power Save No Change Count No Change 0 8192 EEE No Change r Storm Suppression Broadcast No Change Multicast No Change Unicast No Change Suppression Suppression Suppression pps range 1 148810 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port kbps range 1 100000 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port H BO HORE AO heb be PERA H E EER Select All Select None Unit Selected Ports 1 GE1 0 1 GE1 0 3 It may take some time if you apply the above settings to multiple ports Apply Cancel 3 Display the speed settings of ports a Click the Summary tab b Click the Speed button to display the speed information of all ports on the lower part of the page as shown in Figure 64 77 Figure 64 Displaying the speed settings of ports Select Feature Feature Summary GE1 0 5 GE1 0 6 Setup PortState Max MAC Count Flow Control Default VLAN ID PVID Link Type MDI Duplex Broadcast Suppression O Multicast Suppression Unicast Suppression Power Save Description EEE Setting Auto 100M Auto 100M Auto 100M Auto Aut
231. ating link 205 aging MAC address table timer 175 alarm NMM RMON alarm function 95 NMM RMON configuration 93 105 NMM RMON group 94 alarm entry contiguration 100 algorithm STP calculation 179 allocating DHCP IP addresses allocation 292 alternate port MST 187 application AAA application 352 applying QoS policy to port 484 architecture security 802 1X 321 ARP attack protection See ARP attack protection configuration 242 dynamic table entry 244 entry contiguration 244 entry display 244 entry removal 245 gratuitous ARP contiguration 246 gratuitous ARP packet 244 gratuitous ARP packet learning 244 message format 242 operation 242 static configuration 246 static entry configuration 245 static table entry 244 table 243 ARP attack protection configuration 250 detection configuration 250 packet validity check 250 user validity check 250 assigning 802 1X ACL 331 MAC authentication ACL assignment 405 MAC authentication VLAN assignment 405 VLAN 802 1X 329 attribute AAA RADIUS extended attributes 367 local user and user group configuration 380 security 802 1X RADIUS EAP Message 324 security 802 1X RADIUS Message Authentication 324 authenticating AAA configuration 352 359 AAA ISP domain authentication methods configuration 355 contiguring MAC authentication global 406 contiguring MAC authentication port specitic 408 local user and user group configuration 380 local use
232. ation set Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown Italic Italic text represents arguments that you replace with actual values Square brackets enclose syntax choices keywords or arguments that are optional Piet Braces enclose a set of required syntax choices separated by vertical bars from which AR you select one Cota Square brackets enclose a set of optional syntax choices separated by vertical bars from a Nite which you select one or none EE Asterisk marked braces enclose a set of required syntax choices separated by vertical AN bars from which you select at least one ei Asterisk marked square brackets enclose optional syntax choices separated by vertical yy ee bars from which you select one choice multiple choices or none gelas The argument or keyword and argument combination before the ampersand amp sign can be entered 1 to n times A line that starts with a pound sign is comments GUI conventions Convention Description Window names button names field names and menu items are in bold text For Boldface example the New User window appears click OK gt Multi level menus are separated by angle brackets For example File gt Create gt Folder Symbols Convention Description An alert that calls attention to important information that if not understood or followed can A WARNING resu
233. ault each pin has its particular role For example pin 1 and pin 2 are used for transmitting signals and pin 3 and pin 6 are used for receiving signals You can change the pin roles by setting the MDI mode For an Ethernet port in across mode pin 1 and pin 2 are used for transmitting signals and pin 3 and pin 6 are used for receiving signals The pin roles are not changed For an Ethernet port in auto mode the pin roles are decided through autonegotiation For an Ethernet port in normal mode the pin roles are changed Pin 1 and pin 2 are used for receiving signals and pin 3 and pin 6 are used for transmitting signals To enable normal communication you must connect the local transmit pins to the remote receive pins Configure the MDI mode depending on the cable types When you configure the MID mode follow these guidelines Typically use the auto mode The other two modes are used only when the device cannot determine the cable type When straight through cables are used the local MDI mode must be different from the remote MDI mode When crossover cables are used the local MDI mode must be the same as the remote MDI mode or the MDI mode of at least one end must be set to auto 7 ltem Descri ption Enable or disable flow control on the port With flow control enabled at both sides when traffic congestion occurs on the ingress port the ingress port sends a Pause frame notifying the egress port to temporarily su
234. ause the system does not save the current configuration automatically HP recommends that you perform this step to avoid loss of configuration 2 Click Logout in the upper right corner of the Web intertace Web interface The Web interface includes three parts navigation tree title area and body area as shown in Figure 6 Figure 6 Web based configuration interface HP1920 Device Information di Wizard Stack 4 Summary System Resource State mentee CPU Usage 2 network Memory Usage ma 40 wy Device Name Authentication HP 1920 24G Switch JG924A Security biniaz vc A Product Information QoS HP 1920 24G Switch Software Recent System Logs Version Alpha 1101 CD Time Level Description Device Location Apr 26 12 18 11 009 2000 Notification Console logged out from aux0 Apr 26 12 18 10 428 2000 Notification Exit from configuration mode g Contact Information Apr 26 12 08 58 091 2000 Warning admin logged in from 192 168 1 27 EE SERE Apr 26 12 08 57 955 2000 Information so ee ANE oe ee 8 219801A08WM08B00007B Aor 25 120857954200 N EA AA OD Hardware Version More Logs On DeviceMore 2 REV A amp Bootrom Version Refresh Period Manual v Refresh 109 g Running Time 0 days 0 hours 43 minutes 58 seconds 1 Navigation tree 2 Body area 3 Title area 7 Navigation tree Organizes the Web based NM functions as a navigation tree where you can select and configure functions as needed The result is displayed in the body area Body
235. ays for requesting and retrieving a certificate manual online and offline To request a certificate online you must get the root certificate from the CA server first When vou request a certificate offline the requested information will be displayed on the page first Please copy itto the CA server to produce the certificate file offline and then retrieve the file When vou delete the CA certificate the relevant local certificate will also be deleted 3 Click Create Key 4 Set the key length 5 Click Apply 393 Figure 373 Key pair parameter configuration page Entity Domain CRL Add Key Key Length 1024 512 2048 Default 1024 lf there is already a key overwrite it tems marked with an asterisk are required Apply Cancel Destroying the RSA key pair From the navigation tree select Authentication gt Certificate Management Click the Certificate tab Click Destroy Key ppe Click Apply to destroy the existing RSA key pair and the corresponding local certificate Figure 374 Key pair destruction page Entity Domain CRL Destroy Key E This operation will destroy the key and corresponding local certificate Apply Cancel Retrieving and displaying a certificate You can retrieve an existing CA certificate or local certificate from the CA server and save it locally To do so you can use offline mode or online In offline mode you must retrieve a certificate by an out of band means like FTP disk email
236. bers the MIB node etherHistoryJabbers Support for the field depends on the device model Collisions Number of collision packets received during the sampling period corresponding to the MIB node etherHistoryCollisions Utilization Bandwidth utilization during the sampling period corresponding to the MIB node etherHistoryUtilization Displaying RMON event logs 1 Select Device gt RMON from the navigation tree 2 Click the Log tab 104 Figure 90 Log tab Statistics History Alarm Event a Event Index Search Advanced DRAF Event Log SRY Pees Es Log Time Description 2011 5 16 The 1 3 6 1 2 1 16 1 1 1 4 1 defined in alarmEntry 1 uprise 1 1 BAEN 10000000 with alarm value 11779194 Alarm sample type is 16 18 37 absolute Refresh In this example event 1 has generated one log which is triggered because the alarm value 11779194 exceeds the rising threshold 10000000 The sampling type is absolute RMON configuration example Network requirements As shown in Figure 91 create an entry in the RMON Ethernet statistics table to gather statistics on GigabitEthernet 1 0 1 with the sampling interval being 10 seconds Perform corresponding contigurations so that the system logs the event when the number of bytes received on the interface more than 1000 or less than 100 Figure 91 Network diagram Agent GE1 0 1 Internet Server NMS Configuration procedure 1 Configure RMON to gather statistics for GigabitEthernet 1
237. ble In practice you can specify one primary RADIUS server and multiple secondary RADIUS servers with the secondary servers that function as the backup of the primary servers Typically the device chooses servers based on these rules o When the primary server is in the active state the device communicates with the primary server If the primary server fails the device changes the state of the primary server to blocked starts a quiet timer for the server and turns to a secondary server in the active state a secondary server configured earlier has a higher priority If the secondary server is unreachable the device changes the state of the secondary server to blocked starts a quiet timer for the server and continues to check the next secondary server in the active state This search process continues until the device finds an available secondary server or has checked all secondary servers in the active state If the quiet timer of a server expires or an authentication or accounting response is received from the server the status of the server changes back to active automatically but the device does not check the server again during the authentication or accounting process If no server is found reachable during one search process the device considers the authentication or accounting attempt a failure o Once the accounting process of a user starts the device keeps sending the user s real time accounting requests and stop accounting requests
238. bnormal abnormal open abnormal short or failure O O When a cable is normal the cable length displayed is the total length of the cable When a cable is abnormal the cable length displayed is the length between the current port and the location where fault occurs The cable length detected can have an error of up to 5 meters 91 Configuring the flow interval With the flow interval module you can view the number of packets and bytes sent and received by a port and the bandwidth use of the port over the specified interval Viewing port traffic statistics 1 Select Device gt Flow interval from the navigation tree By default the Port Traffic Statistics tab is displayed 2 View the number of packets and bytes sent and received by each port and the bandwidth use of each port over the last interval Figure 78 Port traffic statistics R Interface Name Search Advanced Search Receive Utilization Interface Name Interval Sec Received Packet Sent Packet Received Byte Sent Byte Sent Utilization GigabitEthernet1 0 1 300 0 0 0 0 0 0 GigabitEthernet1 0 2 300 15 15 2652 2652 1 1 GigabitEthernet1 0 3 300 0 0 0 0 0 0 GigabitEthernet1 0 4 300 0 0 0 0 0 0 GigabitEthernet1 0 5 300 0 0 0 0 0 0 GigabitEthernet1 0 6 300 0 0 0 0 0 0 GigabitEthernet1 0 7 300 0 0 0 0 0 0 GigabitEthernet1 0 8 300 0 0 0 0 0 0 GigabitEthernet1 0 9 300 0 0 0 0 0 0 GigabitEthernet1 0 10 300 0 0 0 0 0 0 GigabitEthernet1 0 11 300 0 0 0
239. bors of the change Set the enable status of the LLDP trapping function on the port or ports LLDP trapping is used to report to the network management station critical events such as new neighbor devices detected and link failures To avoid excessive traps from being sent when topology is instable tune the minimum trap transmission interval on the Global Setup tab Select the box to include the port description TLV in transmitted LLDP frames Select the box to include the system capabilities TLV in transmitted LLDP frames Select the box to include the system description TLV in transmitted LLDP frames Select the box to include the system name TLV in transmitted LLDP frames Select the box to include the management address TLV in transmitted LLDP frames and in addition set the management address and its format a numeric or character string in the TLV If no management address is specified the main IP address of the lowest VLAN carried on the port is used If no main IP address is assigned to the VLAN 127 0 0 1 is used 225 lem Description Port VLAN ID Select the box to include the PVID TLV in transmitted LLDP frames Select the box to include port and protocol VLAN ID TLVs in Protocol VLAN ID transmitted LLDP frames and specify the VLAN IDs to be advertised i If no VLAN is specified the lowest protocol VLAN ID is transmitted Setting Select the box to include VLAN name TLVs in transmitted LLDP frames an
240. by selecting Network gt VLAN Interface For more information see Configuring VLAN interfaces Select VLAN Interface 36 ltem Description Enable or disable the VLAN interface When errors occurred in the VLAN interface disable the interface and then enable the port to bring the port to operate correctly By default the VLAN interface is down if no Ethernet ports in the VLAN is up The VLAN is in the up state if one or more ports in the VLAN are up O IMPORTANT Disabling or enabling the VLAN interface does not affect the status of the Ethernet ports in the VLAN That is the port status does not change with the VLAN interface status DHCP Configure how the VLAN interface obtains an IPv4 address BOOTP e DHCP Select the option for the VLAN interface to get an IP address EER through DHCP e BOOTP Select the option for the VLAN intertace to get an IP address Configure IPv4 Manual through BOOTP address e Manual Selec this option to manually specify an IPv4 address and the mask length for the VLAN interface Admin status IPv4 address Specify an IPv4 address and the mask length for the VLAN interface Dotted decimal notation is also allowed for the mask length field MaskLen These two fields are configurable if Manual is selected Auto Configure how the VLAN interface obtains an IPv link local address e Auto Select this option for the device to automatically generate a link local address based on the
241. cal to those of an existing entry in the system After you contigure the RMON statistics function or the alarm function you can view RMON running status and verity the contiguration by performing tasks in Table 23 Table 23 Displaying RMON running status Task Displaying RMON statistics Remarks Display the interface statistics during the period from the time the statistics entry is created to the time the page is displayed The statistics are cleared after the device reboots After you create a history control entry on an interface the system calculates the information of the interface periodically and saves the Displaying RMON history sampling information to the etherHistoryEntry table You can perform this task to information display the entries in this table When you configure the history group the system specifies the number of history sampling records that can be displayed and the history sampling interval 96 Task Remarks If you configure the system to log an event after the event is triggered when you configure the event group the event is recorded in the RMON log Pertorm this task to display the details of the log table Displaying RMON event logs Contiguring a statistics entry 1 Select Device gt RMON from the navigation tree The Statistics tab page appears Figure 80 Statistics entry History Alarm Event Log Index v Search Advanced Search Index Interface Name Owner Status Operation
242. carries only one TLV of this type Indicates whether the device supports protocol VLANs and if so Port And Protocol VLAN ID what VLAN IDs these protocols will be associated with An LLDPDU can carry multiple different TLVs of this type Specifies the textual name of any VLAN to which the port belongs VLAN Name An LLDPDU can carry multiple different TLVs of this type 219 Type Description Indicates protocols supported on the port An LLDPDU can carry Protocol ldentity multiple different TLVs of this type DCBX Data center bridging exchange protocol NOTE HP devices support only receiving protocol identity TLVs IEEE 802 3 organizationally specific TLVs Table 73 IEEE 802 3 organizationally specific TLVs Type Description Contains the rate and duplex capabilities of the sending port support for autonegotiation enabling status of auto negotiation and the current rate and duplex mode MAC PHY Configuration Status Contains the power supply capability of the port e Port class PSE or PD e P ly mode Power Via MDI ee ee e Whether PSE power supply is supported e Whether PSE power supply is enabled e Whether pair selection can be controllable Indicates the support of the port for link aggregation the aggregation Link Aggregation capability of the port and the aggregation status or whether the link is in an aggregation Maximum Frame Size Indicates the supported maximum frame size It is now the MT
243. cates IMPORTANT If no certificate is specified the HTTPS service generates its own certificate HTTPS Set the port number for HTTPS service You can view this configuration item by clicking the expanding button in front of HTTPS Port Number IMPORTANT When you modify a port make sure the port is not used by any other service Associate the HTTPS service with an ACL Only the clients that pass the XG ACL filtering are permitted to use the HTTPS service You can view this configuration item by clicking the expanding button in front of HTTPS 316 Using diagnostic tools This chapter describes how to use the ping and traceroute utilities Ping Use the ping utility to determine if a specific address is reachable A ping operation involves the following steps 1 The source device sends ICMP echo requests to the destination device 2 The destination device responds by sending ICMP echo replies to the source device after receiving the ICMP echo requests 3 The source device displays related statistics after receiving the replies You can ping only the IP address of a device in the current software version If the source device does not receive an ICMP echo reply within the timeout time it displays the following information e A prompt e Ping statistics If the source device receives ICMP echo replies within the timeout time it displays the following information e Number of bytes for each e
244. cation 1 200Chars SNMP Version Note If vou disable SNMP all SNMP related configurations will not be saved Items marked with an asterisk are required Apply Cancel 127 2 Contigure an SNMP view a Click the View tab b Click Add The page for creating an SNMP view appears c Type view in the View Name field d Click Apply Figure 123 Creating an SNMP view 1 Please input the name of the view you want to create view Name view U a2Chars Apply Cancel e On the page that appears select the Included option type the MIB subtree OID interfaces and click Add f Click Apply A configuration progress dialog box appears g Click Close after the configuration process is complete Figure 124 Creating an SNMP view 2 Add View View Blame view Rule Included Excluded MIB Subtree OID 1 255Chars Subtree mask Jaareenas tems marked with an asterisk are required Add Rule MIB Subtree DIL subtree Mask Operation Included interfaces il Apply Cancel Configure an SNMP group a Click the Group tab b Click Add The page in Figure 125 appears c Type group in the Group Name field select view1 from the Read View list select view1 from the Write View list d Click Apply 128 Figure 125 Creating an SNMP group Setup Community Iser Trap MR Add SHMP Group Group Name grup sd 64 32 3 Security Level NoAuthe oP ri w Read View write View tems mar
245. cation configuration 408 SNMPv1 configuration 124 SNMPv2c configuration 124 SNMPv3 configuration 127 static route creation IPv4 280 static route creation IPv6 281 static routing 2 8 static routing configuration IPv4 283 static routing configuration IPv6 287 static routing detault route 279 syslog configuration 61 traceroute 31 VLAN configuration 133 145 Web device configuration management 64 Web device file management 67 Web device management 52 Web device user management 86 Web interface logout 7 Web service management 314 315 Web stack configuration 39 43 Web user level 8 Web based NM functions 8 NMM local port mirroring contiguration 83 local port mirroring group 80 local port mirroring group monitor port 84 local port mirroring group port 81 local port mirroring group source port 84 local port mirroring local group 83 port mirroring contiguration 79 port mirroring recommended procedure 80 RMON configuration 93 105 RMON group 93 SNMP configuration 111 SNMP mechanism 111 SNMP protocol versions 112 SNMPv1 configuration 124 SNMPv2c configuration 124 SNMPv3 configuration 127 system maintenance 31 traceroute 31 NMS NMM RMON configuration 93 105 SNMP protocol versions 112 NTP contiguring system time 57 58 system time configuration 56 numbering ACL automatic rule numbering 451 451 ACL automatic rule renumbering 451 ACL rule numbering step 451 O op
246. ce I Introduction to priority mapping tables The device provides the following types of priority mapping tables e CoS to Queve 802 1 p to local mapping table e DSCP to ueue DSCP to local mapping table which applies to only IP packets Table 148 through Table 149 list the default priority mapping tables Table 148 Default CoS to Queue mapping table Input CoS value Local precedence Queue O 2 O N IO IAIA IO N N IO IAIA O 475 Table 149 Default DSCP to ueue mapping table Input DSCP value Local precedence Queue O to 7 O 8 to 15 16 to 23 2 24 to 31 3 32 to 39 4 40 to 47 5 48 to 55 6 56 to 63 7 Contiguration guidelines When an ACL is referenced by a QoS policy for traffic classification the action permit or deny in the ACL is ignored and the actions in the associated traffic behavior are performed Recommended QoS configuration procedures Recommended QoS policy configuration procedure A QoS policy involves the following components class traftic behavior and policy You can associate a class with a traffic behavior using a QoS policy 1 Class Classes identity traffic A class is identified by a class name and contains some match criteria You can define a set of match criteria to classify packets The relationship between criteria can be and or or o and The device considers a packet belongs to a class only when the packet matches all the criteria in the class o or The device
247. ce creates a mapping between the MAC address of the user and the 802 1X guest VLAN The user can access resources in the guest VLAN A user has not passed 802 1X authentication yet If an 802 1X Auth Fail VLAN is available the device remaps the MAC A user in the 802 1X guest address of the user to the Auth Fail VLAN The user can access only VLAN fails 802 1X resources in the Auth Fail VLAN authentication If no 802 1X Auth Fail VLAN is configured the user is still in the guest VLAN A user in the 802 1X guest The device remaps the MAC address of the user to the authorized VLAN VLAN passes 802 1X If the authentication server assigns no authorized VLAN the device authentication remaps the MAC address of the user to the initial PVID on the port To use the 802 1 X guest VLAN function on a port that performs MAC based access control make sure the port is a hybrid port and enable MAC based VLAN on the port The network device assigns a hybrid port to an 802 1X guest VLAN as an untagged member Auth Fail VLAN You can configure an Auth Fail VLAN to accommodate users that have failed 802 1X authentication because of the failure to comply with the organization security strategy such as using a wrong password Users in the Auth Fail VLAN can access a limited set of network resources such as a software server to download anti virus software and system patches The Auth Fail VLAN does not accommodate 802 1X users that have failed au
248. ce handles VLANs on the port differs by 802 1X access control mode e Ona port that performs port based access control 329 Authentication status VLAN manipulation No 802 1X user has The device assigns the 802 1X guest VLAN to the port as the PVID All performed authentication 802 1X users on this port can access only resources in the guest VLAN within 90 seconds after If no 802 1X guest VLAN is configured the access device does not 802 1X is enabled perform any VLAN operation If an 802 1X Auth Fail VLAN see Auth Fail VLAN is available the A user in the 802 1X guest device assigns the Auth Fail VLAN to the port as the PVID All users on this VLAN fails 802 1X port can access only resources in the Auth Fail VLAN authentication If no Auth Fail VLAN is configured the PVID on the port is still the 802 1X guest VLAN All users on the port are in the guest VLAN e The device assigns the VLAN specified for the user to the port as the PVID and removes the port from the 802 1X guest VLAN After the A user in the 802 1X guest user logs off the user configured PVID restores VLAN passes 802 1X e If the authentication server assigns no VLAN the user configured PVID authentication applies The user and all subsequent 802 1X users are assigned to the vser configured PVID After the user logs off the PVID remains unchanged e Ona port that performs MAC based access control Authentication status VLAN manipulation The devi
249. cho reply e Message sequence number e Time to Live TTL e Response time e Ping statistics Ping statistics include the following information e Number of echo requests sent e Number of echo replies received e Percentage of echo replies not received Minimum average and maximum response time Traceroute Traceroute retrieves the IP addresses of Layer 3 devices in the path to a specific destination You can use traceroute to test network connectivity and identity failed nodes You can traceroute the IP address or the host name of a destination device If the target host name cannot be resolved a prompt appears A traceroute operation involves the following steps 1 The source device sends a packet with a Time to Live TTL value of 1 to the destination device 317 2 The first hop device responds with an ICMP TTL expired message to the source In this way the source device gets the address of the first device 3 The source device sends a packet with a TTL value of 2 to the destination device The second hop responds with an ICMP TTL expired message In this way the source device gets the address of the second device 5 The destination device responds with an ICMP port unreachable message because the packet from the source has an unreachable port number In this way the source device gets the address of the destination device In this way the source device can get the addresses of all Layer 3 devices on
250. cified manually configured IPv site local addresses or global unicast addresses are used EUI 64 154 Contiguration guidelines When you contigure VLAN interfaces follow these guidelines A link local address is automatically generated for an IPv VLAN interface after an IPv site local address or global unicast address is configured for the VLAN interface This generated link local address is the same as the one generated in the Auto mode If a manually assigned link local address is available the manually assigned one takes effect After the manually assigned link local address is removed the automatically generated one takes eftect For an IPv VLAN interface whose IPv link local address is generated automatically after you assign an Pv6 site local address or global unicast address removing the IPv6 site local address or global unicast address also removes the generated IPv6 link local address For IPv6 link local address configuration manual assignment takes precedence over automatic generation If you first adopt the manual assignment and then the automatic generation the automatically generated link local address will not take effect and the link local address of the intertace is still the manually assigned one However if you remove the manually assigned one the one automatically generated takes effect 155 Configuring a voice VLAN Overview The voice technology is developing quickly and more and more
251. cified by OUI address 167 0011 2200 0000 and mask FHFOO OOOO to pass through The description of the OUI address entry is test Figure 161 Network diagram Switch A Switch B Internet VLAN 2 010 1001 0755 2002 OUI 0011 2200 0000 Mask ffff ffOO OOOO Configuring Switch A 1 Create VLAN 2 a Select Network gt VLAN from the navigation tree b Click the Create tab c Enter VLAN ID 2 d Click Create Figure 162 Creating VLAN 2 select VLAN Port Detail Detail Modify VLAN Modify Port Remove Greate Create ID Description 1 VLAN 0001 Modify VLAN description Note you can do this later on the Modify VLAN page Modify the description of the selected VLAN ID Description Po 82 Chars 2 Configure GigabitEthernet 1 0 1 as a hybrid port and configure its PVID as VLAN 2 a Select Device gt Port Management from the navigation tree b Click the Setup tab c Select Hybrid trom the Link Type list 168 d Select the PVID box and enter 2 in the field e Select GigabitEthernet 1 0 1 from the chassis front panel f Click Apply F igure 163 Configuring GigabitEthernet 1 0 1 as a hybrid port Summary Detail Basic Configuration Port State No Change Speed No Change Duplex Link Type Hybrid PVD 2 Description Chars 1 80 Advanced Configuration Flow MDI No Change Control No Change sa Max MAC Power Save No Change Com No Change Storm Suppression ig f F Broadcas
252. cket whose target MAC address is all Os all 1s or inconsistent with the destination MAC address in the Ethernet header Discard the ARP request whose sender IP address is all 1s or a multicast address and discard the ARP reply whose sender and target IP addresses are all 1s or multicast addresses ARP Packet Validity Check If none is selected the system does not check the validity of ARP packets If both ARP packet validity check and user validity check are enabled the system performs the former first and then the latter 251 Configuring IGMP snooping Overview IGMP snooping runs on a Layer 2 switch as a multicast constraining mechanism to improve multicast forwarding efficiency It creates Layer 2 multicast forwarding entries from IGMP packets that are exchanged between the hosts and the router As shown in Figure 227 when IGMP snooping is not enabled the Layer 2 switch floods multicast packets to all hosts When IGMP snooping is enabled the Layer 2 switch forwards multicast packets of known multicast groups to only the receivers of the multicast groups Figure 227 Multicast forwarding before and after IGMP snooping is enabled Multicast packet transmission without IGMP Snooping Multicast packet transmission when IGMP Snooping runs Multicast router Multicast router Source Source Layer 2 switch Layer 2 switch Receiver Receiver Receiver Receiver Host B Host B Multicast packets Basic
253. ckets 128 Number of Recenwed 128 to 255 Bytes Packeis 40 Number of Raceved 256 to 511 Bytes Packets 14 Number of Reoened 512 to 1023 Bytes Packets 6 Humber of Received 1024 in 1578 Bytes Packets 0 Back Refresh Create an event to start logging after the event is triggered a Click the Event tab b Click Add The page in Figure 94 appears c Type userl rmon in the Owner field select the box before Log and click Apply d The page displays the event entry and you can see that the entry index of the new event is 1 as shown in Figure 95 106 Figure 94 Configuring an event group Statistics History Alarm Log Add an Event Group Event Type Log Trap tems marked with an asterisk are required Apply Cancel Figure 95 Displaying the index of an event entry Statistics History Alarm Log R Search Advanced Search Index Description Si pala ada Owner Status Type Trigder Time LE null Log useri Active Add Del Selected 4 Configure an alarm group to sample received bytes on GigabitEthernet 1 0 1 When the received bytes exceed the rising or falling threshold logging is enabled b Click the Alarm tab Click Add The page in Figure 96 appears Select Number of Received Bytes from the Static Item list select GigabitEthernet1 0 1 from the Interface Name list enter 10 in the Interval field select Delta from the Simple Type list enter user in the Owner field enter 1000 in the Rising Threshold field
254. configuration 429 secure MAC address configuration 427 trap feature 421 port based energy saving contiguration 109 port based VLAN contiguration 135 port frame handling 136 port link type 135 PVID 136 power over Ethernet Use PoE power supply priority PoE interface power management 498 precedence QoS priority mapping 4 4 priority Ethernet link aggregation LACP 205 port LACP priority 211 QoS packet 802 1 p priority 470 QoS packet IP precedence and DSCP values 469 QoS scheduling 471 priority mapping map 4 5 procedure adding NMM local port mirroring group 83 adding QoS policy 483 adding QoS traftic class 478 480 adding RADIUS server 373 adding rules to SNMP view 116 adding Web device local user 86 applying QoS policy to port 484 authenticating with security 802 1X EAP relay 326 authenticating with security 802 1X EAP termination 327 backing up Web device contiguration 64 contiguring 802 1X ACL assignment 343 contiguring 802 1X Auth Fail VLAN 336 contiguring 802 1X guest VLAN 335 configuring AAA accounting methods for ISP domain 357 524 configuring AAA authentication methods for ISP domain 355 contiguring AAA authorization methods for ISP domain 356 contiguring AAA ISP domain 354 contiguring ACL 489 contiguring ACL Ethernet frame header 459 configuring advanced ACLs 456 463 contiguring alarm entry 100 contiguring ARP static 246 contiguring authorized IP 443 444 confi
255. configuration examples Local MAC authentication contiguration example Network requirements As shown in Figure 390 contigure local MAC authentication on port GigabitEthernet 1 0 1 to control Internet access as follows 408 e Configure all users to belong to the domain aabbcc net and specify local authentication for users in the domain e Use the MAC address of each user as the username and password for authentication and require that the MAC addresses is hyphenated and in lower case e Configure the access device to detect whether a user has gone offline every 180 seconds When a user fails authentication the device does not authenticate the user within 180 seconds Figure 390 Network diagram Supplicant Authenticator IP network Host Switch MAC 00e0 fc12 3456 Configuring a local user Add a local user Set the username and password as 00 e0 fc 12 34 56 the MAC address of the user Set the service type to LAN access Details not shown Configuring AAA 1 From the navigation tree select Authentication gt AAA 2 On the Domain Setup page enter the domain name aabbcc net and click Apply Figure 391 Creating an ISP domain Authentication Authorization Accounting ISP Domain Domain Name ld 24 Chars Default Domain Apply Please select the ISP domaints Domain Mame Default Domain 3 Click the Authentication tab A Select the ISP domain aabbcc net 5 Select LAN access AuthN and select L
256. configuration procedures EE AE T E 452 Recommended IPv4 ACL configuration procedure eeeeeeeetteeettreeetttreerttsreertrsssettrssetttrssetttresettresenrsseen 452 Recommended IPv ACL configuration procedure sssssssssssssssessssssieeessseessssneesssseesssnseesssnsecsssnseesssnnecsssnnseen 453 Configuring ET RE EE EE Ee A53 Adding an IPVA ACL eers eeeR RR eeER RR eEERRREEERRRGEERRRROEERRRROeERRRRGeERRRReERRRReERRRReERRR KERR RReERRRRRR EER RReeRRRReeRR RR eeeRR Rees A54 Configuring a rule for a basic IPv4 ACLssssssssssssssssssssesssssecssssecsssseesssssscssssecssssscsssssccssassssssssecessnsssssansessssnees 455 Configuring a rule for an advanced IPv4 ACLessssssssssssseessssseeessssecsssseessssecssssssesssasscsssisecsssassesssnssesssnneessin 456 Configuring a rule for an Ethernet frame header ACL eeeeetseeseetseetssetssrssetssseesseesseesseerseerstersterssersteeste 459 Adding an IPv ACL ssssssssssssssssssssssssessssseesssssecssssesessssecsssssecsssascssssscesssscesssssesssasscssnssecssssnsscssnssssssnsscessanseessssses 46 Configuring a rule for a basic IPy6 ACl sesse sesse see see EE Ee EE RE EE Oe EER ee EE EER EER Oe DE EE ORE EER EE EE Oe EER ARE Ee ee ge 462 Configuring a rule for an advanced IPy6 ACl sees ees EE ee EE EE eed EER ee EER ee EE EE ee EE EE ee EER ee ee 463 Configuring QoSssssssssssssssssssnsssnesssssssneessnessnecsssecsnecensesanecsnscsanecsnseeanecanacensccanecsnsccanecenscsanenanesanecaneceanecensetanssnas 466 SARTRE AR EE RE 466 Net
257. configured Priority Set a local precedence value for the port Select a priority trust mode for the port e Untrust Packet priority is not trusted Trust Mode a _ e Dotlp 802 1p priority of the incoming packets is trusted and used for priority mapping e DSCP DSCP value of the incoming packets is trusted and used for priority mapping 488 ACL and QoS configuration example Network requirements As shown in Figure 476 the FTP server 10 1 1 1 24 is connected to the Switch and the clients access the FTP server through GigabitEthernet 1 0 1 of the Switch Configure an ACL and a QoS policy as follows to prevent the hosts from accessing the FTP server from 8 00 to 18 00 every day 1 Add an ACL to prohibit the hosts from accessing the FTP server from 8 00 to 18 00 every day 2 Configure a QoS policy to drop the packets matching the ACL 3 Apply the QoS policy in the inbound direction of GigabitEthernet 1 0 1 Figure 476 Network diagram 10 1 1 1 24 Switch FTP server Configuring Switch 1 Define a time range to cover the time range from 8 00 to 18 00 every day a Select QoS gt Time Range from the navigation tree Click the Add tab Enter the time range name test time Select the Periodic Time Range box Set the Start Time to 8 00 and the End Time to 18 00 Select the options Sun through Sat Click Apply mo ao 489 Figure 477 Defining a time range covering 8 00 to 18 00 every day Sum
258. ctional modules to a file named default diag and then you can locate problems faster by checking this file 1 Select Device gt Device Maintenance from the navigation tree 2 Click the Diagnostic Information tab Figure 43 Diagnostic information Software Upgrade Reboot Electronic Label Create Diagnostic Information File Mote The operation may take along time Do not perform any operation when creating diagnostic information file is in process 3 Click Create Diagnostic Information File The system begins to generate a diagnostic information file 4 Click Click to Download The File Download dialog box appears 5 Select to open this file or save this file to the local host 54 Figure 44 The diagnostic information file is created Software Upgrade Reboot Electronic Label Create Diagnostic Information File Click ta Download Mote The operation may take a long time Do not perform any operation when creating diagnostic information file is in process Creating diagnostic information file succeeded The generation of the diagnostic file takes a period of time During this process do not perform any operation on the Web page After the diagnostic file is generated successtully you can view this file on the page you enter by selecting Device gt File Management or downloading this file to the local host For more information see Managing files 55 Configuring system time Overview You must c
259. curity is disabled globally Required This function configures the advanced port security mode intrusion Configuring advanced port protection action or outbound restriction and selects whether to security control ignore the authorization information from the RADIUS server By default port security is disabled on all ports and access to the ports is not restricted Optional This setting is available only for the 802 1X MAC Based Or OUI mode Configuring permitted OUls You can configure up to 16 permitted OUI values A port in this mode allows only one 802 1X user and one user whose MAC address contains the specified OUI to pass authentication at the same time By default no OUI values are configured Contiguring global settings tor port security From the navigation tree select Authentication gt Port Security Figure 409 Port security configuration page Port Security Configuration Enable Port Security gt Advanced Apply Security Ports And Secure MAC Address List Port Max porting of Intrusion Protection Outbound Restriction Operation GigabitEthernet1 0 3 5 a 5 aA p Add Del Selected gt Secure MAC Address List Advanced Port Security Configuration b Ports Enabled With Advanced Features gt Permitted OUls for ports working in the mode of 802 1X MAC Based Or OUI In the Port Security Configuration area click Advanced 424 di 4 Figure 410 Port security configuration Port Security Configurat
260. d Create a PKI domain setting the certificate request mode to Manual 2 Creating a PKI domain Betore requesting a PKI certificate an entity needs to be contigured with some enrollment information which is called a PKI domain A PKI domain is intended only for convenience of reference by other applications like IKE and SSL and has only local significance Required Generate a local RSA key pair By default no local RSA key pair exists Generating an RSA key pair is an important step in certificate request The 3 Generating an RSA key key pair includes a public key and a private key The private key is kept by the user and the public key is transferred to the CA along with some other pair l l information IMPORTANT If a local certificate already exists you must remove the certificate before generating a new key pair so as to keep the consistency between the key pair and the local certificate Required Certificate retrieval serves the following purposes e Locally store the certificates associated with the local security domain for improved query efficiency and reduced query count 4 Retrieving the CA e Prepare for certificate verification certificate IMPORTANT If a local CA certificate already exists you cannot perform the CA certificate retrieval operation This will avoid possible mismatch between certificates and registration information resulting from relevant changes To retrieve the CA certificate you must re
261. d Del Selected Contigure MAC authentication global settings as described in Table 125 and then click Apply Table 125 Configuration items ltem Description Enable MAC Authentication Specifies whether to enable MAC authentication globally Sets the period that the device waits for traffic from a user before it Offline Detection Period regards the user idle Sets the interval that the device must wait before it can pertorm MAC Quiet T ane oe DI AE authentication for a user that has failed MAC authentication Sets the interval that the device waits for a response from a RADIUS Server Timeout Time i server before it regards the RADIUS server unavailable Specifies the ISP domain for MAC authentication users Authentication ISP Domain If no ISP domain is specified the system default authentication domain is used for MAC authentication users Configures the properties of MAC authentication user accounts e MAC without hyphen Uses MAC based accounts and excludes hyphens from the MAC address for example xxxxxxxxxxxx e MAC with hyphen Uses MAC based accounts and hyphenates the MAC address for example xx xx XX XX XX XX Authentication Information Format e Fixed Uses a shared account You must specify a username and password for the account 407 Contiguring MAC authentication on a port 1 From the navigation tree select Authentication gt MAC Authentication 2 In the Ports With MAC Authentication
262. d Switch D are connected to one another Create a stack where Switch A is the master device and Switch B Switch C and Switch D are member devices An administrator can log in to Switch B Switch C and Switch D through Switch A to perform remote configurations Figure 30 Network diagram Stack Switch B Member device Switch C Member device Switch D Member device Configuration procedure 1 Configure global parameters for the stack on Switch A a Select Stack from the navigation tree of Switch A and then perform the subsequent steps on the Setup tab as shown in Figure 31 b Type 192 168 1 1 in the field of Private Net IP c Type 255 255 255 0 in the field of Mask d Select Enable from the Build Stack list e Click Apply 43 Figure 31 Configuring global parameters for the stack on Switch A Topology Summary Device Summary Global Settings Private Net IP 192 168 1 1 255 255 255 0 Build Stack Enable Apply Por Settings R Port Name v Search Advanced Search Port Name Port Status GigabitEthernet1 0 1 not stack port GigabitEthernet1 0 2 not stack port GigabitEthernet1 0 3 not stack port GigabitEthernet1 0 4 not stack port GigabitEthernet1 0 5 not stack port 28 records 5 v per page page 1 6 record 1 5 First Next Last 1 GO Enable Disable Switch A becomes the master device Configure a stack port on Switch A a In the Port Settings area on the Set
263. d for verifying the CA root certificate After receiving the root certificate of the CA an entity needs to verify the fingerprint of the root certificate namely the hash value of the root certificate content This hash value is unique to every certificate If the fingerprint of the root certificate does not match the one configured for the PKI domain the entity will reject the root certificate e f you specify MD5 as the hash algorithm enter an MD5 fingerprint The fingerprint must a string of 32 characters in hexadecimal notation e If you specify SHA1 as the hash algorithm enter an SHA1 fingerprint The fingerprint must a string of 40 characters in hexadecimal notation Fingerprint e If you do not specify the fingerprint hash do not enter any fingerprint The entity will not verify the CA root certificate and you yourself must make sure the CA server is trusted IMPORTANT The fingerprint must be configured if you specify the certificate request mode as Auto If you specity the certificate request mode as Manual you can leave the fingerprint settings null If you do not configure the fingerprint the entity will not verify the CA root certificate and you yourself must make sure the CA server is trusted Polling Count Set the polling interval and attempt limit for querying the certificate request status After an entity makes a certificate request the CA might need a long period of time if it verifies the certificate request i
264. d in the common configuration part are used only when no corresponding shared keys are configured in the RADIUS server configuration part Set the time the device keeps an unreachable RADIUS server in blocked state If you set the quiet time to O when the device needs to send an authentication or accounting request but finds that the current server is unreachable it does not change the server s status that it maintains It simply sends the request to the next server in the active state As a result when the device needs to send Quiet Time a request of the same type for another user it still tries to send the request to the server because the server is in the active state You can use this parameter to control whether the device changes the status of an unreachable server For example if you determine that the primary server is unreachable because the device s port for connecting the server is out of service temporarily or the server is busy you can set the time to O so that the device uses the primary server as much Set the RADIUS server response timeout time If the device sends a RADIUS request to a RADIUS server but receives no Server Response Timeout Time response in the specified server response timeout time it retransmits the request Setting a proper value according to the network conditions helps in improving the system performance 371 ltem Descri ption Set the maximum number of attempts for transmitting a RADIUS
265. d port recording binding entries record binding entries GigabitEthernet 1 0 3 and ae Es Switch B GigabitEthemet GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 1 0 4 l GigabitEthernet GigabitEthernet 1 0 3 and o Switch C 1 0 1 GigabitEthernet 1 0 4 GigabitEthernet 1 0 2 DHCP snooping support tor Option 82 Option 82 records the location information about the DHCP client so the administrator can locate the DHCP client for security and accounting purposes For more information see Option 82 DHCP snooping uses the same strategies as the DHCP relay agent to handle Option 82 for DHCP request messages as shown in Table 99 If a response returned by the DHCP server contains Option 82 DHCP snooping removes Option 82 before forwarding the response to the client If the response contains no Option 82 DHCP snooping forwards it directly Table 99 Handling strategy If a DHCP request has Handling strategy The DHCP snooping device Drop Drops the message Keep Forwards the message without changing Option 82 Option 82 prion Forwards the message after replacing the original Replace Option 82 with the Option 82 padded in normal format No Option 82 N A Forwards the message after adding the Option 82 padded in normal format Recommended configuration procedure Task Remarks Required Enabling DHCP snooping By default DHCP snooping is disabled Required Specify an interface as trusted and configure DHCP snooping to support
266. d sda 3 Confirm Authentication Password dtd Chars 3 Privacy Mode IESER Privacy Password dtd chars 3 Confirm Privacy Password etd Chars ACL 2 299 tems marked with an asterisk are required Apply Cancel 4 Configure the SNMP user as described in Table 37 5 Click Apply 120 Table 37 Configuration items ltem Description User Name Set the SNMP user name Select the security level for the SNMP group The available security levels are Security Level e NoAuth NoPriv No authentication no privacy e Auth NoPriv Authentication without privacy e Auth Priv Authentication and privacy Select an SNMP group to which the user belongs e When the security level is NoAuth NoPriv you can select an SNMP group with no authentication no privacy e When the security level is Auth NoPriv you can select an SNMP group with no authentication no privacy or authentication without privacy Group Name e When the security level is Auth Priv you can select an SNMP group of any security level Select an authentication mode including MD5 and SHA when the Authentication Mode security level is Auth NoPriv or Auth Priv Authentication Password Set the authentication password when the security level is Auth NoPriv or Auth Priv Confirm Authentication The confirm authentication password must be the same with the Password authentication password Select a privacy mode including DES56 AES128 and 3DES when Privacy Mode the
267. d secure communications at the application layer With PKI SSL enables encrypted communications between a browser and a server Both the communication parties can verify the identity of each other through digital certiticates Recommended contiguration procedures The device supports the following PKI certiticate request modes e Manual In manual mode you need to manually retrieve a CA certificate generate a local RSA key pair and submit a local certificate request for an entity e Auto In auto mode an entity automatically requests a certificate through the SCEP when it has no local certificate or the present certificate is about to expire You can specify the PKI certificate request mode for a PKI domain Different PKI certificate request modes require different contigurations Recommended configuration procedure tor manual request Step Remarks Required Create a PKI entity and configure the identity information A certificate is the binding of a public key and the identity intormation of an 1 Creating a PKI entity entity where the distinguished name DN shows the identity information of the entity A CA identifies a certificate applicant uniquely by an entity DN The DN settings of an entity must be compliant to the CA certificate issue policy Otherwise the certificate request might be rejected You must know the policy to determine which entity parameters are mandatory or optional 386 Step Remarks Reguire
268. d specify the VLAN IDs to be advertised VLAN Name If no VLAN is specified the lowest VLAN carried on the port is advertised Select the box to include the link aggregation TLV in transmitted Link Aggregation LLDP frames MAC PHY Select the box to include the MAC PHY configuration status TLV in DOTS Configuration Status transmitted LLDP frames TLV Setting EE N Select the box to include the maximum frame size TLV in transmitted LLDP frames Select the box to include the power via MDI TLV and power stateful Power via MDI control TLV in transmitted LLDP frames LLDP MED Select the box to include the LLDP MED capabilities TLV in Capabilities transmitted LLDP frames Select the box to include the hardware revision TLV firmware revision TLV software revision TLV serial number TLV manufacturer name TLV model name TLV and asset ID TLV in transmitted LLDP frames Inventory MES Select the box to include the network policy TLV in transmitted LLDP frames Extended l l Select the box to include the extended power via MDI TLV in Power via MDI i transmitted LLDP frames Capability Select the box to encode the emergency call number in the location MED TLV Emergency Number identification TLV in transmitted LLDP frames and set the emergency Setting call number Address Select Address to encode the civic address information of the network connectivity device in the location identification TLV in transmitted LLDP frames In addition
269. ddress of the user to the server assigned A user in the Auth Fail VLAN VLAN passes 802 1X oue ae If the authentication server assigns no VLAN remaps the MAC address of the user to the initial PVID on the port To perform the 802 1 X Auth Fail VLAN function on a port that performs MAC based access control you must ensure that the port is a hybrid port and enable MAC based VLAN on the port The network device assigns a hybrid port to an 802 1X Auth Fail VLAN as an untagged member ACL assignment You can specify an ACL for an 802 1X user to control its access to network resources After the user passes 802 1X authentication the authentication server either the local access device or a RADIUS server assigns the ACL to the port to filter the traffic from this user In either case you must configure the ACL on the access device You can change ACL rules while the user is online Contiguration prerequisites When you configure 802 1X follow these restrictions and guidelines Configure an ISP domain and AAA scheme local or RADIUS authentication for 802 1X users For more information see Configuring AAA and Configuring RADIUS If RADIUS authentication is used create user accounts on the RADIUS server If local authentication is used create local user accounts on the access device and specify the LAN access service for the user accounts For more information see Configuring users 331 Recommended configuration proc
270. different routing protocols are available in a routing table and they can be divided into the following categories by origin Direct routes Routes discovered by data link protocols also known as interface routes Static routes Manually configured routes Static routes are easy to configure and require fewer system resources They work well in small and stable networks but cannot adjust to network changes so you must manually configure the routes again whenever the network topology changes Dynamic routes Routes that are discovered dynamically by routing protocols Each entry in the FIB table specifies a physical interface that packets destined for a certain address should go out to reach the next hop the next router or the directly connected destination A route entry includes the following items Destination IP address Destination IP address or destination network Mask IPv4 prefix length IPv6 Specities together with the destination address the address of the destination network A logical AND operation between the destination address and the network mask pretix length yields the address of the destination network Preference Routes to the same destination might be discovered by various routing protocols or manually configured and routing protocols and static routes have different preferences configured The route with the highest preference the smallest value is optimal Outbound interface Specifies the
271. ding of certificate owner identity information and a public key Users can get certificates use certificates and revoke certificates By leveraging digital certificates and relevant services like certificate and blacklist distribution PKI supports authenticating the entities involved in communication and therefore guarantees the confidentiality integrity and non repudiation of data PKI terms Digital certificate A digital certificate is a file signed by a certificate authority CA that contains a public key and the related user identity information A simplest digital certificate contains a public key an entity name and a digital signature trom the CA Generally a digital certiticate also includes the validity period of the key the name of the CA and the sequence number of the certificate A digital certificate must comply with the international standard of ITU T_X 509 This document involves local certificate and CA certificate A local certiticate is a digital certificate signed by a CA for an entity A CA certificate also known as a root certificate is signed by the CA for itself CRL An existing certificate might need to be revoked when for example the username changes the private key leaks or the user stops the business Revoking a certificate will remove the binding of the public key with the user identity information In PKI the revocation is made through certificate revocation lists CRLs When a certificate is revoked th
272. ds and switchover of the active and standby main boards Protocols and standards MSTP is documented in the following protocols and standards e IEEE 802 1d Spanning Tree Protocol e IEEE 802 1w Rapid Spanning Tree Protocol e IEEE 802 1s Multiple Spanning Tree Protocol Contiguration guidelines When you configure MSTP follow these guidelines e Two or more spanning tree devices belong to the same MST region only if they are configured to have the same MST region name MST region level and the same VLAN to instance mapping entries in the MST region and they are connected through a physical link e Iftwo or more devices are selected as the root bridge in a spanning tree at the same time the device with the lowest MAC address is chosen e If BPDU guard is disabled a port set as an edge port becomes a non edge port again if it receives a BPDU from another port To restore its port role as an edge port you must restart the port e fa port directly connects to a user terminal configure it as an edge port and enable BPDU guard for it This enables the port to quickly transit to the forwarding state when ensuring network security Recommended MSTP configuration procedure Ste Remarks Optional 1 Configuring an MST Contigure the MST region related parameters and VLAN to instance l mappings region By default the MST region related parameters adopt the default values and all VLANS in an MST region are mapped to MSTI O
273. dvanced Search a Port Name LLDP Status LLDP Work Mode Operation GigabitEthernet1 0 6 Disabled Rx A F GigabitEthernet1 0 7 Disabled TxRX A F GigabitEthernet1 0 8 Disabled TXRX A F GigabitEthernet1 0 9 Disabled TXRX A E GigabitEthernet1 0 13 Disabled Tx A E GigabitEthernet1 0 15 Disabled TXRX A 6 records 15 v per page page 1 1 record 1 6 1 GO e Advanced search As shown in Figure 9 you can click the Advanced Search link to open the advanced search area Specify the search criteria and click Apply to display the entries that match the criteria 17 Figure 9 Advanced search Advanced Search Port Name And Or Match Case Search in the result Apply Cancel Take the LLDP table shown in Figure 7 as an example To search for the LLDP entries with LLDP Work Mode TxRx and LLDP Status Disabled 1 Click the Advanced Search link specify the search criteria on the advanced search page as shown in Figure 10 and click Apply The LLDP entries with LLDP Work Mode being TxRx are displayed Figure 10 Advanced search function example 1 Advanced Search LLDP Work Mode Equal to And Or Match Case Search in the result Apply Cancel 2 Click the Advanced Search link specify the search criteria on the advanced search page as shown in Figure 11 and click Apply The LLDP entries with LLDP Work Mode being TxRx and LLDP Status being Disabled are displayed as shown in Figure 12 Figure 11 Advanced se
274. e a In the RADIUS Server Configuration area click Add b Select the server type Backup Authentication c Enter the IP address 10 1 1 2 and enter the port number 1812 d Click Apply The RADIUS Server Configuration area displays the backup authentication server you have configured 4 Configure the primary accounting server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Select the server type Primary Accounting c Enter the IP address 10 1 1 2 and enter the port number 1813 d Click Apply The RADIUS Server Configuration area displays the accounting server you have configured 5 Configure the secondary accounting server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Select the server type Backup Accounting c Enter the IP address 10 1 1 1 and enter the port number 1813 d Click Apply The RADIUS Server Configuration area displays the backup accounting server you have configured 6 On the RADIUS configuration page click Apply Configuring AAA for the scheme 1 Create an ISP domain a From the navigation tree select Authentication gt AAA The Domain Setup page appears b Select test from the Domain Name list and select Enable from the Default Domain list c Click Apply 340 Figure 315 Creating an ISP domain Authentication Authorization Accounting ISP Domain Domain Name vl 24 chars Default Domain Apply Please selectthe ISF domain
275. e page 1 6 record 1 5 w Next Last 1 GO Disable Switch B becomes a member device On Switch C configure GigabitEthernet 1 0 1 the port connected to Switch B as a stack port a Select Stack from the navigation tree of Switch C b In the Port Settings area on the Setup tab select GigabitEthernet1 0 1 c Click Enable Figure 34 Configuring a stack port on Switch C Topology Summary Device Summary Global Settings Private Net IP Mask Build Stack Disable X Apply Port Settings R Port Name Search Advanced Search Port Name Port Status J GigabitEthernet1 0 1 not stack port GigabitEthernet1 0 2 not stack port GigabitEthernet1 0 3 not stack port GigabitEthernet1 0 4 not stack port F GigabitEthernet1 0 5 not stack port 28 records 5 vY per page page 1 6 record 1 5 First Prey Next Last 1 GO Disable Switch C becomes a member device On Switch D contigure GigabitEthernet 1 0 1 the port connected to Switch B as a stack port a Select Stack from the navigation tree of Switch D b In the Port Settings area on the Setup tab select GigabitEthernet1 0 1 c Click Enable Switch D becomes a member device 45 Verifying the configuration To verity the stack topology on Switch A 1 Select Stack from the navigation tree of Switch A 2 Click the Topology Summary tab Figure 35 Verifying the configuration Setup Device Summary Member ID Role DO Waster 1 Slave 2 Slave
276. e C connects to a small sized LAN in which some PCs belong to VLAN 2 and other PCs belong to VLAN 3 and Device B is uncertain about whether Device C supports VLAN tagged packets Configure on Device B the port connecting to Device C as a hybrid port to allow packets of VLAN 2 and VLAN 3 to pass through untagged Figure 133 Port link types VLAN 2 VLAN 2 Fe Ds VLAN 3 Device A Device B Device C Access links are reguired Trunk links are reuqired VLAN 3 Hybrid links are required 135 PVID By default VLAN 1 is the PVID for all ports You can change the PVID for a port as required Use the following guidelines when you configure the PVID on a port e An access port can join only one VLAN The VLAN to which the access port belongs is the PVID of the port e A trunk or hybrid port can join multiple VLANs and you can configure a PVID for the port e You can use a nonexistent VLAN as the PVID for a hybrid or trunk port but not for an access port Atter you delete the VLAN that an access port resides in the PVID of the port changes to VLAN 1 However deleting the VLAN specified as the PVID of a trunk or hybrid port does not affect the PVID setting on the port e HP recommends that you set the same PVID for local and remote ports e Make sure a port permits its PVID Otherwise when the port receives frames tagged with the PVID or untagged frames the port drops these frames Frame handling methods
277. e CA publishes one or more CRLs to show all certificates that have been revoked The CRLs contain the serial numbers of all revoked certiticates and provide an effective way for checking the validity of certiticates A CA might publish multiple CRLs when the number of revoked certificates is so large that publishing them in a single CRL might degrade network pertormance CA policy A CA policy is a set of criteria that a CA follows in processing certificate requests issuing and revoking certiticates and publishing CRLs Usually a CA advertises its policy in the form of certification practice statement CPS A CA policy can be acquired through out of band means such as phone disk and email Because different CAs might use different methods to examine the binding of a public key with an entity make sure you understand the CA policy before selecting a trusted CA for certificate request PKI architecture A PKI system consists of entities a CA a registration authority RA and a PKI repository 384 Entity CA Figure 367 PKI architecture Entity PKI user PKI Issue a management authorities Issue a certificate CRL Aioysodal 740 0 An entity is an end user of PKI products or services such as a person an organization a device like a router or a switch or a process running on a computer A CA is a trusted authority responsible for issuing and managing digital certiticates A CA issues certiticates specities the v
278. e Diameter L Timertin centiseconds Forward Delay 400 3000 Must be a multiple of 100 Hello Time 100 1000 Must be a multiple of 100 Max Age 600 4000 Must be a multiple of 100 instance Instance ID Root Type Not Set Bridge Priority 32768 TC Protection Enable v TO Protection Threshold 1 255 default 6 Apply 204 Configuring link aggregation and LACP Overview Ethernet link aggregation bundles multiple physical Ethernet links into one logical link called an aggregate link Link aggregation has the following benetits e Increased bandwidth beyond the limits of any single link In an aggregate link traffic is distributed across the member ports e Improved link reliability The member ports dynamically back up one another When a member port fails its traffic is automatically switched to other member ports Basic concepts Aggregate interface An aggregate interface is a logical interface Aggregation group An aggregation group is a collection of Ethernet interfaces When you create an aggregate interface the switch automatically creates an aggregation group of the same number as the aggregate interface Aggregation states of the member ports in an aggregation group A member port in an aggregation group can be in either of the following states e Selected A Selected port can forward user traffic e Unselected An Unselected port cannot forward user traffic The po
279. e ID of the VLAN interface to be created Before creating a VLAN interface EE make sure the corresponding VLAN exists DHCP Configure the way in which the VLAN interface gets an IPv4 address BOOTP Allow the VLAN interface to get an IP address automatically by selecting the DHCP or BOOTP option Otherwise select the Manual option to manually assign the VLAN interface an IP address Peace tenn Conf Manual After a VLAN interface fails to get an IP address through DHCP are available p ei multiple times the device stops IP address application and configures after you pa the default IP address for the interface select the v Address IPv4 Configure an IPv4 address for the VLAN interface Sonlig Primary IPv4 Address This field is available after you select the Manual option Address box Set the subnet mask length or enter a mask in dotted decimal notation format Mask Length This field is available after you select the Manual option 151 ltem Descri ption Auto Configure the way in which the VLAN interface gets an IPv link local address Select the Auto or Manual option lies ii are available Configure N Auto The device automatically assigns a link local address to the fier you IPv Link Mamua VLAN interface based on the link local address prefix FE80 64 elect the lical and the link layer address of the VLAN interface Configure Address e Manual Reguires manual assignment IPv Link Local Bee Configure an IPv l
280. e SEE EG 966 How MLD snooping works EE EG 268 Protocols and ES ee ee 269 Recommended configuration procedure EE EE EE EE EE OE ER EE OE EE 269 Enabling MLD snooping globally EE EE EE oti EE EE EE EE EE 270 Configuring MLD snooping TERTE 270 Configuring MLD snooping port TERT neste este eeeeeeeeeesceuesceueseeeeseeeeseeueeeueseeueseeueseeueseeeeseeeeeeees 272 Displaying MLD snooping multicast forwarding TE 273 MLD snooping configuration example EE EE A 274 Network requirements AE E A EE EE E E E ENG 274 Configuration procedure EE EE EE ER ENA A EE EN 274 Verifying the configuration EE EE EE E E 277 Configuring IPv4 and IPv6 routing EE EA edi Res RE EE OE EA OE EE T IE 278 iy EE EE EE EE EE EE EI ER OE EE 978 Routing ld ee 278 Static FOUTE TE eens esses esses esas eens esse es eseeseseeeeseseeeeseseeeeseseseeseseeeesereeeesesees 278 BEEN EET nese neseeeneeeeeeeueseeueeeeees 279 Displaying the Pv4 active route table EE EE EE EE EE EE EE ER EE ER EE EE EE EE EE EE EE EE EE EE EER EE ee EER EE EE ER EE Re ER ee ee ee ee 279 Creating an IPV4 static GN Ee 280 Displaying the IPv6 active route table EE EE EE EE EE EE EER EE EE EE EE EE EE EE EE EER EE EE Ee EE EE EE ee EER EE EE ER EE Re Ee ee ee ee 281 Creating an IPVG Static oe 28 IPv4 static route configuration example EE OE EE EE EE EE 283 Network requirements EE EE EE EE EE OE EE ER EE EE E 283 Configuration TEREG ET eee eeeteeeeeteeeeeeeeeeeeeeeeeeeeeesceeeseeeeseeeeseeenseeeseeeeseeueeseu
281. e Table 107 when contiguring multiple security features on a port Table 107 Relationships of the 802 1X Auth Fail VLAN with other features Feature Relationship description MAC authentication guest VLAN on a port that performs MAC based access control The 802 1X Auth Fail VLAN has a high priority The 802 1X Auth Fail VLAN function has higher priority Port intrusion protection on a port that performs than the block MAC action but it has lower priority MAC based access control than the shutdown port action of the port intrusion protection feature 802 1X configuration examples MAC based 802 1X contiguration example Network requirements As shown in Figure 311 the access device performs 802 1X authentication for users that connect to port GigabitEthernet 1 0 1 Implement MAC based access control on the port so the logoff of one user does not affect other online 802 1X users Enable periodic re authentication of online users on the port so that the server can periodically update the authorization information of the users 336 Use RADIUS servers to perform authentication authorization and accounting for the 802 1X users If RADIUS accounting fails the access device logs the user off The RADIUS servers run CAMS or IMC Configure the host at 10 1 1 1 as the primary authentication and secondary accounting servers and the host at 10 1 1 2 as the secondary authentication and primary accounting servers Assign all users to the ISP d
282. e View tab The page in Figure 102 appears 3 Click the icon of the target view The Add rule for the view ViewDefault window appears 116 Figure 105 Adding rules to an SNMP view Add rule for the view ViewDefault Rule Included Excluded MIB Subtree OD Ka asserars Subtree wask a3 2Haxcchars tems marked with an asterisk are required Apply Cancel 4 Configure the parameters as described in Table 34 5 Click Apply NOTE You can also click the 4 icon corresponding to the specified view on the page as shown in Figure 102 and then you can enter the page to modify the view Contiguring an SNMP community 1 Select Device gt SNMP from the navigation tree 2 Click the Community tab The Community tab appears Figure 106 Configuring an SNMP community Setup Group User Trap View Bo Community Name v search Advanced Search F Community Mame oe MIB Vier AGL Operation C community Fead oniy VYiewDetault 2001 Ea i Add Delete Selected 3 Click Add The Add SNMP Community page appears 117 Figure 107 Creating an SNMP Community Setup Group User Trap View Add SHMP Community Community Name i Chars Access Right ACL ecooozag9 tems marked with an asterisk are required Apply Cancel Configure the SNMP community as described in Table 35 5 Click Apply Table 35 Configuration items ltem Description Community Name Set the SNMP community name Configure SNMP N
283. e change traps on the NMS 13 Displaying interface statistics The interface statistics module displays statistics about the packets received and sent through interfaces To display interface statistics select Device gt Interface Statistics from the navigation tree Figure 129 Interface statistics display page F Interface Name Search Advanced Search Last MI Interface Name InOctets InUcastPkts InNUcastPkts InDiscards InErrors InUnknownProtos OutOctets OutUcastPkts OutNUcastPkts OutDiscards OutErrors Er time GigabitEthernet1 0 1 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 2 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 3 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 4 99491 0 586 0 0 0 131906 0 1309 0 0 E GigabitEthernet1 0 5 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 6 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 7 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 8 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 9 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 10 0 0 0 0 0 0 0 0 0 0 0 F GigabitEthernet1 0 11 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 12 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 13 0 0 0 0 0 0 0 0 0 0 0 GigabitEthernet1 0 14 0 0 0 0 0 0 0 0 0 0 0 F GigabitEthernet1 0 15 25681 43 144 0 0 0 117705 47 1162 0 0 30 records 15 v per page page 1 2 record 1 15 Next Last 1 GO Reset Selected Reset All Table 39 describes the fields on the page Table 39 Field description Field
284. e contiguration BPDUs 196 Protection type Description Root Protection Loop Protection Enables the root guard function Configuration errors or attacks might result in configuration BPDUs with their priorities higher than that of a root bridge which causes a new root bridge to be elected and network topology change to occur The root guard function is used to address such a problem Enables the loop guard function By keeping receiving BPDUs from the upstream device a device can maintain the state of the root port and other blocked ports These BPDUs might get lost because of network congestion or unidirectional link failures The device will re elect a root port and blocked ports might transit to the forwarding state causing loops in the network The loop guard function is used to address such a problem Displaying MSTP information of a port From the navigation tree select Network gt MSTP 2 Click the Port Summary tab Select a port on the chassis front panel If you have configured aggregate interfaces on the device the page displays a list of aggregate intertaces below the chassis front panel You can select aggregate interfaces from this list The lower part of the page displays the MSTP information of the port in MSTI O when STP is enabled globally or the STP status and statistics when STP is not enabled globally the MSTI to which the port belongs and the path cost and priority of the port in the MST
285. e date fied To n specitie is in the MM DD YYYY format The end time must be greater ee than the start time Adding an Pv4 ACL Select QoS gt ACL IPv4 from the navigation tree 2 Click the Add tab Figure 446 Adding an IPv4 ACL Summary Basic Setup Advanced Setup Link Layer Setup Remove ACL Number Po 2000 2999 for basic ACLS 2000 3999 for advanced ACLs 4000 4999 for Ethernet frame header ACLS Match Order config v Description Gharartersil 127 Apply ACL Mumber Type Number of Rules Match Order Description 3 Add an IPv4 ACL as described in Table 138 A Click Apply 454 Table 138 Configuration items lem Description ACL Number Set the number of the IPv4 ACL Set the match order of the ACL Available values are e Config Packets are compared against ACL rules in the order that the rules are Match Order configured e Auto Packets are compared against ACL rules in the depth first match order Description Set the description for the ACL Contiguring a rule for a basic IPv4 ACL Select QoS gt ACL IPv4 from the navigation tree 2 Click the Basic Setup tab The rule configuration page for a basic IPv4 ACL appears Figure 447 Configuring a basic IPv4 ACL Summary And Advanced Setup Link Layer Setup Remove AcL Selectan ACL Configure a Basit ACL C Rule ID Oooo D 65534 fno ID is entered the system will specify one Action CI Check Fragment C Check Logging Time Range
286. e different priorities in different MSTls and the same port can Port Priority play different roles in different MSTIs so that data of different VLANs can be Auto Path propagated along different physical paths implementing per VLAN load balancing Cost and You can set port priority values based on the actual networking requirements Manual Path e Path cost A parameter related to the rate of a port On an MSTP enabled device a Cost port can have different path costs in different MSTIs Setting appropriate path costs allows VLAN traftic flows to be forwarded along different physical links achieving VLAN based load balancing The device can automatically calculate the default path cost Alternatively you can also manually configure path cost for ports e Point to Point Specifles whether the port is connected to a point to point link o Auto Configures the device to automatically detect whether or not the link type of the port is point to point o Force False The link type for the port is not point to point link o Force True The link type for the port is point to point link If a port is configured as connecting to a point to point link the setting takes effect on the port in all MSTIs If the physical link to which the port connects is not a point to point link and you force it to be a point to point link by configuration the configuration might incur a temporary loop Advanced e Transmit Limit Configures the maximum number
287. e ee ER ER ER Ee eng 137 Recommended configuration procedure for assigning a trunk port to a VLAN reer eers see ee ER ER ER ER ER ER ER Ee ee eng 137 Recommended configuration procedure for assigning a hybrid port to a VLAN eers ER ER ER ER ER ER ER ER Ee ee eng 138 Creating VLANS eerstes eeeeeR RR eeERRRROeERRRRReeERRRRROeERRRRROeERRRRReERRRRReeRRRRReeRRRRReeRRRRReeERRRRReERRR RR eERRRRReERRRRReERRRRReeRRR RR eeeRR Rees 139 Configuring the link type of a RUE EE EE Ee 140 Setting the PVID for a es EE EE 141 Selecting VLANs eerreeeeeee ees eRR RR eEERRRRgeeERRRReEERRRReEERRRReeERRRReeERRRRReeERRRRReeERRRRReeERRRRReeERRRRReERRRRRReERRRReeERRRRReeRRRRReeeRR RR eeeRR Rees 142 Modifying EDT EG 143 Moditying ee ee 144 VLAN configuration example EE oe 145 Network requirements reer eeeeeeR Re eseeR RR geERRR RR geERRRRRgeERRRRRgeERRRRReERRRRReeERRRReeERRRReeERRRRGeERRRRReERRRRReeRRRRReeRRRRReeeeeRR Re 145 Configuring SET ee 145 Configuring Switch NE ee 149 Configuration guidelines EE pw en le etna ee ven E E E EE E TAT 149 Configuring TES SR ee 150 AR RE ET ED OE RE EE 150 Creating a VLAN interface sreereeeree esse eeEER RR eeERRRRRgeERRR RR ERRRRReEERRRReERRRRReeERRRReeERRRRReeERRRReERRRRReERRRRReeRRRRReeRRR RR ee RR Rees 150 Moditying a VLAN interface ee 152 Configuration guidelines EE RE 155 Configuring a voice VLAN eeereeeseeseeeeseseeseeeeseseeseeeeceseeseeseeeecoseeseceesosseseeeeroseeseceereseeseceerosreseeseeeerceereseeseceeeoseeseeeereseese 156 OR E ME E
288. e interface Table 63 Class two configurations Type Considerations Whether a port has joined an isolation group and the isolation group to which the port belongs Permitted VLAN IDs port VLAN ID PVID link type trunk hybrid or access IP VLAN subnetbased VLAN configuration protocol based VLAN configuration and VLAN tagging mode Port isolation MAC address learning capability MAC address learning limit and forwarding of frames with unknown destination MAC addresses after the upper limit of the MAC address table is reached MAC address learning e Class one configurations Include settings that do not affect the aggregation state of the member port even if they are different from those on the aggregate interface For example MSTP can be contigured on aggregate interfaces and member ports However class one contigurations do not take effect in operational key calculation Any class two configuration change might affect the aggregation state of link aggregation member ports and running services To make sure you are aware of the risk the system displays a warning message every time you attempt to change a class two configuration setting on a member port Link aggregation modes Based on the link aggregation procedure link aggregation operates in one of the following modes e Static aggregation mode e Dynamic aggregation mode Static aggregation mode LACP is disabled on the member ports in a static aggr
289. e link type of the port as hybrid To configure a trunk port as a hybrid port first 2 Configuring the link type of a port contigure it as an access port If you configure multiple untagged VLANs for a trunk port at the same time the trunk port automatically becomes a hybrid port By default the link type of a port is access 138 Step Remarks Optional 3 Setting the PVID for a port Contigure the PVID of the hybrid port By default the PVID of a hybrid port is VLAN 1 4 Configure the hybrid port as an untagged member of the specified VLANs a Selecting VLANs Required Specify the range of VLANs available for selection during related operations Configure a subset of all existing VLANs This step is N A required before you perform operations on the c nliguremuliipl Detail Modify VLAN and Modify Port tabs untagged VLANs fora b Modifying a VLAN hybrid port Configure the hybrid port as an untagged member of the specified VLAN A hybrid port can have multiple untagged VLANs Repeat these steps to By default the untagged VLAN of a hybrid port is Configure the VLAN 1 5 Modifying ports untagged VLAN of the hybrid port 6 Configure the hybrid port as a tagged member of the specitied VLAN a Selecting VLANs Specify the range of VLANs available for selection during related operations Configure Required a subset of all existing VLANs This step is N A A hybrid port can have required before you
290. e navigation tree select Authentication gt Port Security The Port Security page appears In the Security Ports And Secure MAC Address List area click Secure MAC Address List The secure MAC address contiguration area displays the secure MAC addresses that have been learned or configured Figure 413 Secure MAC address list Secure MAC Address List RO Pot v Search Advanced Search Port MAC VLAN ID Operation GigabitEthernet1 0 3 001b 2188 85ff 100 il Add Del Selected Click Add The page for adding a secure MAC address appears Figure 414 Adding secure MAC address Add Secure MAC Address Port GigabitEthernet1 0 3 v Select a port with Port Security enabled Secure MAC 2 Address hiisi VLAN ID 1 4094 The VLAN ID should match the port Items marked with an asterisk are required Apply Cancel Configure a secure MAC address as described in Table 128 Click Apply 427 Table 130 Configuration items ltem Description Port Selects a port where the secure MAC address is configured Secure MAC Address Enters the MAC address that you want to configure as a secure MAC address TANTO Enters the ID of the VLAN in which the secure MAC address is configured The VLAN must already exist on the selected port Configuring advanced port security control 1 From the navigation tree select Authentication gt Port Security The Port Security page appears 2 In the Advanced Port Security Configuration area click
291. e on the progress dialog box when the dialog box prompts that the configuration succeeds 141 Figure 136 Modifying the PVID for a port Select VLAN Create Port Detail Detail Modify VLAN Remove Select Ports Select All Select None C Not avaliable for selection Select membership type Untagged Tagged E Not A Member Link Type PVID PVID E Delete Selected ports PVID GE1 0N GE1 0 3 Apply Cancel Selecting VLANs 1 From the navigation tree select Network gt VLAN The Select VLAN tab is displayed by default for you to select VLANs Figure 137 Selecting VLANs Create Port Detail Detail Modity WYLAN Modity Port Remove VLAN range display select an option to view all available VLANs ora subset of configured VLANs Display all vLAMNS Mote This option may reduce browser response time O Display a subset of all configured VLANs example 3 5 10 Select WYLAN Summary ID Description Untagged Membership Tagged Membkership 2 Select the Display all VLANs option to display all VLANs or select the Display a subnet of all configured VLANs option to enter the VLAN IDs to be displayed 3 Click Select 142 Modifying a VLAN From the navigation tree select Network gt VLAN 2 Click Modify VLAN to enter the page for modifying a VLAN Figure 138 Modifying a VLAN Select VLAN Create Port Detail Detail Modify Port Remove Please select a VLAN to modify Modify Description optio
292. e replaced with the calculated configuration BPDU e Then port CP2 receives the updated configuration BPDU of Device B 0 5 1 BP2 Because the received configuration BPDU is superior to its own configuration BPDU Device C launches a BPDU update process e CPI 0 0 0 AP2 e CP2 0 5 1 BP2 e At the same time port CP1 receives periodic configuration BPDUs from Device A Device C does not launch an update process after comparison After comparison e Because the root path cost of CP2 9 root path cost of the BPDU 5 plus path cost corresponding to CP2 4 is smaller than the root path cost of CP1 10 root path cost of the BPDU 0 path cost corresponding to CP2 10 the BPDU of CP2 is elected as the optimum BPDU and CP2 is elected Blocked port CP2 0 as the root port the messages of which will not be changed 0 0 AP2 e After comparison between the configuration BPDU of CP1 Root port CP2 0 5 and the calculated designated port configuration BPDU l BP2 port CP1 is blocked with the configuration BPDU of the port unchanged and the port will not receive data from Device A until a spanning tree calculation process is triggered by a new event for example the link from Device B to Device C going down After the comparison processes described in Table 56 a spanning tree with Device A as the root bridge is established and the topology is as shown in Figure 175 Figure 175 The final calculated
293. e same VLAN regardless of their physical locations VLAN technology delivers the following benefits e Confining broadcast traffic within individual VLANs This reduces bandwidth waste and improves network performance e Improving LAN security By assigning user groups to different VLANs you can isolate them at Layer 2 To enable communication between VLANs routers or Layer 3 switches are required e Flexible virtual workgroup creation As users from the same workgroup can be assigned to the same VLAN regardless of their physical locations network construction and maintenance is much easier and more flexible VLAN fundamentals To enable a network device to identify frames of different VLANs a VLAN tag field is inserted into the data link layer encapsulation The format of VLAN tagged frames is defined in IEEE 802 1 Q 1999 In the header of a traditional Ethernet data frame the field after the destination MAC address and the source MAC address is the Type field indicating the upper layer protocol type as shown in Figure 131 133 Figure 131 Traditional Ethernet frame format IEEE 802 1Q inserts a four byte VLAN tag after the DA amp SA field as shown in Figure 132 Figure 132 Position and format of VLAN tag VLAN Tag A VLAN tag comprises the following fields Tag protocol identifier TPID The 16 bit TPID field indicates whether the frame is VLAN tagged and is 0x8100 by default Priority The 3 bit priority
294. ecimal numbers and separated from its neighboring fields by colon Select the Destination IP Address box and enter a destination IPv address and prefix length The IPv address must be in a format like X X X X An Pv address consists of eight 16 bit long fields each of which is expressed with two hexadecimal numbers and separated from its neighboring fields by colon Select the protocol number If you select 58 ICMPv6 you can configure the ICMP message type and code If you select 6 TCP or 17 UDP you can configure the TCP or UDP specific items Specify the ICMPv message type and code These items are available only when you select 58 ICMPv 6 from the Protocol list If you select Other from the Named ICMPv6 Type list you need to enter values in the ICMPv6 Type and ICMPv Code fields Otherwise the two fields will take the default values which cannot be changed Select the operators and enter the source port numbers and destination port numbers as required These items are available only when you select 6 TCP or 17 UDP from the Protocol list Different operators have different configuration requirements for the port number fields e Not Check The following port number fields cannot be configured e Range The following port number fields must be configured to define a port range e Other values The first port number field must be configured and the second must not Only Not Check and Other va
295. ect 0 from the Prefix Length list and enter 5 2 for Next Hop d Click Apply 289 Figure 265 Configuring a default route Summary Remove Destination IF Address Prefix Length Preference sd 2858 Default Next Hop 5 Cl Interface tems marked with an asterisk are required Configured Static Route Information Prefix Destination IF Address Length Protocol Preference Fest Hop Interface Veritying the contiguration 1 Display the routing table Enter the IPv6 route page of Switch A Switch B and Switch C to verity that the newly configured static routes are displayed as active routes on the pages 2 Ping Host C trom Switch A lt SwitchA gt ping ipv6 3 2 PING 3 2 56 data bytes press CTRL_C to break Reply from 3 2 bytes 56 Sequence 1 hop limit 254 time 63 ms Reply from 3 2 bytes 56 Sequence 2 hop limit 254 time 62 ms Reply from 3 2 bytes 56 Sequence 3 hop limit 254 time 62 ms Reply from 3 2 bytes 56 Sequence 4 hop limit 254 time 63 ms Reply from 3 2 bytes 56 Segquence 5 hop limit 254 time 63 ms sa 3322 ping statistics 5 packet s transmitted 5 packet s received 0 00 packet loss 290 round trip min avg max 62 62 63 ms Contiguration guidelines When you configure a static route follow these guidelines If you do not specify the preference the default preference will be used Reconfiguration of the default preference applies only to newly created static routes The Web in
296. ections When the limit is reached you cannot log in to the Web interface Web browser requirements HP recommends that you use the following Web browsers o Internet Explorer 6 SP2 or higher o Mozilla Firefox 3 or higher o Google Chrome 2 0 174 0 or higher If you are using a Microsoft Internet Explorer browser you must enable the security settings see Enabling securing settings in a Microsoft Internet Explorer browser including Run ActiveX controls and plug ins Script ActiveX controls marked safe for scripting and Active scripting If you are using a Mozilla Firefox browser you must enable JavaScript see Enabling JavaScript in o Firefox browserEnabling JavaScript in a Firefox browser Enabling securing settings in a Microsoft Internet Explorer browser 1 Z Launch the Internet Explorer and select Tools gt Internet Options from the main menu Select the Security tab and select the content zone where the target Website resides as shown in Figure 1 Figure 1 Internet Explorer settings 1 Internet Options Local intranet Trusted sites Restricted sites Internet This zone contains all Web sites you haven t placed in other zones Security level for this zone Custom Custom settings To change the settings click Custom Level To use the recommended settings click Default Level Custom Level Default Level 3 Click Custom Level 4 Inthe Security Settings dialog box enable Run ActiveX c
297. ed leaf nodes The root bridge is not permanent but can change with changes of the network topology Upon initialization of a network each device generates and periodically sends configuration BPDUs with itself as the root bridge After network convergence only the root bridge generates and periodically sends configuration BPDUs The other devices only forward the BPDUs Root port On a non root bridge the port nearest to the root bridge is the root port The root port communicates with the root bridge Each non root bridge has only one root port The root bridge has no root port Designated bridge and designated port Classification _ Designated bridge Designated port Device directly connected with the local For a device device and responsible for forwarding Ed De wade LES oe oe localdeavice forwards BPDUs to the local device Device responsible for forwarding BPDUs to Port through which the designated bridge For a LAN this LAN segment forwards BPDUs to this LAN segment As shown in Figure 1 3 Device B and Device C are connected to the LAN AP1 and AP2 BP1 and BP2 and CP1 and CP2 are ports on Device A Device B and Device C respectively e If Device A forwards BPDUs to Device B through AP1 the designated bridge for Device B is Device A and the designated port of Device B is port AP1 on Device A e If Device B forwards BPDUs to the LAN the designated bridge for the LAN is Device B and the designated port for the LAN
298. ed the command not only assigns an IPv address to the interface but also specifies a default route for the device Description Use ipsetup ipv6 auto to enable the stateless address autocontiguration function so a global unicast address and link local address can be automatically generated Use ipsetup ipv address ipv address prefix length ipv6 address prefix length default gateway ipv6 address to manually assign an IPv6 address to VLAN interface 1 Examples Create VLAN interface 1 and enable VLAN interface 1 to automatically generate a global unicast IPv address and link local address lt Sysname gt ipsetup ipv6 auto Create VLAN interface 1 and assign 2001 2 to the interface with the pretix length 64 and specify 2001 1 as the default gateway lt Sysname gt ipsetup ipv address 2001 2 64 default gateway 2001 1 password Syntax password Parameters None Description Use password to modity the login password of a user Examples Modify the login password of user admin lt Sysname gt password 26 Change password for user admin Old password Enter new password Retype password The password has been successfully changed ping Syntax ping host Parameters host Destination IPv4 address in dotted decimal notation or host name a string of 1 to 255 characters Description Use ping to ping a specitied destination To terminate a ping operation press Ctrl C Example
299. ed in Table 159 4 Click Apply 485 Table 159 Configuration items ltem Description Enable or disable the WRR queue scheduling mechanism on selected ports The following options are available WRR e Enable Enables WRR on selected ports e Not Set Restores the default queuing algorithm on selected ports Select the queue to be configured Queue The value range for a queue ID is O to 7 WRR Slup Specify the group the current queue is to be assigned to This list is available after you select a queue ID The following groups are available Group for selection e SP Assigns a queue to the SP group e 1 Assigns a queue to WRR group I Set a weight for the current queue Weight This list is available when group 1 is selected Please select port s Click to select ports to be configured with queuing on the chassis front panel Configuring rate limit on a port Select QoS gt Line rate from the navigation tree 2 Click the Setup tab to enter the rate limit configuration page Figure 472 Configuring rate limit on a port Summary Please select an interface type GigabitEthernet L2 Rate Limit Enable v Direction Inbound hd CIR kbps 16 1000000 it must be a multiple of 16 CBS EBS Please select port s GigabitEthernet1 0 1 a GigabitEthernet1 0 2 GigabitEthernet1 0 3 GigabitEthernet1 0 4 GigabitEthernet1 0 5 GigabitEthernet1 0 6 GigabitEthernet1 0 7 GigabitEthernet1 0 8 GigabitEthernet1 0
300. ed network Interface segment are sent out of the interface Creating an Pv6 static route 1 Select Network gt IPv6 Routing from the navigation tree 2 Click the Create tab 281 The page for configuring an IPv static route appears Figure 257 Creating an Pv static route Summar Remove dee EE Address Prefix Length 64 _ Preference ee 1 255 Default 60 tems marked with an asterisk are required Apply Configured Static Route Information Prefix Destination IP Address Length Protocol Preference Mext Hop Interface 3 Create an IPv static route as described in Table 93 4 Click Apply Table 93 Configuration items ltem Description Enter the destination host or network IP address in the X X X X format The 1 28 bit destination IPv6 address is a hexadecimal address with eight parts separated by colons Each part is represented by a 4 digit hexadecimal integer Destination IP Address Prefix Length Enter or select the prefix length of the destination IPv address Set a preference value for the static route The smaller the number the higher the preference Preference For example specifying the same preference for multiple static routes to the same destination enables load sharing on the routes Specifying different priorities for them enables route backup Next Hop Enter the next hop address in the same format as the destination IP address Select the output interface Interface Y
301. edure Step Remarks Required 1 Configuring 802 1X globally This function enables 802 1X authentication globally It also configures the authentication method and advanced parameters By default 802 1X authentication is disabled globally Required This function enables 802 1X authentication on the specitied port and configures 802 1X parameters for the port By default 802 1X authentication is disabled on a port 2 Configuring 802 1X on a port Contiguring 802 1X globally 1 From the navigation tree select Authentication gt 802 1X The 802 1X page appears Figure 308 Configuring 802 1X 802 1X Configuration Enable 802 1X Authentication Method CHAP v wAdvanced Quiet _ Enable the Quiet Function Quiet Period 60 seconds 10 120 Default 60 Retry Times 2 1 10 Default 2 TX Period 30 seconds 10 120 Default 30 Handshake Period 15 seconds 5 1024 Default 15 Re Authentication Period 3600seconds 60 7200 Default 3600 Supplicant Timeout Time 30 seconds 1 120 Default 30 Server Timeout Time 100 seconds 100 300 Default 100 Apply Ports With 802 1X Enabled RE TE Re Max Number et VI AN Auth Fail Port Port Port Control Handshake ME EE GE Guest VLAN VLAN AR Ee G Operation GigabitEthernet1 0 3 MAC Based Enabled Disabled 256 Disabled Disabled Auto A i Add Del Selected In the 802 1X Configuration area select Enable 802 1X Select an authentication method from the Authentication Method
302. ee 189 Protocols and ES ee ee 190 Configuration guidelines E EE E T 190 Recommended MSTP configuration procedure EEEE T 190 Configuring an MST region EE AE N 19 Configuring MSTP globally RE EO A EO EDEN 192 Configuring MSTP on a port EL EE E E 195 Displaying MSTP information of a port EE AA AE AA EE ME EE EE 197 MSTP configuration example EE EO EO EE OE santas 199 Network requirements ARE AE EE OE EE tees 199 Configuration procedure EE EE ER EE 200 Configuring link aggregation EET EE 205 Cy EE ER EE AE IE N EE 205 Basic concepts EE RE N ER EE 205 Link aggregation EE EE EEO OEE OREO eee eee e terre reer reerreerreerr eer tere eetr reer r eer reerretrreerreerreerreerreeere 206 Configuration procedures EE EER SEE EAE E EE OR EER 208 Configuring a static aggregation Tee EE 208 Configuring a dynamic aggregation Tee EE 208 Creating a link aggregation ehe Uo cue ee ee a ee 208 Displaying aggregate Interface informat tijon eeeeeeeeeeeeeeeeeeeeeesereseereeesereseeeseesecesereseeeseesecesereseeeseesecosereseeeseeseeseeesee 209 Setting LACP priority RR EE OE EE 211 Displaying LACP enabled port DUET RT eer Sr err rere rere reerrreerrceerrreerreeerrreerree 211 Link aggregation and LACP configuration example EE EE EE EE 213 Configuration guidelines ER E EE E AO N 215 Configuring LLDP EE EE EE E E NE T L E E A E E E E T T deeded 21 7 OVE ER RE EE ee a E 217 Basic concepts EER ER ES EES EES ESSE ESSESSESSESSESSESSESSESESEOSSESESOSOSSOSSOSSOSSSEESOSEESSESSOSOSSOOS
303. eferentially by SP When the SP scheduling group is empty the other queues are scheduled by WRR Rate limit Rate limit is a traffic control method using token buckets The rate limit of a physical interface specities the maximum rate for forwarding packets including critical packets Rate limit can limit all the packets passing a physical intertace Traffic evaluation and token bucket A token bucket can be considered as a container holding a certain number of tokens The system puts tokens into the bucket at a set rate When the token bucket is full the extra tokens will overflow Figure 460 Evaluate traffic with the token bucket Put tokens in the bucket at the set rate Packets sent through this port il Continue to send The evaluation for the traffic specification is based on whether the number of tokens in the bucket can meet the need of packet forwarding If the number of tokens in the bucket is enough to forward the packets usually one token is associated with a 1 bit forwarding authority the traffic conforms to the 473 specification and the traffic is called conforming traffic Otherwise the traffic does not conform to the specitication and the trattic is called excess traffic A token bucket has the following configurable parameters e Mean rate Rate at which tokens are put into the bucket or the permitted average rate of traffic It is usually set to the committed information rate CIR e Bur
304. egation group In a static aggregation group the system sets the aggregation state of each member port according to the following rules 1 Chooses a reference port from the member ports that are in up state and with the same class two configurations as the aggregate interface The candidate ports are sorted in the following order o Full duplex high speed o Full duplex low speed o Half duplex high speed o Halt duplex low speed If two ports have the same duplex mode speed pair the one with the lower port number is chosen 2 Places the ports in up state with the same port attributes and class two configurations as the reference port in the Selected state and place all others in the Unselected state 3 The number of Selected ports is limited in a static aggregation group When the number of the Selected ports is under the limit all the member ports become Selected ports When the limit is 206 exceeded places the ports with smaller port numbers in the Selected state and those with greater port numbers in the Unselected state Places the member ports in the Unselected state if all the member ports are down 5 Places the ports that cannot aggregate with the reference port in the Unselected state for example as a result of the inter board aggregation restriction After a static aggregation group has reached the limit on Selected ports any port that joins the group is placed in the Unselected state to avoid traffic interruption on
305. elect this option you must enter a percentage in the box below Broadcast e pps Sets the maximum number of broadcast packets that can be forwarded on an Suppression Ethernet port per second When you select this option you must enter a number in the box below e kbps Sets the maximum number of kilobits of broadcast traffic that can be forwarded on an Ethernet port per second When you select this option you must enter a number in the box below Set multicast suppression on the port e ratio Sets the maximum percentage of multicast traffic to the total bandwidth of an Ethernet port When you select this option you must enter a percentage in the box below Multicast e pps Sets the maximum number of multicast packets that can be forwarded on an Suppression Ethernet port per second When you select this option you must enter a number in the box below e kbps Sets the maximum number of kilobits of multicast traffic that can be forwarded on an Ethernet port per second When you select this option you must enter a number in the box below 72 ltem Descri ption Set unicast suppression on the port e ratio Sets the maximum percentage of unicast traffic to the total bandwidth of an Ethernet port When you select this option you must enter a percentage in the box below Unicast e pps Sets the maximum number of unicast packets that can be forwarded on an Suppression Ethernet port per second When you select this optio
306. ely Protocols and standards e IEEE 802 1AB 2005 Station and Media Access Control Connectivity Discovery e ANSI TIA 1057 Link Layer Discovery Protocol for Media Endpoint Devices Recommended LLDP configuration procedure Step Remarks Optional 1 Enabling LLDP on ports 2 Setting LLDP parameters on ports 3 Configuring LLDP globally 4 Displaying LLDP information for a port By default LLDP is enabled on ports Make sure LLDP is also enabled globally because LLDP can work on a port only when it is enabled both globally and on the port Optional LLDP settings include LLDP operating mode packet encapsulation CDP compatibility device information polling trapping and advertisable TLVs By default The LLDP operating mode is TxRx The encapsulation format is Ethernet Il CDP compatibility is disabled Device information polling and trapping are disabled All TL Vs except the Location Identification TLV are advertised Required By default global LLDP is disabled To enable LLDP to work on a port enable LLDP both globally and on the port Optional You can display the local LLDP information neighbor information statistics and status information of a port where The local LLDP information refers to the TLVs to be advertised by the local device to neighbors The neighbor information refers to the TLVs received from neighbors 222 Step Remarks 5 Displaying global LLDP O
307. empts fail the device discards the request Enable or disable the accounting on feature The accounting on feature enables a device to send accounting on packets to RADIUS servers after it reboots making the servers forcedly log out users who logged in through the device before the reboot IMPORTANT When enabling the accounting on feature on a device for the first time you must save the configuration so that the feature takes effect after the device reboots Send accounting on packets Set the interval for sending accounting on packets This field is contigurable A ting On Interval i ER EE OG only after you select the Send accounting on packets box Set the maximum number of accounting on packets transmission attempts Accounting On Attempts This field is configurable only after you select the Send accounting on packets box Attribute Enable or disable the device to interpret the RADIUS class attribute as CAR Interpretation parameters Adding RADIUS servers 1 In the RADIUS Server Configuration area click Add Figure 353 RADIUS server configuration page Add RADIUS Server Server Type Primary Authenticatio IP Address IPv4 IPv6 Part 1 65535 Default 1812 Key 1 64 Chars Confirm Key 1 64 Chars Apply Cancel 2 Configure the parameters as described in Table 116 3 Click Apply a a Table 116 Configuration items ltem Descri ption Select the type of the RADIUS server to be configured
308. enste 364 RADIUS packet format eeeeeeeeeereeereeesereseereereresereseeeseeseeesereseeeseeseeesereseeeseesseoseesereseeeseessresereseeeseeosereseceseeeseesereseeeseee 365 Extended RADIUS attributes sesse sees sees ss ese see ee EER EER EER EER EER ERA ERA ERA EER ERA ERA ERA RA EER EER ERA Ee Ee ee 367 EER and DE ER OE EE EE N EE E 368 Configuring a TONE HEEL EE EE EE 368 Configuring COMMON parameters eeeeeeeeeeererrereereereereereereereereereereereereereereereereereereereereereereereteerereeseeereereereereereereet 369 Adding RADIUS servers teer sees sesse esse eek eek geRgee gee Re EER GER GER gee ee RGeR GER gee REEKSE R GER gee EER GeR GER gee ek ee eER Gee ee GeR gek gee ee ee Rea keerd 373 RADIUS configuration example ER E 374 Configuration guidelines RE EE OD 378 Contiguring TT EE EE Ee ee 380 Contiguring EET ee 380 Configuring ETE EE EG 389 Managing Te ee 384 A EE RE EE N 384 AE AR RE EE ER ED 384 PKI Architecture OE esas esse esse nseueseeeseeaneeaneeeeeeuens 384 TERE EE EE EA AE AE HA AO IR ER 385 PKI applications E A E E Ge Ge Ge Ge EEEE TE ETE EE E E de de Ge T 386 Recommended configuration procedures EE TR ets tories dae rena vey eet epee aalem 386 Recommended configuration procedure for manual redes eer 386 Recommended configuration procedure for automatic request EE EE ested N ER 388 Creating a PKI entity EE EE EE EE EE 388 Creating a EES SS EE EE EE EE EG 300 Generating an RSA key EE EE EE EG 393 Destroying the RSA key
309. ent excessive traps from being sent when topology is instable Set initialization delay for LLDP enabled ports Each time the LLDP operating mode of a port changes its LLDP protocol state machine reinitializes A configurable reinitialization delay prevents frequent initializations caused by frequent changes to the operating mode If you contigure the reinitialization delay a port must wait the specified amount of time to initialize LLDP after the LLDP operating mode changes Reinit Delay Set LLDP frame transmission delay With LLDP enabled a port advertises LLDP frames to its neighbors both periodically and when the local configuration changes To avoid excessive number of LLDP frames caused by frequent local configuration changes an Tx Delay LLDP frame transmission delay is introduced After sending an LLDP frame the port must wait for the specified interval before it can send another one LLDP frame transmission delay must be less than the TTL to make sure the LLDP neighbors can receive LLDP frames to update information about the device you are configuring before it is aged out Set the LLDP frame transmission interval If the product of the TTL multiplier and the LLDP frame transmission interval is greater than 65535 the TTL carried in transmitted LLDP frames takes 65535 seconds The likelihood exists that the LLDP frame transmission interval is greater than TTL You should avoid the situation because the LLDP neighbors will f
310. equired Apply Cancel Enable SNMP traps a Click the Trap tab The Trap tab page appears b Select Enable SNMP Trap c Click Apply 125 Figure 119 Enabling SNMP traps Setup Community Group ser WIE 7 Enable SNMP Trap Apply Trap Target Host Destination IP Address v Search Advanced Search Destination IP UDP Security security l d ae IPA PA Domain Security Mame oe e LN Operation Add Delete Selected 5 Configure a target host SNMP traps a Click Add on the Trap tab page The page for adding a target host of SNMP traps appears b Select the IPv4 Domain option and type 1 1 1 2 in the following field type public in the Security Name field and select v1 from the Security Model list c Click Apply Figure 120 Adding a trap target host Setup Community Group User WE Add Trap Target Host Destination IP Address PydiDomain IPv 1 1 1 2 1 256Chars Security Name public C1 32Chars UDF For 162 0 65535 Default 162 Security Model Y w Security Level tems marked with an asterisk are required Apply Cancel Configuring the NMS The configuration on the NMS must be consistent with that on the agent Otherwise you cannot perform corresponding operations To contigure the NMS 1 Configure the SNMP version for the NMS as v1 or v2c 2 Create a read only community and name it public 3 Create a read and write community and name it private 126 For information about
311. er is overloaded and a PSE power management priority policy is enabled the PSE that has a lower priority is first disconnected to guarantee the power supply to a new PSE that has a higher priority e The guaranteed remaining PoE power is the maximum PoE power minus the power allocated to the critical PSE regardless of whether PoE is enabled for the PSE If this is lower than the maximum power of the PSE you cannot set the power priority of the PSE to critical Otherwise you can set the power priority to critical and this PSE preempts the power of the PSE that has a lower priority level In this case the PSE whose power is preempted is disconnected but its configuration remains unchanged If you change the priority of the PSE from Power Priority critical to a lower level other PSEs have an opportunity to be powered By default the power priority of a PoE port is low IMPORTANT e A guard band of 20 watts is reserved for each PoE interface on the device to prevent a PD from being powering off because of a sudden increase of power If the remaining power of the PSE is lower than 20 watts the PoE interface with higher priority can preempt the power of a PoE interface with lower priority to supply power to a new PD In this way you can ensure normal operation of the PoE interface with higher priority If the power of the PoE interface with lower priority is lower than 20 watts for the PoE interface to operate correctly it supplies power a
312. er page and view the contents on the first previous next and last pages or go to any page that you want to check Figure 7 Content display by pages R Port Name v Search Advanced Search Port Name LLDP Status LLDP Work Mode Operation F GigabitEthernet1 0 1 Enabled TXRX A GigabitEthernet1 0 2 Enabled TXRX A GigabitEthernet1 0 3 Enabled TxRx A GigabitEthernet1 0 4 Enabled Tx A M GigabitEthernet1 0 5 Enabled TXRX A F GigabitEthernet1 0 6 Disabled Rx A F GigabitEthernet1 0 7 Disabled TxRx Ee GigabitEthernet1 0 8 Disabled TxRx A GigabitEthernet1 0 9 Disabled TXRX A IT GigabitEthernet1 0 10 Enabled Rx A F GigabitEthernet1 0 11 Enabled TXRX A F GigabitEthernet1 0 12 Enabled TXRX A F GigabitEthernet1 0 13 Disabled Tx A GigabitEthernet1 0 14 Enabled Tx En GigabitEthernet1 0 15 Disabled TXRX A 28 records 15 v per page page 1 2 record 1 15 Next Last 1 GO Search function The Web interface provides you with the basic and advanced searching functions to display only the entries that match specific searching criteria e Basicsearch As shown in Figure 7 type the keyword in the text box above the list select a search item from the list and click Search to display the entries that match the criteria Figure 8 shows an example of searching for entries with LLDP disabled Figure 8 Basic search function example Disabled LLDP Status v Search A
313. er to the client e options Optional parameters field that is variable in length which includes the message type lease duration subnet mask domain name server IP address and WINS IP address 294 DHCP options DHCP defines the message format as an extension to BOOTP for compatibility DHCP uses the Option field to carry information for dynamic address allocation and to provide additional configuration information to clients Figure 269 DHCP option format 0 7 15 Option type Option length Value variable Common DHCP options The following are common DHCP options Option 3 Router option It specifies the gateway address Option 6 DNS server option It specities the DNS server s IP address Option 33 Static route option It specifies a list of classful static routes the destination addresses in these static routes are classful that a client should add into its routing table If both Option 33 and Option 121 exist Option 33 is ignored Option 51 IP address lease option Option 53 DHCP message type option It identifies the type of the DHCP message Option 55 Parameter request list option It is used by a DHCP client to request specitied contiguration parameters The option includes values that correspond to the parameters requested by the client Option 60 Vendor class identifier option It is used by a DHCP client to identity its vendor and by a DHCP server to distinguish DHCP clients by vendor
314. erational key Ethernet link aggregation 205 optimal FIB table optimal routes 278 option DHCP field 295 Option 121 DHCP 295 Option 150 DHCP 295 Option 3 DHCP Option 003 DHCP 295 Option 33 DHCP Option 033 DHCP 295 Option 51 DHCP Option 051 DHCP 295 Option 53 DHCP Option 053 DHCP 295 Option 55 DHCP Option 055 DHCP 295 Option 6 DHCP Option 006 DHCP 295 Option 60 DHCP Option 060 DHCP 295 Option 66 DHCP Option 066 DHCP 295 Option 67 DHCP Option 067 DHCP 295 Option 82 DHCP Option 082 DHCP relay agent 295 snooping support 308 organization specific LLDPDU TLV types 218 outbound NMM port mirroring 79 outbound restriction port security feature 421 P packet AAA RADIUS packet exchange process 364 AAA RADIUS packet format 365 ACL fragment filtering 452 ACL packet fragment filtering 452 gratuitous ARP packet learning 244 IP routing configuration IPv4 278 IP routing configuration IPv6 278 NMM port mirroring configuration 79 QoS policy configuration 466 QoS priority mapping 4 4 QoS traffic evaluation 473 QoS traffic mirroring configuration 481 QoS traffic redirecting configuration 481 security 802 1X EAP format 322 security 802 1X EAPOL format 323 security 802 1X format 322 security ARP packet validity check 250 STP BPDU protocol packets 177 STP TCN BPDU protocol packets 177 packet filtering ACL configuration 450 ACL configuration Ethernet fr
315. ers the packet and broadcasts an ARP request The payload of the ARP request contains the following information o Sender IP address and sender MAC address Host A s IP address and MAC address o Target IP address Host B s IP address o Target MAC address An allzero MAC address All hosts on this subnet can receive the broadcast request but only the requested host Host B processes the request 3 Host B compares its own IP address with the target IP address in the ARP request If they are the same Host B a Adds the sender IP address and sender MAC address into its ARP table b Encapsulates its MAC address into an ARP reply c Unicasts the ARP reply to Host A 4 After receiving the ARP reply Host A a Adds the MAC address of Host B into its ARP table b Encapsulates the MAC address into the packet and sends the packet to Host B Figure 217 ARP address resolution process Host A Host B 192 168 1 1 192 168 1 2 0002 67 79 Of4c 00a0 2470 febd Sender MAC Sender IP Target MAC Target IP address address address address 0002 6779 0f4c 192 168 1 1 0000 0000 0000 192 168 1 2 If Host A and Host B are on different subnets Host A sends a packet to Host B as follows 1 Host A broadcasts an ARP request to the gateway The target IP address in the ARP request is the IP address of the gateway The gateway responds with its MAC address in an ARP reply to Host A Host A uses the gateway s MAC address to encapsulate
316. ervices such as tele education telemedicine video telephone videoconference and Video on Demand VoD Enterprise users expect to connect their regional branches together with VPN technologies to carry out operational applications for instance to access the database of the company or to monitor remote devices through Telnet These new applications all have special requirements for bandwidth delay and jitter For example videoconference and VoD require high bandwidth low delay and jitter As for mission critical applications such as transactions and Telnet they might not require high bandwidth but do require low delay and preferential service during congestion The emerging applications demand higher service performance of IP networks Better network services during packets forwarding are required such as providing dedicated bandwidth reducing packet loss ratio managing and avoiding congestion and regulating network traffic To meet these requirements networks must provide more improved services 466 Congestion causes impacts and countermeasures Network congestion is a major factor contributed to service quality degrading on a traditional network Congestion is a situation where the forwarding rate decreases due to insufficient resources resulting in extra delay Causes Congestion easily occurs in complex packet switching circumstances in the Internet Figure 453 shows two common cases Figure 453 Traffic congestion cause
317. es Key 1 Set NTP authentication key Key 2 Enable the NTP authentication feature for a system running NTP in a network that requires high security This feature improves the network security by means of client server key authentication and prohibits a client from synchronizing with a device that has failed authentication You can set two authentication keys each of which has a key ID and a key string e ID ID of a key e Key string Character string of the MD5 authentication key External NTP Server Specify the IP address of an NTP server and configure the Reference 1 Reference authentication key ID used for the association with the NTP server The Source Key ID device synchronizes its time to the NTP server only if the key provided NTP Server by the server is the same as the specified key 2 Reference You can configure two NTP servers The clients choose the optimal Key ID reference source IMPORTANT The IP address of an NTP server is a unicast address and cannot be a broadcast or a multicast address or the IP address of the local clock source System time configuration example Network requirements As shown in Figure 48 e The local clock of Device A is set as the reference clock e SwitchB operates in client mode and uses Device A as the NTP server Configure NTP authentication on Device A and Switch B so that Switch B is to be synchronized to Device A 58 Figure 48 Network diagram 23 Sah 1 0
318. es Disable GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 from forwarding DHCP server responses e Configure Switch B to record clients IP to MAC address bindings in DHCP REQUEST messages and DHCP ACK messages received from a trusted port Figure 288 Network diagram Switch A DHCP server GE1 0 1 Switch B DHCP snooping GE1 0 3 DHCP client DHCP client Configuring Switch B 1 Enable DHCP snooping a From the navigation tree select Network gt DHCP b Click the DHCP Snooping tab c As shown in Figure 289 select the Enable option next to DHCP Snooping to enable DHCP snooping 311 Figure 289 Enabling DHCP snooping DHCP Relay DHCP Snooping Enable Disable Interface Config RO Interface Name Search Advanced Search Interface Name Interface State GigabitEthernet1 0 1 Untrust GigabitEthernet1 0 2 Untrust GigabitEthernet1 0 3 Untrust GigabitEthernet1 0 4 Untrust GigabitEthernet1 0 5 Untrust GigabitEthernet1 0 6 Untrust GigabitEthernet1 0 7 Untrust GigabitEthernet1 0 8 Untrust GigabitEthernet1 0 9 Untrust GigabitEthernet1 0 10 Untrust GigabitEthernet1 0 11 Untrust GigabitEthernet1 0 12 Untrust GigabitEthernet1 0 13 Untrust GigabitEthernet1 0 14 Untrust GigabitEthernet1 0 15 Untrust 28 records 15 v per page page 1 2 record 1 15 First Prey Next Last 1 Contigure DHCP snooping functions on GigabitEthernet 1 0 1 a Click the icon of GigabitEthernet 1 0 1 on the intertace list b Select the Trust
319. es of a MAC address change Gratuitous ARP packet learning This feature enables a device to create or update ARP entries by using the sender IP and MAC addresses in received gratuitous ARP packets When this feature is disabled the device uses the received gratuitous ARP packets to update existing ARP entries only Contiguring ARP entries Displaying ARP entries From the navigation tree select Network gt ARP Management The default ARP Table page appears as shown in Figure 218 This page displays all ARP entries Figure 218 ARP Table configuration page Gratuitous ARP k IP Address Search Advanced Search IP Address MAC Address VLAN ID Port Type Operation 192 168 1217 6431 5045 d29e 1 GigabitEthermett 0 15 Dynamic il 192 168 1 27 001b 2188 86ff 1 GigabitEthernett o 24 Dynamic il Add Del Selected Delete Static and Dynamic Delete Static Delete Dynamic Refresh 244 Creating a static ARP entry 1 From the navigation tree select Network gt ARP Management The detault ARP Table page appears as shown in Figure 218 2 Click Add The New Static ARP Entry page appears Figure 219 Add a static ARP entry Gratuitous ARP Mew Static ARP Entry IP Address MAC Address Example 0010 dce28 a4e9 F Advanced Options VLAN ID 1 4094 Fort tems marked with an asterisk are required Apply Hack 3 Configure the static ARP entry as described in Table 80 4 Click Apply Table 80 Configuration items ltem
320. es user information for the server to authenticate the user It must contain the User Name attribute and can optionally contain the attributes of NAS IP Address User Password and NAS Port Access Request From the server to the client If all attribute values carried in the Access Accept Access Request are acceptable the authentication succeeds and the server sends an Access Accept response From the server to the client If any attribute value carried in the Access Reject Access Request is unacceptable the authentication fails and the server sends an Access Reject response From the client to the server A packet of this type carries user information for the server to start or stop accounting for the user The Acct Status Type attribute in the packet indicates whether to start or stop accounting Accounting Request From the server to the client The server sends a packet of this type to Accounting Response notify the client that it has received the Accounting Request and has successtully recorded the accounting information The Identifier field 1 byte long is used to match request packets and response packets and to detect duplicate request packets Request and response packets of the same type have the same identifier 365 The Length field 2 bytes long indicates the length of the entire packet including the Code Identifier Length Authenticator and Attribute fields Bytes beyond this length are considered padding a
321. esesuesseueeeeueseeueeeeueneeweseeuenes 283 Configuration procedure EE RA EE EE aa 283 Verifying the configuration TR ER EE EE ER EA E Aanes moun and aaa Hasan ManDEpas na manUaaEeMApEMeaeNsamubEpHaREREER 286 IPv6 static route configuration example EE EE TETTETETT 287 Network requirements EE EE RE EE ER EE A seas 287 Configuration TEREG ET cette eeeeeeteeeeeeeeeeeeeeeeaeeeeeesceeeseeeeseeeeeseeeeseeseeueseeueseeueseeeeseeuenseueeseueseeueseeweeeeuenes 287 Configuration procedure RE EE RE EE e RASAS 287 Verifying the configuration EE HE EE 290 Configuration guidelines E E E EE ER EE 29 DHCP oer ie rin eeraa AEAEE Ge Den Kan a aiie aA DE aa a as 297 DACP addr aca ona E E E E EN E EE TE E A 209 Allocation mechanisms EE EE EE EE EE EE EE EE EER EE EE EE EE EE EE EE EE EE EE EE EE EER EE EE ER EE EE EE Ee Ee EE EER EE Ee EE EE EE EE ER ER Ee EE ee ee 292 IP address allocation process s sssssssssssssssssesssssessssseessssescsssecssnsecssssecesssecsssscssssscessnsecssasessascssasscssnnseessnneessnees 993 DEE ELE N LAER ER RO EE 993 DHCP message ETE ee ee ee 204 DHCP el EE EE EE EE Ie 205 Common DHCP options trees eek seeks eeR eek GeR EER GER EER GER ERGER ER ROER ee ROER ee R GER ER ReER GER Rae R Gee Rae R gee ReERReeRGeR ee R Gee ee Re RR ee Reen 995 ok EE EE 995 Protocols and standards eeeeeeeeeeseeeeeseeseeseeeeeeeeeseseeseeseeseesseseesseeseeseeseoseeseoseosrosressesseseesroseesresressresresresresrosreseesreseessesseesees 296 Contiguring DHC
322. ess and is often used in network environments that require both high security and remote user access For more information about AAA see Configuring AAA RADIUS uses UDP port 1812 for authentication and UDP port 1813 for accounting RADIUS was originally designed for dial in user access With the addition of new access methods RADIUS has been extended to support additional access methods including Ethernet and ADSL RADIUS provides access authentication authorization and accounting services The accounting function collects and records network resource usage information Client server model RADIUS clients run on NASs located throughout the network NASs pass user information to RADIUS servers and determine to reject or accept user access requests depending on the responses from RADIUS Servers The RADIUS server runs on the computer or workstation at the network center and maintains information related to user authentication and network service access It receives connection requests authenticates users and returns access control information for example rejecting or accepting the user access request to the clients The RADIUS server typically maintains the following databases Users Clients and Dictionary See Figure 346 Figure 346 RADIUS server databases RADIUS servers e Users Stores user information such as usernames passwords applied protocols and IP addresses e Clients Stores information about RADIUS c
323. eters 299 DHCP snooping 306 308 31 DHCP snooping functions on interface 309 energy saving 109 energy saving on port 109 Ethernet link aggregation and LACP 205 213 Ethernet link aggregation group 208 Ethernet link dynamic aggregation group 208 Ethernet link static aggregation group 208 event entry 99 flow interval 92 gratuitous ARP 246 guest VLAN 802 1X 329 history entry 98 idle timeout period 50 IGMP snooping 252 260 IGMP snooping port function 258 IP routing IPv4 278 IP routing IPv6 278 IP services ARP entry 244 isolation group 440 LLDP 217 236 LLDP globally 227 local user 380 local user and user group 380 loopback detection 447 447 loopback detection global 447 loopback detection port specitic 448 loopback test 89 89 MAC address table 173 174 175 MAC authentication global 406 MAC authentication portspecific 408 MAC based 802 1X configuration 336 management IP address 36 maximum PoE interface power 498 MLD snooping 266 2 4 MLD snooping port function 272 MST region 191 MSTP 177 190 199 MSTP global 192 MSTP portspecific 195 NMM local port mirroring 83 NMM local port mirroring group 80 NMM local port mirroring group monitor port 84 NMM local port mirroring group ports 81 NMM local port mirroring group source ports 84 NMM RMON 93 105 NMM RMON alarm function 95 NMM RMON statistics function 95 NMM SNMP 111 PoE 4
324. ever you cannot configure it as the voice VLAN For information about port link types see Managing ports 159 Recommended configuration procedure for a port in automatic voice VLAN assignment mode Step Remarks Optional 1 Configuring voice VLAN globally Configure the voice VLAN to operate in security mode and configure the aging timer Required Configure the voice VLAN assignment mode of a port as automatic 2 Configuring voice VLAN on ports and enable the voice VLAN function on the port By default the voice VLAN assignment mode of a port is automatic and the voice VLAN function is disabled on a port Optional 3 Adding OUI addresses to the The system supports up to 8 OUI addresses OUI list By default the system is configured with two OUI addresses as shown in Table 45 Recommended configuration procedure for a port in manual voice VLAN assignment mode Ste Remarks TRE l Optional 1 Configuring voice VLAN globally Configure the voice VLAN to operate in security mode and configure the aging timer Required 6 aae Configure the voice VLAN assignment mode of a port as manual and enable vor 6 voice VLAN on the port By default the voice VLAN assignment mode of a port is automatic and voice VLAN is disabled on a port aac Optional l eek ithe Oui You can configure up to 8 OUI addresses list By default the system is configured with the two OUI addresses shown in Table 45 Configuri
325. ew window appears Figure 103 Creating an SNMP view 1 Please input the name of the view you want to create viewNamel 82 Chay Apply Cancel Type the view name 5 Click Apply The page in Figure 104 appears 6 Configure the parameters as described in Table 34 7 Click Add to add the rule into the list box at the lower part of the page 115 Repeat steps 6 and 7 to add more rules for the SNMP view 9 Click Apply To cancel the view click Cancel Figure 104 Creating an SNMP view 2 Add View E View Mame view Rule Included Excluded wip subtree OID ceny Subtes Mask Hex chars tems marked with an asterisk are required Add Rule MIB Subtree OID Subtree Wask Operation Apply Cancel Table 34 Configuration items ltem Description View Name Set the SNMP view name Rule Select to exclude or include the objects in the view range determined by the MIB subtree OID and subtree mask Set the MIB subtree OID such as 1 4 5 3 1 or name such as system MIB Subtree OID MIB subtree OID identifies the position of a node in the MIB tree and it can uniquely identity a MIB subtree Set the subtree mask a hexadecimal string lis length must be an even number in the range of 2 to 32 Subtree Mask If no subtree mask is specified the default subtree mask all Fs will be used for mask OID matching Adding rules to an SNMP view Select Device gt SNMP from the navigation tree 2 Click th
326. example if you set the time range to 08 08 to 10 12 the effective time range is 08 10 to 10 10 PoE Disabled Disable PoE on the port 109 ltem Descri ption Set the port to transmit data at the lowest speed Lowest Speed If you configure the lowest speed limit on a port that does not support 10 Mbps the configuration cannot take effect Shut down the port Shutdown An energy saving policy can have all the three energy saving schemes configured of which the shutdown scheme takes the highest priority 110 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol SNMP and guides you through the configuration procedure Overview SNMP is an Internet standard protocol widely used for a management station to access and operate the devices on a network regardless of their vendors physical characteristics and interconnect technologies SNMP enables network administrators to read and set the variables on managed devices for state monitoring troubleshooting statistics collection and other management purposes SNMP mechanism The SNMP framework comprises the following elements e SNMP manager Works on an NMS to monitor and manage the SNMP capable devices in the network e SNMP agent Works on a managed device to receive and handle requests from the NMS and send traps to the NMS when some events such as interface state change occur e Management Information Base MIB
327. face 301 DHCP snooping 309 IP multicast IGMP snooping globally 256 IP multicast IGMP snooping in a VLAN 257 IPv multicast MLD snooping globally 270 IPv multicast MLD snooping in a VLAN 270 LLDP on ports 223 PSE detect nonstandard PDs 499 SNMP agent 113 encapsulating LLDP frame encapsulated in Ethernet II 217 LLDP frame encapsulated in SNAP format 217 security 802 1X RADIUS EAP Message attribute 324 VLAN frame encapsulation 133 energy saving configuring energy saving 109 port based configuration 109 entering configuration wizard homepage 34 environment setting configuration environment 20 Ethernet ARP configuration 242 ARP static contiguration 246 DHCP snooping configuration 311 gratuitous ARP contiguration 246 link aggregation and LACP 205 LLDP frame encapsulated in Ethernet II 217 loopback detection contiguration 447 447 loopback test configuration 89 89 MAC address table configuration 173 174 175 NMM port mirroring configuration 79 NMM RMON statistics group 93 port isolation configuration 440 441 portbased VLAN configuration 135 security ARP attack protection configuration 250 VLAN configuration 133 145 VLAN frame encapsulation 133 VLAN type 134 Ethernet frame header ACL category 450 configuration 459 Ethernet link aggregation 513 aggregate interface 205 209 aggregation group 205 basic concepts 205 configuration 205 21
328. feature is disabled For more information about port security see Configuring port security Recommended configuration procedure Step Remarks Required This function enables MAC authentication globally and contigures the advanced parameters By default MAC authentication is disabled globally 1 Configuring MAC authentication globally Required This function enables MAC authentication on a port MAC authentication can take effect on a port only when it is enabled globally and on the port You can configure MAC authentication on ports first 2 Configuring MAC authentication on a port By default MAC authentication is disabled on a port Contiguring MAC authentication globally 1 From the navigation tree select Authentication gt MAC Authentication 2 In the MAC Authentication Configuration area click Advanced 406 Figure 388 MAC authentication configuration page MAC Authentication Configuration E Enable MAC Authentication Advanced Offline Detection Period 300 seconds 60 2147483647 Default 300 Quiet Time 60 seconds 1 3600 Default 60 Server Timeout Time 100 seconds 100 300 Default 100 Authentication ISP Domain Authentication Information Format MAC without hyphen MAC as 0000000 5 MAC with hyphen MAC as 50001 1000 Lsernam are Paecewnr hare Fixed Us eel ame Chars Password Chars 1 55 1 63 Ports With MAC Authentication Enabled Port Auth F ail VLAN Operation Ad
329. ffline mode this item is optional In other modes this item is required Select the local PKI entity When submitting a certificate request to a CA an entity needs to show its identity Entity N H at information Available PKI entities are those that have been configured Select the authority for certificate request e CA lndicates that the entity requests a certificate from a CA Institution l T e RA Indicates that the entity requests a certificate from an RA RA is recommended 391 liem Description Enter the URL of the RA The entity will submit the certificate request to the server at this URL through the SCEP protocol The SCEP protocol is intended for communication between an entity and an Requesting URL authentication authority In offline mode this item is optional In other modes this item is required O IMPORTANT This item does not support domain name resolution oe Enter the IP address port number and version of the LDAP server Port In a PKI system the storage of certificates and CRLs is a crucial problem which is usually Version addressed by deploying an LDAP server Request Mode Select the online certificate request mode which can be auto or manual Password Set a password for certificate revocation and re enter it for confirmation Confirm Password The two boxes are available only when the certificate request mode is set to Auto Fingerprint Hash Specify the fingerprint use
330. fic statistics on the interface including network collisions CRC Configuring a statistics entry alignment errors undersize oversize packets broadcasts multicasts bytes received and packets received The statistics are cleared at a reboot IMPORTANT You can create only one statistics entry on one interface Table 21 RMON history group configuration task list Task Remarks Required You can create up to 100 history entries in a history table Atter an entry is created the system periodically samples the number of packets received sent on the current interface It saves the statistics as an Configuring a history entry instance under the leaf node of the etherHistoryEntry table IMPORTANT When you create an entry if the value of the specitied sampling interval is identical to that of the existing history entry the system considers their configurations are the same and the creation fails Configuring the RMON alarm function To send traps to the NMS when an alarm is triggered configure the SNMP agent as described in Configuring SNMP before configuring the RMON alarm function Perform the tasks in Table 22 to configure RMON alarm function Table 22 RMON alarm configuration task list Task Configuring a statistics entry Configuring an event entry Configuring an alarm entry Displaying RMON running status Remarks Reguired You can create up to 100 statistics entries in a statistics table A
331. field indicates the 802 1p priority of the frame Canonical format indicator CFI The 1 bit CFI field specifies whether the MAC addresses are encapsulated in the standard format when packets are transmitted across different media A value of O indicates that MAC addresses are encapsulated in the standard format The value of 1 indicates that MAC addresses are encapsulated in a non standard format The value of the field is O by default VLAN ID The 12 bit VLAN ID field identities the VLAN the frame belongs to The VLAN ID range is O to 4095 As O and 4095 are reserved a VLAN ID actually ranges from 1 to 4094 A network device handles an incoming frame depending on whether the frame is VLAN tagged and the value of the VLAN tag if any The Ethernet II encapsulation format is used in this section In addition to the Ethernet II encapsulation format Ethernet also supports other encapsulation formats including 802 2 LLC 802 2 SNAP and 802 3 raw The VLAN tag fields are added to frames encapsulated in these formats for VLAN identification When a frame carrying multiple VLAN tags passes through the device processes the frame according to its outer VLAN tag and transmits the inner tags as payload VLAN types You can implement VLANs based on the following criteria Port MAC address Protocol IP subnet Policy Other criteria The Web interface is available only for port based VLANs and this chapter introduces only port based
332. figuration 14 PVID port based VLAN 136 Q QoS ACL configuration 450 ACL configuration Ethernet frame header 459 configuration 489 hardware congestion management SP queuing 4 1 471 hardware congestion management WRR queuing 4 2 4 2 Packet precedence 469 policy adding 483 policy configuration 466 policy port application 484 485 486 488 priority mapping 4 4 priority mapping table 475 queue scheduling 471 rate limit 473 token bucket 473 trattic behavior adding 480 trattic class adding 478 trattic class contiguration 479 traffic classification 468 traffic evaluation 473 traffic mirroring configuration 481 traffic redirecting configuration 481 querying IGMP snooping general query 254 MLD snooping general query 268 queuing QoS hardware congestion management SP queuing 4 1 4 1 QoS hardware congestion management WRR queuing 472 472 SP and WRR 471 R RADIUS AAA application 352 527 AAA implementation 363 374 assigning MAC authentication ACL assignment 405 assigning MAC authentication VLAN assignment 405 client server model 363 common parameter configuration 369 configuration 363 374 configuration guidelines 378 extended attributes 367 MAC authentication configuration global 406 MAC authentication configuration port specific 408 packet exchange process 364 packet format 365 protocols and standards 368 scheme configurati
333. figuration 80 local group monitor port 84 local group port 81 local group source port 84 NMM 79 logging member device from master 42 logging in CLI 24 Web interface HTTP login 6 logging out Web interface logout 7 loop 517 MSTP configuration 177 190 199 loopback detection configuration 447 447 configuration global 447 configuration portspecific 448 loopback test configuration 89 89 guidelines 89 low PoE interface power management 498 M MAC 802 1X port based access control method 321 address See MAC address authentication See MAC authentication MAC address ARP configuration 242 ARP static contiguration 246 Ethernet link aggregation MAC address learning configuration class 206 gratuitous ARP 244 gratuitous ARP contiguration 246 gratuitous ARP packet learning 244 MAC authentication ACL assignment 411 MAC authentication configuration global 406 MAC authentication configuration portspecific 408 MAC local authentication configuration 408 security 802 1X authentication access device initiated 324 security 802 1X authentication client initiated 324 security ARP attack protection contiguration 250 security MAC authentication configuration 404 406 408 VLAN frame encapsulation 133 MAC address table address learning 173 configuration 173 174 175 displaying 174 dynamic aging timer 175 entry creation 1 3 entry types 1 4 manual entrie
334. figuration area click Add b Select the server type Primary Accounting c Enter the IP address 10 1 1 2 and enter the port number 1813 d Enter expert in the Key and Confirm Key fields Figure 322 Configuring the RADIUS accounting server Add RADIUS Server IP Address IPy4 IPv8 Port 1813 5535 Default 18133 Key eeeeee it Chars Confirm Key eeeeeee it Chars Apply Cancel e Click Apply The RADIUS Server Configuration area displays the accounting server you have configured as shown in Figure 323 344 Figure 323 Configuring the RADIUS scheme Add RADIUS Scheme Scheme Name 1 32 Chars Common Configuration Serer Type Extended w Username Format Without domain name PAdvanced RADIUS Server Configuration Serer Type IP Address Operation Primary 10411 Authentication Primary Accounting 10 1 1 2 i Add tems marked with an asterisk are required Apply Cancel 4 Click Apply Configuring AAA 1 Create an ISP domain a From the navigation tree select Authentication gt AAA The Domain Setup page appears b Enter test from the Domain Name list and select Enable from the Default Domain list c Click Apply 345 Figure 324 Creating an ISP domain Authentication Authorization Accounting ISP Domain Domain Name est Nt 24 chars Default Domain Apply Please selectthe ISP damaints Domain Name Default Domain Configure AAA authentication method fo
335. figuration file that was used for the next startup The restored configuration takes eftect at the next device startup 64 To restore the contiguration 1 Select Device gt Configuration from the navigation tree 2 Click the Restore tab Figure 54 Restoring the configuration Backup Store Save Initialize Restore the Configuration File the file with the extension cfg Browse the file with the extension xmI Hote This operation replaces the configuration in the startup configuration file with the restored configuration but the restored configuration takes effect at the next startup tems marked with an asterisk are required Apply 3 Click the upper Browse button The tile upload dialog box appears Select the cfg file to be uploaded and click OK 5 Click the lower Browse button The tile upload dialog box appears 6 Select the xml file to be uploaded and click OK Saving the configuration You save the running configuration to both the cdfg configuration file and xml configuration file that will be used at the next startup Saving the configuration takes some time Only one administrator can save the configuration at a moment If you save the configuration while the system is saving the configuration as required by another administrator the system prompts you to try again later You can save the configuration in either of the following modes e Fast mode To save the configu
336. filtering ACL 452 frame MAC address learning 173 MAC address table configuration 173 174 175 portbased VLAN frame handling 136 VLAN frame encapsulation 133 function NMM RMON alarm function 95 NMM RMON statistics function 95 Web search 17 Web sort 19 Web based NM functions 8 G general query IGMP snooping 254 MLD snooping 268 getting started CLI 20 gratuitous ARP contiguration 246 packet learning 244 group Ethernet link aggregation group 205 Ethernet link aggregation group contiguration 208 Ethernet link aggregation group creation 208 Ethernet link aggregation LACP 205 Ethernet link aggregation member port state 205 Ethernet link dynamic aggregation group contiguration 208 Ethernet link static aggregation group contiguration 208 514 NMM local port mirroring group monitor port 84 NMM local port mirroring group port 81 NMM local port mirroring group source port 84 NMM port mirroring group 79 NMM RMON 93 NMM RMON alarm 94 NMM RMON configuration 105 NMM RMON Ethernet statistics 93 NMM RMON event 94 NMM RMON history 94 guest VLAN 802 1X authentication 329 configuring 802 1X 335 guidelines loopback test 89 port security 423 H hardware congestion management SP queuing 4 1 471 WRR queuing 4 2 4 2 hello STP timer 184 history NMM RMON group 94 history entry configuration 98 HTTP Web interface login 6 ICMP ping command 317 icons on webpage 16 IGMP snoopin
337. fined by standardization or other organizations and are optional to LLDPDUs e Basic management TLVs Table 71 lists the basic management TLV types Some of them are mandatory for LLDPDUs Table 71 Basic management TLVs Type Description Remarks Chassis ID Specifies the bridge MAC address of the sending device Specities the ID of the sending port e If the LLDPDU carries LLDP MED TLVs the port ID TLV carries the MAC address of the sending port or the ere bridge MAC in case the port does not have a MAC address Mandatory e Otherwise the port ID TLV carries the port name Specifies the life of the transmitted information on the Time to Live it l receiving device End of LLDPDU Marks the end of the TLV sequence in the LLDPDU Port Description Specifies the port description of the sending port System Name Specifies the assigned name of the sending device System Description Specifies the description of the sending device Identifies the primary functions of the sending device and System Capabilities the enabled primary functions Optional Specities the following elements e The management address used to reach higher level Management Address entities to assist discovery by network management e The interface number and OID associated with the address e IEEE 802 1 organizationally specific TLVs Table 72 IEEE 802 1 organizationally specific TLVs Port VLAN ID Specifies the port s VLAN identifier PVID An LLDPDU
338. first If 802 1X authentication fails MAC authentication is performed MAC Auth Or 802 1X Similar to the MAC Auth Or 802 1X Single Host mode except that it MAC Based supports multiple 802 1X and MAC authentication users on the port This mode is the combination of the MAC Auth and 802 1X Single Host modes with MAC authentication having higher priority MAC Auth Else 802 1X e A port in this mode performs only MAC authentication for non 802 1X Single Host frames MAC Auth Or 802 1X Single Host e For 802 1X frames the port performs MAC authentication and then if MAC authentication fails 802 1X authentication MAC Auth Else 802 1X Similar to the MAC Auth Else 802 1X Single Host mode except that it MAC Based supports multiple 802 1X and MAC authentication users on the port 422 The maximum number of users a port supports equals the maximum number of secure MAC addresses that port security allows or the maximum number of concurrent users the authentication mode in use allows whichever is smaller An OUI is a 24 bit number that uniquely identifies a vendor manufacturer or organization In MAC addresses the first three octets are the OUI Contiguration guidelines When you configure port security follow these restrictions and guidelines e Before you enable port security disable 802 1X and MAC authentication globally e Only one port security mode can be configured on a port e The outbound restriction feature is not
339. formation see Configuring SNMP Set the contact information for users to get in touch with the device vendor for help Syscontact You can also set the contact information in the setup page you enter by selecting Device gt SNMP For more information see Configuring SNMP 35 Configuring management IP address AN CAUTION Modifying the management IP address used for the current login terminates the connection to the device Use the new management IP address to re log in to the system 1 On the system parameter configuration page click Next Figure 23 Management IP address configuration page Management IP Interface configuration Step 3 of 4 Eg The IF address of a VLAN interface can be used as the management F address to access the device Select VLAN Interface 1 w Admin status Up y v con gure IFyd saires DHCP BOOTP Manual Fud address 192 168 1 60 MaskLen 255 255 255 0 go Configure IFv link local address Auto Manual DJA sddrEEE lt Back Next gt Cancel 2 Configure the parameters as described in Table 4 Table 4 Configuration items ltem Description Select a VLAN interface Available VLAN interfaces are those configured in the page that you enter by selecting Network gt VLAN Interface and selecting the Create tab The IP address of a VLAN interface can be used as the management IP address to access the device Configure a VLAN interface and its IP address in the page that you enter
340. from ARP trusted ports It checks ARP packets received from ARP untrusted ports based on the following objects e src mac Checks whether the sender MAC address in the message body is identical to the source MAC address in the Ethernet header If they are identical the packet is forwarded Otherwise the packet is discarded e dstmac Checks the target MAC address of ARP replies If the target MAC address is all zero all one or inconsistent with the destination MAC address in the Ethernet header the packet is considered invalid and discarded e ip Checks the sender and target IP addresses of ARP replies and the sender IP address of ARP requests All one or multicast IP addresses are considered invalid and the corresponding packets are discarded Contiguring ARP detection To check user validity at least one among DHCP snooping entries and 802 1X security entries is available Otherwise all ARP packets received from ARP untrusted ports are discarded 1 From the navigation tree select Network gt ARP Anti Aftack The detault ARP Detection page appears 250 Figure 226 ARP detection configuration page VLAN Settings Trusted Ports Enabled VLANs Disabled VLANs Trusted Ports Untrusted Ports 1 GigabitEthernet1 0 1 2 GigabitEthernet1 0 2 5 GigabitEthernet1 0 3 100 GigabitEthernet1 0 4 GigabitEthernet1 0 5 GigabitEthernet1 0 6 GigabitEthernet1 0 7 GigabitEthernet1 0 8 GigabitEthernet
341. ftware Version 5 20 99 ESS 1101 Copyright c 2010 2014 Hewlett Packard Development Company L P HP 1920 24G Switch uptime is 0 week 0 day 1 hour 25 minutes HP 1920 24G Switch 128M bytes DRAM 32M bytes Flash Memory Config Register points to Flash Hardware Version is VER A Bootrom Version is 109 SubSlot 0 24GE 4SFP Hardware Version is VER A upgrade Syntax upgrade server address source filename bootrom runtime Parameters server address IPv4 address or host name a string of 1 to 20 characters of a TFTP server source filename Software package name on the TFTP server bootrom Specifies the Boot ROM image in the software package file as the startup configuration file runtime Specifies the system software image file in the software package file as the startup configuration file Description Use upgrade server address source filename bootrom to upgrade the Boot ROM image If the Boot ROM image in the downloaded software package file is not applicable the original Boot ROM image is still used as the startup configuration file 30 Use upgrade serveraddress source filename runtime to upgrade the system software image file If the system software image file in the downloaded software package file is not applicable the original system software image file is still used as the startup configuration file To validate the downloaded software package file reboot the device NOTE The HP 1920 Switch Series does n
342. g aging timer for dynamic port 253 basic concepts 252 configuration 252 contiguring 260 contiguring port functions 258 displaying IGMP snooping multicast forwarding entries 259 enable globally 256 enable in a VLAN 257 enabling IGMP snooping globally 256 enabling IGMP snooping in a VLAN 257 general query 254 how it works 254 leave message 255 membership report 254 protocols and standards 255 related ports 252 implementing MSTP device implementation 189 NMM local port mirroring 79 inbound NMM port mirroring 79 initiating security 802 1X authentication 324 325 interface Ethernet aggregate intertace 205 interface statistics displaying 132 Internet NMM SNMP configuration 111 SNMPv1 configuration 124 SNMPv2c configuration 124 SNMPv3 configuration 127 intrusion protection port security feature 421 IP addressing ACL configuration 450 ACL configuration Ethernet frame header 459 ARP configuration 242 ARP dynamic table entry 244 ARP message format 242 ARP operation 242 ARP static contiguration 246 ARP static entry creation 245 ARP static table entry 244 ARP table 243 DHCP address allocation 292 293 DHCP lease extension 293 DHCP message format 294 DHCP snooping configuration 306 308 enabling DHCP snooping 309 gratuitous ARP 244 gratuitous ARP contiguration 246 gratuitous ARP packet learning 244 515 IP services ARP entry configuration 244 IP services ARP entry remo
343. g the super password for non management level users to switch to the management level e Switching to the management level from a lower level Adding a local user 1 Select Device gt Users from the navigation tree 2 Click the Create tab Figure 72 Adding a local user Summary Super Password Modify Remove Switch To Management Create User Username 1 55 Chars Access Level Visitor T Password 1 63 Chars Confirm Password Password Encryption Reversible Irreversible Service Type E Web Z FTP E Telnet Apply Summary Username Access Level Service Type Management Note Username cannot contain Chinese characters and any of the following characters lt gt 8 amp 3 Configure a local user as described in Table 18 4 Click Apply Table 18 Configuration items ltem Description Username Entera username for the user 86 ltem Description Select an access level for the user Users of different levels can perform different operations User levels in order from low to high are as follows e Visitor A visitor level user can perform only ping and traceroute operations They cannot access the data on the device or configure the device Access Level e Monitor A monitor level user can perform ping and traceroute operations and access the data on the device but they cannot configure the device e Configure A configure level user can perform ping and tracer
344. gain e f a sudden increase of the PD power results in PSE power overload power supply to the PD on the PoE interface that has a lower priority is stopped to ensure power supply to the PD that has a higher priority Contiguring non standard PD detection There are standard PDs and nonstandard PDs Usually the PSE can detect only standard PDs and supply power to them The PSE can detect nonstandard PDs and supply power to them only if you enable the PSE to detect nonstandard PDs 1 Select PoE gt PoE from the navigation tree 2 Click the PSE Setup tab The page displays the location of all PSEs and the status of the non standard PD detection function 499 Figure 490 PSE Setup tab Summary Port Setup PSE ID Location Non Standard PD Compatibility 1 slot 1 subslot 0 Disable Apply Enable All Disable All Enabling the non standard PD detection function for a PSE 1 Select Enable in the corresponding Non Standard PD Compatibility column 2 Click Apply Disabling the non standard PD detection function for a PSE 1 Select Disable in the corresponding Non Standard PD Compatibility column 2 Click Apply Enabling the non standard PD detection for all PSEs Click Enable All Disabling the non standard PD detection for all PSEs Click Disable All Displaying information about PSE and PoE ports 1 Select PoE gt PoE from the navigation tree to enter the Summary tab The upper part of the page displays the PSE summary 2
345. ge displays the detailed information about the member ports of the link aggregation group Figure 189 Displaying information of an aggregate interface Create Modify Remove Select port from the table to view port details Aggregation Interface Link Type Farner ID Selected Ports Standby Ports Bridge Aggregation1 Static Member port details Member Fort State Reason for being Unselected GigabitEthernet1 0 1 Unselected The ports physical state down is improper for being attached Table 65 Field description Field Description Type and ID of the aggregate interface Aggregation interface ide Bridge Aggregation indicates a Layer 2 aggregate interface Link Type Type of the aggregate interface static or dynamic Partner ID ID of the remote device including its LACP priority and MAC address Number of Selected ports in each link aggregation group Only Selected ports Selected Ports l can send and receive user data Standby Ports Number of Unselected ports in each link aggregation group Unselected ports cannot send or receive user data Member Por A member port of the link aggregation group corresponding to the target aggregate interface State Aggregation state of a member port Selected or Unselected Reason why the state of a member port is Unselected For a Selected port this Reason for being Unselected field displays a hyphen 210 Setting LACP priority From the navigation tree select Network gt
346. gents embedded in network devices NMSs exchange data with RMON agents by using basic SNMP operations to gather network management information Because this method is resource intensive most RMON agent implementations provide only four groups of MIB information alarm event history and statistics You can configure your device to collect and report traffic statistics error statistics and performance statistics RMON groups Among the RFC 2819 defined RMON groups HP implements the statistics group history group event group and alarm group supported by the public MIB HP also implements a private alarm group which enhances the standard alarm group Ethernet statistics group The statistics group defines that the system collects various traftic statistics on an interface only Ethernet intertaces are supported and saves the statistics in the Ethernet statistics table ethernetStatsTable for future retrieval The interface trattic statistics include network collisions CRC alignment errors undersize oversize packets broadcasts multicasts bytes received and packets received After you create a statistics entry for an interface the statistics group starts to collect traffic statistics on the intertace The statistics in the Ethernet statistics table are cumulative sums 93 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the history reco
347. group Select port s You can click ports on the chassis front panel for selection if aggregate interfaces are configured they will be listed under the chassis panel for selection 440 Port isolation configuration example Network requirements As shown in Figure 436 e Campus network users Host A Host B and Host C are connected to GigabitEthernet 1 0 2 GigabitEthernet 1 0 3 and GigabitEthernet 1 0 4 of Switch e Switch is connected to the external network through GigabitEthernet 1 0 1 e GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 GigabitEthernet 1 0 3 and GigabitEthernet 1 0 4 belong to the same VLAN Configure Host A Host B and Host C so that they can access the external network but are isolated from one another at Layer 2 Figure 436 Networking diagram HostA Internet Host B Host C Configuring the switch 1 Assign ports GigabitEthernet 1 0 2 GigabitEthernet 1 0 3 and GigabitEthernet 1 0 4 to the isolation group a b c d Select Security gt Port Isolate Group from the navigation tree Click the Port Setup tab Select Isolated port for Config Type Select 2 3 4 on the chassis front panel 2 3 4 represent ports GigabitEthernet 1 0 2 GigabitEthernet 1 0 3 and GigabitEthernet 1 0 4 respectively 44 Figure 437 Assigning ports to the isolation group Summary Config type N port Select port s H eee ee BEI QARA H k k H Select All Select None Isolated por
348. gs Apply Cancel Set the LLDP settings for these ports as described in Table 75 5 Click Apply A progress dialog box appears Click Close on the progress dialog box when the progress dialog box prompts that the contiguration succeeds Contiguring LLDP globally 1 From the navigation tree select Network gt LLDP 2 Click the Global Setup tab 227 Figure 201 The global setup tab Port Setup Global Summary Meighbor Summary Global Setup LLDP Enable CDP Compatibility FastLLDPDU Count 34 40 Defaut 3 TTL Multiplier 42 10 Default 4 Trap Interval 6 5econd 5 3600 Default 5 Reinit Delay 2 Seeanatt 10 Default 2 Tx Delay 2 Seconaet 31 92 Default 2 Tx Interval 2s Secondt5 32768 Default 30 Apply Set the global LLDP setup as described in Table 76 Click Apply A progress dialog box appears Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds Table 76 Configuration items ltem Description LLDP Enable Select from the list to enable or disable global LLDP Select from the list to enable or disable CDP compatibility of LLDP When you configure CDP compatibility follow these guidelines e To enable LLDP to be compatible with CDP on a port you must set the CDP operating mode on the port to TxRx and enable CDP compatibility on the CDP Compatibility Global Setup tab e Because the maximum TTL allowed by CDP is 255 seconds you must
349. guration 297 298 303 DHCP snooping configuration 311 LLDP configuration 236 NMM port mirroring configuration 79 traceroute 317 traceroute node failure identification 319 learning MAC address 173 MST learning port state 188 lease DHCP IP address lease extension 293 leave message IP multicast IGMP snooping 255 link aggregation 205 link layer discovery protocol See LLDP MSTP configuration 177 190 199 LLDP basic concepts 217 configuration 217 236 configuration guideline 241 displaying for a port 229 displaying global 234 displaying neighbor information 236 enable globally 227 enable on ports 223 how it works 221 LLDP frame format 217 LLDP frame reception 222 LLDP frame transmission 221 LLDPDU management address TLV 221 LLDPDU TLV types 218 LLDPDU TLVs 218 operating mode disable 221 operating mode Rx 221 operating mode Tx 221 operating mode TxRx 221 parameter setting for a single port 224 parameter setting for ports in batch 227 protocols and standards 222 LLDP frame encapsulated in Ethernet Il format 217 encapsulated in SNAP format 217 LLDP contiguration 217 236 receiving 222 transmitting 221 LLDPDU management address TLV 22 TLV basic management types 218 TLV LLDP MED types 218 TLV organization specific types 218 local security MAC authentication 404 security MAC local authentication configuration 408 local port mirroring adding local group 83 con
350. gure 174 provides an example showing how the STP algorithm works 180 Figure 174 STP network Device A With priority 0 Device B With priority 1 Device C With priority 2 As shown in Figure 174 the priority values of Device A Device B and Device C are 0 1 and 2 and the path costs of links among the three devices are 5 10 and 4 respectively 1 Device state initialization In Table 55 each configuration BPDU contains the following fields root bridge ID root path cost designated bridge ID and designated port ID Table 55 Initial state of each device Device Port name BPDU of port AP 10 O O AP1 Device A AP2 10 O O AP2 BP 1 0 1 BP1 Device B BP2 1 0 1 BP2 CP 2 O 2 CP1 Device C CP2 2 O 2 CP2 2 Configuration BPDUs comparison on each device In Table 56 each configuration BPDU contains the following fields root bridge ID root path cost designated bridge ID and designated port ID 181 Table 56 Comparison process and result on each device Device Comparison process Configuration BPDU on orts after comparison Device A Device B Device C Port AP1 receives the configuration BPDU of Device B 1 O 1 BP1 Device A finds that the configuration BPDU of the local port 0 0 0 AP1 is superior to the received configuration BPDU and it discards the received contiguration BPDU Port AP2 receives the configuration BPDU of Device C 2 0 2 CP 1
351. guring basic ACLs 455 462 configuring client s IP to MAC bindings 302 contiguring device idle timeout period 50 contiguring device system name 50 contiguring DHCP relay agent 298 303 configuring DHCP relay agent advanced parameters 299 configuring DHCP snooping 308 311 contiguring DHCP snooping functions on interface 309 configuring energy saving on port 109 contiguring Ethernet link aggregation and LACP 213 contiguring Ethernet link aggregation group 208 contiguring Ethernet link dynamic aggregation group 208 contiguring Ethernet link static aggregation group 208 contiguring event entry 99 contiguring gratuitous ARP 246 contiguring history entry 98 contiguring IGMP snooping 260 contiguring IGMP snooping port function 258 configuring IP services ARP entry 244 contiguring IPv4 ACL 452 configuring IPv ACL 453 contiguring isolation group 440 contiguring LLDP 236 configuring local user 380 configuring local user and user group 380 configuring loopback detection global 447 configuring loopback detection portspecitic 448 configuring MAC address table 175 525 contiguring MAC authentication global 406 contiguring MAC authentication port specitic 408 configuring MAC based 802 1X 336 configuring management IP address 36 contiguring maximum PoE interface power 498 contiguring MLD snooping 274 configuring MLD snooping port function 272 contiguring MST region 19
352. he Advance Setup tab The rule configuration page for an advanced IPv4 ACL appears 456 3 4 Figure 448 Configuring an advanced IPv4 ACL Summary Add Basic Setup Link Layer Setup Remove ACL Selectan ACL Help Configure an Advanced ACL Ll Rule ID eves fno ID is entered the system will specify one C Non first Fragments Only I Lagging IF Address Filter D source iP Adaress 1 soureewildcard O O E pestination address o Destination Wildcard ProtoeolliP 7 IMP Type ICMP hMessade eme Te joss iemPeotel a 289 TERILIDE Fort TCP Connection Established Sous a Poel NL eestnetion a Pol NL Range of Port is 0 65535 Precedence Filter DSCP Not Check ka TOS Mot Check wt Precedence Mot Check wt Time Range Rule ID Operation Description Time Rar Configure a rule for an advanced IPv4 ACL as described in Table 140 Click Add Table 140 Configuration items ltem Description ACL Select the advanced IPv4 ACL for which you want to configure rules Available ACLs are advanced Pv4 ACLs 457 ltem Description Select the Rule ID box and enter a number for the rule If you do not specify the rule numker the system will assign one Rule ID automatically If the rule number you specify already exists the following operations modify the configuration of the rule Select the action to be performed for packets matching the rule Action e Permit Allows matched packets
353. he LSAP Type box and specify the DSAP and SSAP fields in the LLC encapsulation by configuring the following items e LSAP Type Frame encapsulation format e LSAP Mask LSAP mask Select the Protocol Type box and specify the link layer protocol type by configuring the following items e Protocol Type Frame type It corresponds to the type code field of Ethernet_Il and Ethernet_SNAP frames e Protocol Mask Protocol mask Select the time range during which the rule takes effect Adding an IPv ACL Select QoS gt ACL IPv from the navigation tree 2 Click the Add tab The IPv ACL configuration page appears Figure 450 Adding an IPv ACL Summary ACL Sumber Match Order Description ACL Number Type 3 Add an IPv6 ACL 4 Click Apply Basic Setup Advanced Setup Remove 2000 2999 for Basic ACL 3000 3999 for Advanced ACL Charactersf0 12 74 Apply Cancel Humber of Rules Match Order Description 461 Table 142 Configuration items ltem Description ACL Number Enter a number for the IPv6 ACL Select a match order for the ACL Available values are Match Order are compared against ACL rules in the order the rules are e Auto Packets are compared against ACL rules in the depth first match order Description Set the description for the ACL Configuring a rule for a basic IPv6 ACL Select QoS gt ACL IPv from the navigation tree 2 Click the Basic Setup tab
354. he file domain name_ca cer for the CA certificate or Get File Fron PC domain name local cer for the local certificate under the root directory of the device e If the certificate file is saved on a local PC select Get File From PC and then specify the path and name of the file and specify the partition that saves the file Password Enter the password for protecting the private key which was specified when the certificate was exported After retrieving a certificate you can click View Cert corresponding to the certificate from the PKI certificates list to display the contents of the certificate 395 Figure 376 Certificate information Entity Domain View Certificate Details Certificate Data Version 3 O0x2 Serial Number 61l44CCr9 00000000 O014 shalWithks Enecryption Signature Algorithm TSSuer CN CA server Validity Wot Before Wot After i Sub ect C C CMN aaa subject Public Key Info Public Key Algorithm R54 Public Key Modulus OO048566F S69a0oZe TSFECSSD ASESFEGS goog lI Sl TB2C96A4 FSCCFSDA 11FF1409 q3 EFAZSDAL DAE TADDE 61466440 b56214ED SOE FSES4 ASDIAEDD 31550596 B7AFEADG GEL CEz471E6 91569053 SESFIESO FAFD AGED OED1ES 24 AEZATLIE EFZLYT6SD 24eDFO0A5 Now 3 08 10 21 2009 GMT Now 3 O68 20 4 21 2010 GMT tsakncryption 1024 bit 1024 biti EiAT3ZAET7 OadAAzBEl adOEd1GE FLAL7SLF AALEZTE FFDAA1A3 OY LSA1CF BALAAE ZA Exponent 65537 O0x1
355. he network administrator assigns an IP address to a client for example a WWW server and DHCP conveys the assigned address to the client e Automatic allocation DHCP assigns a permanent IP address to a client e Dynamic allocation DHCP assigns an IP address to a client for a limited period of time which is called a lease Most DHCP clients obtain their addresses in this way 292 IP address allocation process Figure 267 Dynamic IP address allocation process DHCP client DHCP server 1 DHCP DISCOVER 2 DHCP OFFER 3 DHCP REQUEST 4 DHCP ACK 1 The client broadcasts a DHCP DISCOVER message to locate a DHCP server 2 A DHCP server offers configuration parameters such as an IP address to the client in a DHCP OFFER message The sending mode of the DHCP OFFER is determined by the flag field in the DHCP DISCOVER message For more information about the DHCP message format see DHCP message format 3 If several DHCP servers send offers to the client the client accepts the first received offer and broadcasts it in a DHCP REQUEST message to request the IP address formally IP addresses offered by other DHCP servers can be assigned to other clients 4 All DHCP servers receive the DHCP REQUEST message but only the server from which the client accepts the offered IP address returns a DHCP ACK message to the client confirming that the IP address has been allocated to the client or a DHCP NAK unicast message denyi
356. he target host as described in Table 38 Click Apply Table 38 Configuration items ltem Description Set the destination IP address Destination IP Address Select the IP address type IPv4 or IPv and then type the corresponding IP address in the field according to the IP address type 122 ltem Description Set the security name which can be an SNMPv1 community name an EA SNMPv2c community name or an SNMPv3 user name Set UDP port number IMPORTANT UDP Port The default port number is 162 which is the SNMP specitied port used for receiving traps on the NMS Generally such as using IMC or MIB Browser as the NMS you can use the default port number To change this parameter to another value you need to make sure the configuration is the same with that on the NMS Select the security model for which you must set the SNMP version For the Security Model NMS to receive notifications make sure the SNMP version is the same with that on the NMS Set the authentication and privacy mode for SNMP traps when the security model is selected as v3 The available security levels are no authentication no Security Level privacy authentication but no privacy and authentication and privacy When the security model is selected as v1 or v2c the security level is no authentication no privacy and cannot be modified Displaying SNMP packet statistics Select Device gt SNMP from the navigation tree The page for
357. he transmission speed of the port Speed Duplex Link Type PVID Description MDI 10 10 Mbps 100 100 Mbps 1000 1000 Mbps Auto Autonegotiation Auto 10 Autonegotiated to 10 Mbps Auto 100 Autonegotiated to 100 Mbps Auto 1000 Autonegotiated to 1000 Mbps Auto 10 100 Autonegotiated to 10 or 100 Mbps Auto 10 1000 Autonegotiated to 10 or 1000 Mbps Auto 100 1000 Autonegotiated to 100 or 1000 Mbps Auto 10 100 1000 Autonegotiated to 10 100 or 1000 Mbps Set the duplex mode of the port Auto Autonegotiation Full Full duplex Half Half duplex Set the link type of the current port which can be access hybrid or trunk For more information see Configuring VLANs To change the link type of a port from trunk to hybrid or vice versa you must first set its link type to access Set the port VLAN ID PVID of the interface For more information about setting the PVID see Configuring VLANs To make sure a link correctly transmits packets the trunk or hybrid ports at the two ends of the link must have the same PVID Set the description of the port Set the MDI mode of the port You can use two types of Ethernet cables to connect Ethernet devices crossover cable and straightthrough cable To accommodate these two types of cables an Ethernet port can operate in one of the following three MDI modes across normal and auto An Ethernet port is composed of eight pins By def
358. he unit for data packets sent to the RADIUS server which can be e One packet Unit for Packets e Kilo packet e Mega packet e Giga packet Security Policy Server Specify the IP address of the security policy server Specify the source IP address for the device to use in RADIUS packets sent to the RADIUS server RADIUS Packet Source IP HP recommends you to use a loopback interface address instead of a physical interface address as the source IP address If the physical interface is down the response packets from the server cannot reach the device Enable or disable buffering of stop accounting requests for which no Buffer stop accounting packets P g P responses are received 3 2 ltem Descri ption Set the maximum number of stop accounting attempts The maximum number of stop accounting attempts together with some other parameters controls how the NAS deals with stop accounting request packets Suppose that the RADIUS server response timeout period is three seconds Stop Accounting Attempts the maximum number of transmission attempts is five and the maximum number of stop accounting attempts is 20 For each stop accounting request if the device receives no response within three seconds it retransmits the request If it receives no responses after retransmitting the request five times it considers the stop accounting attempt a failure buffers the request and makes another stop accounting attempt If 20 consecutive att
359. hentication e If you configure MAC based accounts the access device uses the source MAC address of the packet as the username and password to search its local account database for a match e If you configure a shared account the access device uses the shared account username and password to search its local account database for a match RADIUS authentication e If you configure MAC based accounts the access device sends the source MAC address as the username and password to the RADIUS server for authentication e If you configure a shared account the access device sends the shared account username and password to the RADIUS server for authentication 404 MAC authentication timers MAC authentication uses the following timers e Offline detect timer Sets the interval that the device waits for traffic from a user before it regards the user idle If a user connection has been idle for two consecutive intervals the device logs the user out and stops accounting for the user e Quiet timer Sets the interval that the device must wait before it can perform MAC authentication for a user that has failed MAC authentication All packets from the MAC address are dropped during the quiet time This quiet mechanism prevents repeated authentication from affecting system performance e Server timeout timer Sets the interval that the device waits for a response from a RADIUS server before it regards the RADIUS server unavailab
360. her the client is still online By default if two consecutive handshake attempts fail the device logs off the client Upon receiving a handshake request the client returns a response If the client fails to return a response after a certain number of consecutive handshake attempts two by default the network access device logs off the client This handshake mechanism enables timely release of the network resources used by 802 1X users that have abnormally gone offline The client can also send an EAPOL Logoff packet to ask the network access device for a logoff In response to the EAPOL Logoff packet the network access device changes the status of the controlled port from authorized to unauthorized and sends an EAP Failure packet to the client EAP termination Figure 307 shows the basic 802 1X authentication procedure in EAP termination mode assuming that CHAP authentication is used 327 Figure 307 802 1X authentication procedure in EAP termination mode Client Device Authentication server RADIUS 1 EAPOL Start 2 EAP Request Identity 3 EAP Response Identity 4 EAP Request MD5 challenge 5 EAP Response MD5 challenge PP i 6 RADIUS Access Request CHAP Response MD5 challenge 7 RADIUS Access Accept CHAP Success 8 EAP Success ome me i ee mamma e ee ee ee ee ee 9 EAP Request Identity 10 EAP Response Identity 11 EAPOL Logoff 14 EAP Failure
361. hoseme Specify whether to overwrite the file with the same name name already exists If you do not select the option when a file with the same name exists a dialog box overwrite it without any appears telling you that the file already exists and you cannot continue the prompt upgrade Reboot after the upgrade Specify whether to reboot the device to make the upgraded software take effect finished after the application file is uploaded Device reboot AN CAUTION e Before rebooting the device save the configuration Otherwise all unsaved configuration will be lost after device reboot e When the device reboots re log in to the device 1 Select Device gt Device Maintenance from the navigation tree 2 Click the Reboot tab Figure 41 Device reboot page Software Upgrade Electronic Label Diagnostic Information Device Reboot Any configuration changes that have not been saved are last when the system reboots Check whether the current configuration is saved in the next startup configuration file Reboot Cancel 3 Enable or disable the Check whether the current configuration is saved in the next startup configuration file option Click Reboot A confirmation dialog box appears 5 Click OK o Ifyou select Check whether the current configuration is saved in the next startup configuration file the system will check the configuration betore rebooting the device If the check succeeds the system reboots the device
362. i Next Last 1 GO Configuring DHCP snooping functions on an interface From the navigation tree select Network gt DHCP 2 Click the DHCP Snooping tab to enter the page shown in Figure 285 3 Click the icon of a specitic interface in the Interface Config area to enter the page shown in Figure 286 309 Figure 286 DHCP snooping interface configuration page DHCP Relay Interface Name GigabitEthernet1 0 4 Interface State Trust Untrust Option 82 Support Enable Disable Option 82 Strategy Replace Default Replace Apply Cancel 4 Configure DHCP snooping on the interface as described in Table 100 5 Click Apply Table 100 Configuration items ltem Description Interface Name This field displays the name of a specific interface Interface State Configure the interface as trusted or untrusted Option 82 Support Configure DHCP snooping to support Option 82 or not Select the handling strategy for DHCP requests containing Option 82 The strategies include BEERS ee e Drop The message is discarded if it contains Option 82 ill oe e Keep The message is forwarded without its Option 82 being changed e Replace The message is forwarded after its original Option 82 is replaced with the Option 82 padded in normal format Displaying clients IP to MAC bindings From the navigation tree select Network gt DHCP Click the DHCP Snooping tab to enter the page shown in Figure 285 Click User Information to en
363. ic ARP entry A EE ER AE EE 245 EEUE EE EE 245 Configuring gratuitous ee 246 Static ARP configuration example E E T 246 Configuring ARP attack protection RE EA E EE N E E N EE OE RO EE EE E A 250 8 EE ee eee 250 User validity Te TR Ee 250 ARP packet validity check TE EE EEE TREE COETOSEPeeEPeeereeereeee reer tere teee reer reerreerreereeerteretetrrreerreerreeereerreerreeeree 250 Configuring EE EE neste eeseeneseeneseeceeesceeeseeeesseusseeuesseueseeuesseeeseeueseeueseeueeeweneeweeseuneseueeeeuesseueeseeeseeeeeeeees 250 Configuring IGMP snooping EE EO E E A E E E S 252 OVEN EEE EE EA TE O AE 2572 Basic IGMP snooping Concepts eeeeeeeeeeeertteeeertttereeteteeesrtteesrtteessttteessrtteesssttessneteeesstteeessnteeessserteeesssteeessseeeessnt 252 How IGMP snooping works EE EE EG 254 Protocols and ES Re ee eee eseseseseseee nese eeeeens 255 Recommended configuration procedure EE RE ER EN 255 Enabling IGMP snooping globally EE RE N EA ER RE RE OE 256 Configuring IGMP snooping TERTE 257 Configuring IGMP snooping port TERE Ee 258 Displaying IGMP snooping multicast forwarding TT 259 IGMP snooping configuration example EE EE MEE EE OR EE EE OE EE 260 Network requirements EE OT OT OT ee OT EE em hee RE ET err er eT Te OE 260 Configuration procedure EE EE EE EL EE AE EE ET E E N 261 Verifying the configuration EO OE E E EA E E EE OE RE EE EE 264 Contiguring MLD snooping ER OE OE EE EE RE OE EE EO EK OR T EE N OD NE 266 E By EE RE ER EE EE EE AE EE EN 266 Basic DE e
364. ication 325 authentication access device initiated 324 authentication client initiated 324 authentication configuration 336 authentication initiation 324 Auth Fail VLAN 330 configuration 321 332 configuration global 332 configuration portspecific 333 contiguring Auth Fail VLAN 336 configuring guest VLAN 335 configuring MAC based 802 1X 336 contiguring with ACL assignment 343 controlled uncontrolled port 322 EAP over RADIUS 323 EAP packet format 322 EAP relay authentication 326 EAP relay termination 327 EAP relay termination authentication mode 325 EAP Message attribute 324 EAPOL packet format 323 guest VLAN 329 packet format 322 port authorization status 322 port security advanced control contiguration 428 port security advanced mode configuration 433 port security basic control configuration 425 port security basic mode configuration 430 port security configuration 421 423 430 port security configuration global 424 port security modes 421 port security permitted OUls configuration 429 RADIUS Message Authentication attribute 324 timers 328 using authentication with other features 329 VLAN assignment 329 802 x A 802 1 LLDPDU TLV types 218 802 3 LLDPDU TLV types 218 QoS packet 802 1 p priority 470 AAA contiguration 352 359 ISP domain accounting methods configuration 357 ISP domain authentication methods configuration 355 ISP domain authorizat
365. ice e Voice signaling Media policy type cae N e Guest voice signaling e Soft phone voice e Videoconferencing e Streaming video e Video signaling 230 Field Description PSE power source type POE PSE power source e Primary e Backup PoE power supply priority of PSE ports e Unknown Unknown PSE priority Port PSE priority e Critical Priority level 1 e High Priority level 2 e Low Priority level 3 Click the Neighbor Information tab to display the LLDP neighbor information Table 78 describes the fields Figure 203 The neighbor information tab Local Information Statistic Information Status Information LLDP neighbor information of port 4 GigabitEthernet1 0 4 Neighbor index 1 Update time days 0 hours 0 minutes 19 seconds Chassis type MAC address Chassis ID 0020 1316 5c00 Part ID type Interface name Part ID Efhernet1 0 1 Port description Efiernet1 0 1 Interface System name 52126 System description H3C Switch 52126 Software Version 5 20 99 Release 1103 Copyright cj2004 2014 Hangzhou H3C Tech Co Ltd All rights reserved id Table 78 Field description Field Description Chassis ID type e Chassis component e Interface alias e Port component Chassis type e MAC address e Network address e Interface name e Locally assigned Locally defined chassis type other than those listed above Chassis ID depending on the chassis type which can be a MAC
366. ice maps the MAC address of each user to the VLAN assigned by the authentication server The PVID of the port does not change When a user logs off the MAC to VLAN mapping for the user is removed MAC based e If the port is an access trunk or MAC based VLAN disabled hybrid port the device assigns the first authenticated user s VLAN to the port as the PVID If a different VLAN is assigned to a subsequent user the user cannot pass the authentication To avoid the authentication failure of subsequent users be sure to assign the same VLAN to all 802 1X users on these ports With 802 1X authentication a hybrid port is always assigned to a VLAN as an untagged member After the assignment do not reconfigure the port as a tagged member in the VLAN On a periodic online user re authentication enabled port if a user has been online before you enable the MAC based VLAN function the access device does not create a MAC to VLAN mapping for the user unless the user passes re authentication and the VLAN for the user has changed Guest VLAN You can configure a guest VLAN on a port to accommodate users that have not performed 802 1X authentication so they can access a limited set of network resources such as a software server to download anti virus software and system patches Once a user in the guest VLAN passes 802 1X authentication it is removed from the guest VLAN and can access authorized network resources The way that the network access devi
367. ick the Authentication tab b Select the ISP domain test c Select Default AuthN select the authentication method RADIUS and select the authentication scheme system from the Name list Figure 401 Configuring the authentication method for the ISP domain Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISF domain test Default AuthN RADIUS Name system Secondary Method z E LAN access AuthN Name Secondary Method E Login Auth Name Secondary Method PPP AuthN Name Secondary Method Portal Authh Name Secondary Method d Click Apply A contiguration progress dialog box appears as shown in Figure 402 415 e Figure 402 Configuration progress dialog box Current Configuration setting Default Auth OK After the configuration process is complete click Close Configure AAA authorization method for the ISP domain a b C d Click the Authorization tab Select the ISP domain test Select Default AuthZ select the authorization mode RADIUS and select the authorization scheme system from the Name list Click Apply Figure 403 Configuring the authorization method for the ISP domain Domain Setup Authentication Accounting Authorization Configuration of AAA Select an IEP domain test e Default Autnz RADIUS Name system Secondary Method E LAN access AuthZ Name Secondary Method Login Au
368. igabitEthernet1 0 3 5 A j Add Del Selected gt Secure MAC Address List Click Add 425 The page for applying port security control appears Figure 412 Configuring basic port security control Apply Port Security Control Port GigabitEthernet1 0 2 v Max Number of MAC 5 1 1024 Default 5 Enable Intrusion Protection Disable Port Temporarily Enable Outbound Restriction Only MAC Known Unicasts Items marked with an asterisk are required Apply Cancel 3 Configure basic port security control settings as described in Table 129 4 Click Apply Table 129 Configuration items ltem Description Selects a port where you want to configure port security Port By default port security is disabled on all ports and access to the ports is not restricted Sets the maximum number of secure MAC addresses on the port The number of authenticated users on the port cannot exceed the specified upper limit You can set the maximum number of MAC addresses that port security allows on a port for the following purposes Max Number of MAC e Control the maximum number of concurrent users on the port e Control the number of secure MAC addresses that can be added with port security NOTE The port security s limit on the maximum number of MAC addresses on a port is independent of the MAC learning limit in MAC address table management Specifies whether to enable intrusion protection and selects an action to be taken on
369. iguration Enable MAC Authentication Advanced Offline Detection Period 300 seconds 60 2147483647 Default 300 Quiet Time 60 seconds 1 3600 Default 60 Server Timeout Time 100 seconds 100 300 Default 100 Authentication ISP Domain test Authentication Information Format MAC without hyphen MAC as 0000000 D MAC with hyphen MAC as WOOO Fixed Username Chars 1 55 EO Password Chars 1 63 Ports With MAC Authentication Enabled E Fort Auth Fail VLAN Operation Add Del Selected 2 Configure MAC authentication for GigabitEthernet 1 0 1 a In the Ports With MAC Authentication Enabled area click Add b Select the port GigabitEthernet1 0 1 and click Apply Figure 408 Enabling MAC authentication for port GigabitEthernet 1 0 1 Enable MAC Authentication Port GigabitEthernet1 0 1 hd E Enable MAC VLAN Only hybrid ports support this configration Items marked with an asterisk are required Apply Cancel Verifying the configuration After the host passes authentication ping the FTP server trom the host to see whether ACL 3000 assigned by the authentication server takes effect Ci ping 10 0 0 1 Pinging 10 0 0 1 With 32 bytes of data Request timed out Request timed out 419 Request timed out Request timed out Ping statistics for 10 0 0 1 Packets Sent 4 Received 0 Lost 4 100 loss 420 Configuring port security Overview Port security combines
370. iguration guidelines When you contigure an ACL follow these guidelines e You cannot add a rule with or modify a rule to have the same permit deny statement as an existing rule in the ACL e You can only modify the existing rules of an ACL that uses the match order of config When moditying a rule of such an ACL you can choose to change just some of the settings in which case the other settings remain the same Recommend ACL contiguration procedures Recommended IPv4 ACL configuration procedure Step Remarks Optional 1 Configuring a time range Add a time range A rule referencing a time range takes effect only during the specitied time range Required 2 Adding an IPv4 ACL Add an IPv4 ACL The category of the added ACL depends on the ACL number that you specify 452 Step Remarks 3 Configuring a rule for a basic IPv4 ACL Required 4 Configuring a rule for an advanced Pv4 ACL Complete one of the following tasks according to 5 Configuring a rule for an Ethernet frame header ACL the ACL category Recommended IPv ACL configuration procedure Step Remarks Optional 1 Configuring a time range Add a time range A rule referencing a time range takes effect only during the specified time range Required 2 Adding an IPv6 ACL Add an IPv ACL The category of the added IPv ACL depends on the ACL number that you specify 3 Configuring a rule for a basic IPv6 ACL Required 4 Configuring a rule f
371. il VLAN 336 configuring 802 1X guest VLAN 335 contiguring IGMP snooping 260 contiguring MLD snooping 274 creation 139 DHCP relay agent configuration 297 298 303 DHCP snooping configuration 311 displaying IGMP snooping multicast forwarding entries 259 displaying MLD snooping multicast forwarding entries 2 3 enabling IGMP snooping in a VLAN 257 enabling MLD snooping in a VLAN 270 Ethernet link aggregation class two configuration class 206 frame encapsulation 133 guest 802 1X 329 IGMP snooping configuration 252 IGMP snooping port function configuration 258 IP subnet type VLAN 134 MAC address type VLAN 134 MAC authentication Auth Fail VLAN 405 MLD snooping configuration 266 MLD snooping port function configuration 272 moditication 143 MSTP VLAN to instance mapping table 187 NMM local port mirroring group monitor port 84 NMM local port mirroring group port 81 NMM local port mirroring group source port 84 NMM port mirroring configuration 79 policy type VLAN 134 port isolation configuration 440 441 port link type 135 port type 134 port type VLAN 134 port based configuration 135 portbased VLAN frame handling 136 protocol type VLAN 134 PVID 136 secure MAC address configuration 427 selection 142 VLAN interface configuration 150 contiguration guidelines 155 creation 150 modification 152 Web 533 buttons on webpage 16 common page features 1
372. illegal frames Available actions e Disable Port Temporarily Disables the port for a period of time The period can be configured in the global settings For more information see Configuring global settings for port security Enable Intrusion Protection Disable Port Permanently Disables the port permanently upon detecting an illegal frame received on the port The port does not come up unless you bring it up manually e Block MAC Adds the source MAC addresses of illegal frames to the blocked MAC addresses list and discards the frames All subsequent frames sourced from a blocked MAC address will be dropped A blocked MAC address is restored to normal state after being blocked for 3 minutes The interval is not user configurable 426 ltem Description Specifies whether to enable outbound traffic control and selects a control method Available control methods e Only MAC Known Unicasts Allows only unicast frames with their destination Paabia Oubound MAC addresses being authenticated to pass through ED EE e Only Broadcasts and MAC Known Unicasts Allows only broadcast and unicast packets with their destination MAC addresses being authenticated to pass through e Only Broadcasts Multicasts and MAC Known Unicasts Allows only broadcast multicast and known unicast packets with their destination MAC addresses being authenticated to pass through Contiguring secure MAC addresses 1 From th
373. in Figure 241 when MLD snooping is not enabled the Layer 2 switch floods IPv6 multicast packets to all hosts When MLD snooping is enabled the Layer 2 switch forwards multicast packets of known IPv6 multicast groups to only the receivers of the multicast groups Figure 241 IPv multicast forwarding before and after MLD snooping is enabled IPv6 multicast packet transmission without MLD Snooping IPv6 multicast packet transmission when MLD Snooping runs Multicast router Multicast router Source Source Layer 2 switch Layer 2 switch Receiver Receiver Receiver Receiver Host B Host B gt I Pv6 multicast packets Basic MLD snooping concepts This section lists the basic MLD snooping concepts MLD snooping related ports As shown in Figure 242 MLD snooping runs on Switch A and Switch B Host A and Host C are receivers in an IPv multicast group 266 Figure 242 MLD snooping related ports Switch A Router A FI GE1 0 1 man gt uN ROUTER N GE1 0 3 GE1 0 1 S V GE1 0 2 wa g w Receiver GE1 0 2 p Source Switch B O Router port O Member port gt Pv6 multicast packets Host D Receiver Host B The following describes the ports involved in MLD snooping e Router port Layer 3 multicast device side port Layer 3 multicast devices include designated routers and MLD queriers As shown in Figure 24
374. inate loops in a physical link redundant network by selectively blocking redundant links and putting them in a standby state The recent versions of STP include the Rapid Spanning Tree Protocol RSTP and the Multiple Spanning Tree Protocol MSTP Introduction to STP STP was developed based on the 802 1d standard of IEEE to eliminate loops at the data link layer in a LAN Networks often have redundant links as backups in case of failures but loops are a very serious problem Devices running STP detect loops in the network by exchanging information with one another and eliminate loops by selectively blocking certain ports to prune the loop structure into a loop free tree structure This avoids proliferation and infinite cycling of packets that would occur in a loop network In the narrow sense STP refers to IEEE 802 1d STP In the broad sense STP refers to the IEEE 802 1d STP and various enhanced spanning tree protocols derived from that protocol STP protocol packets STP uses bridge protocol data units BPDUs also known as configuration messages as its protocol packets This chapter uses BPDUs to represent all types of spanning tree protocol packets STP enabled network devices exchange BPDUs to establish a spanning tree BPDUs contain sufficient information for the network devices to complete spanning tree calculation STP uses the following types of BPDUs e Configuration BPDUs Used for calculating a spanning tree and maintaini
375. ing and Weighted Round Robin WRR queuing are introduced SP queuing SP queuing is designed for mission critical applications which require preferential service to reduce response delay when congestion occurs 471 Figure 458 SP queuing Queue 7 High priority Packets to be sent through this port Sent packets Interface Coce oegool Gn ee O Packet Queue engang queue classification scheduling Low priority A typical switch provides eight queues per port As shown in Figure 458 SP queuing classifies eight queues on a port into eight classes numbered 7 to O in descending priority order SP queuing schedules the eight queues strictly according to the descending order of priority It sends packets in the queue with the highest priority first When the queue with the highest priority is empty it sends packets in the queue with the second highest priority and so on You can assign mission critical packets to the high priority queue to make sure they are always served first and common service such as Email packets to the low priority queues to be transmitted when the high priority queues are empty The disadvantage of SP queuing is that packets in the lower priority queues cannot be transmitted if the higher priority queues have packets This might cause lower priority traffic to starve to death WRR queuing WRR queuing schedules all the queues in turn to make sure every queue can be served for a certain time
376. ing options Red e Discard Drops the exceeding packet e Pass Permits the exceeding packet to pass through Pass This function is not supported in the current software version and it is reserved for future support Configure the packet filtering action After selecting the Filter box select one item in the following list Filter e Permit Forwards the packet e Deny Drops the packet e Not Set Cancels the packet filtering action Adding a policy Select QoS gt QoS Policy from the navigation tree 2 Click the Add tab to enter the page for adding a policy Figure 468 Adding a policy Summary Setup Remove PoliyNamel MM Chars Add 3 Adda policy as described in Table 156 A Click Add 483 Table 156 Configuration items ltem Description Specify a name for the policy to be added Policy Name Some devices have their own system detined policies The policy name you specify cannot overlap with system defined ones The system defined policy is the policy default Contiguring classitier behavior associations for the policy 1 Select QoS gt QoS Policy from the navigation tree 2 Click Setup to enter the page for setting a policy Figure 469 Setting a policy Summary Add Remove Please selecta policy select a policy v Classifier Mame one Chars Classifier Behavior 3 Configure a classifier behavior association for a policy as described in Table 157 4 Click Apply Table 157 Config
377. ings MAC learning limit and storm suppression ratios e Foran aggregate interface these operation parameters include its state link type PVID description and MAC learning limit Setting operation parameters for a port 1 Select Device gt Port Management from the navigation tree 2 Click the Setup tab 69 Figure 58 The Setup tab Summary Detail Me Setup a Basic Configuration Por State No Change Speed No Change Duplex No Change Link Type No Change PYID 1 4094 Description Chars 1 80 A anred Configuration MDI No Change Fone NO Change Power Save No Change Count NoChange 0 8192 EEE No Change Siorm Suppression Broadcast No Change Multicast No Change Unicast No Change Suppression Suppression Suppression pps range 1 146810 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port kbps range 1 100000 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port Select All Seled Home Unit s lected Ports 1 e Amay take some me if vou apply the above sainga to multiple ports Cancel 3 Set the operation parameters for the port as described in Table 15 4 Click Apply Table 15 Configuration items ltem Descri ption Enable or disable the port Port State Sometimes after you modify the operation parameters of a port you must disable and then enable the port to have the modifications take effect 70 ltem Descri ption Set t
378. ining match criteria for classifying traffic you can use IP precedence bits in the type of service ToS field of the IP packet header or other header information such as IP addresses MAC addresses IP protocol field and port numbers You can define a class for packets with the same quintuple source address source port number protocol number destination address and destination port number for example or for all packets to a certain network segment 468 When packets are classified on the network boundary the precedence bits in the ToS field of the IP packet header are generally re set In this way IP precedence can be directly used to classity the packets in the network IP precedence can also be used in queuing to prioritize trattic The downstream network can either use the classification results from its upstream network or classify the packets again according to its own criteria To provide differentiated services traffic classes must be associated with certain traffic control actions or resource allocation actions What traffic control actions to use depends on the current phase and the resources of the network For example CAR polices packets when they enter the network GTS is performed on packets when they flow out of the node Queue scheduling is performed when congestion happens Congestion avoidance measures are taken when the congestion deteriorates Packet precedences IP precedence and DSCP values Figure 455 ToS field and D
379. ink local address for the VLAN interface Address box Address This field is available after you select the Manual option The prefix of the IPv6 link local address you enter must be FE80 64 Modifying a VLAN interface By modifying a VLAN interface you can assign an IPv4 address an IPv6 link local address and an IPv site local address or global unicast address to the VLAN interface and shut down or bring up the VLAN intertace After you modify the IPv4 address and status or the IPv address and status or add an IPv unicast address for a selected VLAN interface on the page for modifying VLAN interfaces you must click the correct Apply button to submit the modification After you change the IP address of the VLAN interface you are using to log in to the device you will be disconnected trom the device You can use the changed IP address to re log in To modify a VLAN interface 1 From the navigation tree select Network gt VLAN Interface 2 Click Modify to enter the page for modifying a VLAN interface 152 Figure 147 Modifying a VLAN interface SUMMary Create Remove select VLAN Interface 1 Modify IPv4 Address Modify IPvb Address Modity Primary IP And Status Modity IPv Link Local Address And Status DHCP BOOTP Manual Auto Manual Admin status Up sl Admin Status Apply Add IPv6 Unicast Address ELI E4 IPv6 Address 3 Modify a VLAN interface as described in Table 44 4 Click Apply Table 44 C
380. interface through which a matching IP packet is to be forwarded Next hop Specifies the address of the next hop router on the path Static route Static routes are manually configured If a network s topology is simple you only need to configure static routes for the network to work correctly 278 Static routes cannot adapt to network topology changes If a fault or a topological change occurs in the network the network administrator must modity the static routes manually Default route A detault route is used to forward packets that do not match any specitic routing entry in the routing table Without a default route packets that do not match any routing entries are discarded You can configure default routes in the Web interface in the following ways e Configure an IPv4 static default route and specify both its destination IP address and mask as 0 0 0 0 e Configure an IPv static default route and specify both its destination IP address and prefix as 0 Displaying the IPv4 active route table Select Network gt IPv4 Routing from the navigation tree to enter the page Figure 254 IPv4 active route table Create Remove Destination Search Advanced Search Destination Mask Protocal Priority Next Hap Interface 127 0 0 0 255 0 0 0 Direct 0 127 0 0 1 InLoopBack0 127 0 0 1 255 255 255 255 Direct 0 127 0 0 1 InLoopBack0 192 168 10 255 255 255 0 Direct 0 192 168 12 Vlan interface100 192 168 12 255 255 255 255 Di
381. ion MDI No Change eel No Change v Power Save No Change v ese No Change 0 8192 Storm Suppression Broadcast No Change Multicast No Change Unicast ME ls Suppression Suppression Suppression pps range 1 148810 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port Kbps range 1 100000 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port HAAA OE EE BUCO 0900 DEERE Select All Select None Unit Selected Ports 1 e lit may take some time if you apply the above settings to multiple ports Apply Cancel Create VLAN 2 VLAN 6 through VLAN 50 and VLAN 100 a From the navigation tree select Network gt VLAN b Click Create to enter the page for creating VLANs c Enter VLAN IDs 2 6 50 100 d Click Apply 146 Figure 142 Creating VLAN 2 VLAN 6 through VLAN 50 and VLAN 100 Select WYLAN Fort Detail Detail Modity WYLAN Modity Port Remove Create VLAN IDs 2 6 50 100 Example 3 5 10 Create ID Description 1 VLAN OOO1 Modity WYLAN description Mote you can do this later on the Modify VLAN page Modify the description of the selected VLAN ID Description 92 ars 3 Assign GigabitEthernet 1 0 1 to VLAN 100 as an untagged member a Click Select VLAN to enter the page for selecting VLANs b Select the option before Display a subnet of all configured VLANs and enter 1 100 in the field c Click Select Figure 143 Setting a VLAN range Create Port Detail Detail Modify V
382. ion Port 1 GigabitEthernet1 0 Port status of LLDP Enable Admin status Tx_Only Trap flag No Palling interval 0s Number of neighbors 0 Number of MED neighbors 70 Number of CDP neighbors 70 Number of sent optional TLV 23 Number of received unknown TLV 0 Display the status information of port GigabitEthernet 1 0 2 on Switch A a Click the GigabitEthernet1 0 2 port name in the port list b Click the Status Information tab at the lower halt of the page The output shows that port GigabitEthernet 1 0 2 is connected to a non MED neighbor device Switch B as shown in Figure 214 Figure 214 The status information tab 2 Local Information Neighbor Information Statistic Information Port 2 GigabitEthernett 0 2 Port status of LLDP Enable Admin status Rx Only Trap flag No Folling interval Os Number of neighbors 1 Number of MED neighbors 70 Number of CDP neighbors 70 Number of sent optional TLV 23 Number of received unknown TLV 0 Tear down the link between Switch A and Switch B Click Refresh to display the status information of port GigabitEthernet 1 0 2 on Switch A The updated status information of port GigabitEthernet 1 0 2 shows that no neighbor device is connected to the port as shown in Figure 215 Figure 215 The status information tab displaying the updated port status information Local Information Neighbor Information Statistic Information Port 2 GigabitEthemett 0 2 Port
383. ion C Enable Port Security wAdvanced Temporarily Disabling Port Time 20 seconds 20 300 Default 20 Traps Switch L1MAC Learned 802 1 Auth Failure 802 1 Logoff 1 802 1 Logon Clintrusion C MAC Auh Failure CI MAC Auth Logoff CI MAC Auth Logon Apply Configure global port security settings as described in Table 128 Click Apply Table 128 Configuration items ltem Descri ption Specifies whether to enable the port security feature globally Enable Port Security By default port security is disabled Configures intrusion protection actions globally Intrusion protection actions e Temporarily Disabling Port Time Sets the time length for how long the port is disabled temporarily upon receiving illegal frames Traps Switch Selects one or more events to trigger trap sending The following is the available events o MAC Learned Advanced o 802 1X Auth Failure o 8021X Logoff o 802 1X Logon o Intrusion o MAC Auth Failure o MAC Auth Logoff o MAC Auth Logon Configuring basic port security control 1 From the navigation tree select Authentication gt Port Security On the Port Security page the Security Ports And Secure MAC Address List area displays the port security control settings as shown in Figure 41 1 Figure 411 Security Ports And Secure MAC Address List area Security Ports And Secure MAC Address List Max Number of Port MAC Intrusion Protection Outbound Restriction Operation G
384. ion methods configuration 356 ISP domain configuration 354 RADIUS implementation 363 374 user management by ISP domains 353 absolute time range ACL 452 absolute time range configuration ACL 453 access control methods 802 1X 321 accounting ACL 506 AAA configuration 352 359 AAA ISP domain accounting methods configuration 357 RADIUS common parameter configuration 369 RADIUS scheme configuration 368 RADIUS server contiguration 373 802 1X assignment 331 advanced configuration 456 463 assignment MAC authentication 405 automatic rule numbering 451 451 automatic rule renumbering 451 basic configuration 455 462 categories 450 configuration 450 489 configuring 802 1X assignment 343 Ethernet frame header configuration 459 match order 450 packet fragment filtering 452 rule numbering step 451 security MAC authentication 411 time range configuration 453 time based ACL rules 452 adding IPv4 ACL 454 IPv ACL 46 NMM local port mirroring local group 83 QoS policy 483 QoS traffic behavior 480 QoS traffic class 478 RADIUS server 373 rules to SNMP view 116 Web device local user 86 address DHCP allocation 292 DHCP lease extension 293 Address Resolution Protocol Use ARP advanced port security advanced mode 421 port security advanced mode configuration 433 advanced ACL category 450 aggregate interface Ethernet link aggregation 209 aggreg
385. is Domain Mame Default Domain Configure AAA authentication method for the ISP domain a Click the Authentication tab b Select test from the Select an ISP domain list c Select Default AuthN select authentication method RADIUS from the Default AuthN list and select the authentication scheme system from the Name list as shown in Figure 316 Figure 316 Configuring AAA authentication method for the ISP domain Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain test V Default Auth RADIUS Name system Secondary Method LAN access AuthN Name Secondary Method El Login Authn Name Secondary Method PPP Auth Name Secondary Method Portal Auth Name Secondary Method Apply d Click Apply A contiguration progress dialog box appears as shown in Figure 317 34 4 Figure 317 Configuration progress dialog box Curent Configuration Setting Default Authi OK e After the configuration process is complete click Close Configure AAA authorization method for the ISP domain a Click the Authorization tab b Select test from the Select an ISP domain list c Select Default AuthZ select the authorization method RADIUS from the Default AuthZ list and select the authorization scheme system from the Name list as shown in Figure 318 Figure 318 Configuring the AAA authorization method for the ISP domain Domain Setup Authentication Accounting Authorization Configuratio
386. is the port BP2 on Device B 178 Figure 173 Designated bridges and designated ports Device B Path cost Device A Device C Path cost is a reference value used for link selection in STP STP calculates path costs to select the most robust links and block redundant links that are less robust to prune the network into a loop free tree All the ports on the root bridge are designated ports Calculation process of the STP algorithm The spanning tree calculation process described in the following sections is a simplified process for example only Calculation process The STP algorithm uses the following calculation process l Network initialization Upon initialization of a device each port generates a BPDU with the port as the designated port the device as the root bridge O as the root path cost and the device ID as the designated bridge ID Root bridge selection Initially each STP enabled device on the network assumes itself to be the root bridge with its own device ID as the root bridge ID By exchanging configuration BPDUs the devices compare their root bridge IDs to elect the device with the smallest root bridge ID as the root bridge Root port and designated ports selection on the non root bridges Step Description A non root bridge device regards the port on which it received the optimum contiguration BPDU as the root port Table 54 describes how the optimum configuration BPDU is selected
387. isable Query Interval Seconds 2 300 Default 60 General Query Source IF 0 0 0 0 IP Address Default 0 0 0 0 Special Query Source IF 0 0 0 0 IP Address Default 0 0 0 0 items marked with an asterisk are required Apply Cancel Veritying the contiguration From the navigation tree select Network gt IGMP snooping 2 Click Show Entries in the basic VLAN configuration page to display information about IGMP snooping multicast forwarding entries Figure 239 Displaying IGMP snooping multicast forwarding entries Show Entries R VLAN ID v Search Advanced Search WYLAN ID SOuUrCE Group Operation 100 0 0 0 0 224 1 1 1 S 3 Clickthe icon for the multicast entry 0 0 0 0 224 1 1 1 to display detailed information about this entry Figure 240 Displaying detailed information about the entry Advanced Entry Details VLAN ID 100 source Address 0 0 0 0 Group Address 224 1 1 1 Router Portis GigabitEthernet1 0 Member Port s GigabitEthernet1 0 3 Back 264 The output shows that GigabitEthernet 1 0 3 of Switch A is listening to the multicast streams destined for multicast group 224 1 1 1 265 Configuring MLD snooping Overview MLD snooping runs on a Layer 2 switch as an IPv multicast constraining mechanism to improve multicast forwarding efficiency It creates Layer 2 multicast forwarding entries from MLD messages that are exchanged between the hosts and the router As shown
388. isplaying client s IP to MAC bindings 302 310 enabling DHCP 299 enabling DHCP relay agent on interface 301 enabling DHCP snooping 309 Ethernet link aggregation aggregate interface 209 Ethernet link aggregation dynamic mode 207 Ethernet link aggregation LACP 205 Ethernet link aggregation LACP priority 21 520 Ethernet link aggregation LACP enabled port 211 Ethernet link aggregation modes 206 Ethernet link aggregation operational key 205 Ethernet link aggregation static mode 206 gratuitous ARP packet 244 gratuitous ARP packet learning 244 IP services ARP entry configuration 244 IP services ARP entry removal 245 MAC address table dynamic aging timer 175 MAC address table entry types 174 MAC authentication timers 405 MST region configuration 191 NMM local port mirroring group monitor port 84 NMM local port mirroring group port 81 NMM local port mirroring group source port 84 port operation parameters 69 3 port security features 421 port security mode 421 QoS traffic class configuration 479 QoS traffic evaluation 473 RSTP network convergence 184 secure MAC address configuration 427 security 802 1X architecture 32 security 802 1X EAP relay authentication 326 security ARP detection configuration 250 security ARP packet validity check 250 security ARP user validity check 250 security MAC authentication methods 404 specitied operation parameter for all ports 73 stack global parame
389. itiated by EAP termination server that supports PAP or an HP iNode 802 1X client CHAP authentication mad e The processing is complex on the network access device EAP relay Figure 306 shows the basic 802 1X authentication procedure in EAP relay mode assuming that EAP MD5 is used Figure 306 802 1X authentication procedure in EAP relay mode Client Device Authentication server 1 EAPOL Start I 2 EAP Reguest ldentity 3 EAP Response ldentity s 4 RADIUS Access Request EAP Response ldentity 5 RADIUS Access Challenge EAP Request MD5 challenge 6 EAP Request MD5 challenge 7 EAP Response MD5 challenge 8 RADIUS Access Request EAP Response MD5 challenge OO EE EER R 9 RADIUS Access Accept EAP Success 10 EAP Success te am mm mm EE Sm ee 11 EAP Request Identity 12 EAP Response ldentity 7 13 EAPOL Logoff H me m m o au i me ie ee ee 14 EAP Failure gere 1 When a user launches the 802 1X client software and enters a registered username and password the 802 1X client software sends an EAPOL Start packet to the network access device 2 The network access device responds with an Identity EAP Request packet to ask for the client username 3 In response to the Identity EAP Request packet the client sends the username in an Identity EAP Response packet to the network access device 4 The network access device relays the Ide
390. itor Management Management Management Management Loopback VCT Flow Interval RMON Energy Saving SNMP Interface Statistics Switch To Management Loopback VCT Port Traffic Statistics Statistics History Alarm Event Log Energy Saving Setup Community Group User Trap View Interface Statistics Switch the current user level to the management level Perform loopback tests on Ethernet interfaces Check the status of the cables connected to Ethernet ports Display the average rate at which the interface receives and sends packets within a specified time interval Display create modify and clear RMON statistics Display create modify and clear RMON history sampling information Display create modify and clear alarm entries Display create modify and clear event entries Display log information about RMON events Display and configure the energy saving settings of an interface Display and refresh SNMP configuration and statistics information Configure SNMP Display SNMP community information Create modify and delete an SNMP community Display SNMP group information Create modify and delete an SNMP group Display SNMP user information Create modify and delete an SNMP user Display the status of the SNMP trap function and information about target hosts Enable or disable the SNMP trap function create modify and delete a
391. k Apply Figure 116 Configuring the SNMP agent Community Group User Trap View Enable Disable Local Engine ID 3830303036334 132363531333030303C 10 64 Hex Chars Bytes 484 17940 Default 1500 Maximum Packet Size 1500 Contact 1 200Chars Location 1 200Chars SNMP Version Vivi Mivwe Ha Note If you disable SNMP all SNMP related configurations will not be saved Items marked with an asterisk are required Apply Cancel Contigure a read only community b Click the Community tab Click Add The Add SNMP Community page appears Enter public in the Community Name field and select Read only from the Access Right list Click Apply 124 3 4 Figure 117 Configuring an SNMP read only community Setup Group ser Trap ME Add SHMP Community Community Name public MM aachars Access Right Read only w View iewDetault ACL 2000 2999 tems marked with an asterisk are required Apply Cancel Configure a read and write community a Click Add on the Community tab page The Add SNMP Community page appears b Enter private in the Community Name field and select Read and write from the Access Right list c Click Apply Figure 118 Configuring an SNMP read and write community Setup Group User Trap View Add SHMP Community Community Name private t 32Chars Access Right Read and write w View ViewDetault ACL oo laoor seg tems marked with an asterisk are r
392. k Apply to add the VLAN ID VLAN to instance mapping entries to the list The device automatically maps 4094 VLANs to the corresponding MSTls based on the modulo value Modulo A Click Activate Contiguring MSTP globally 1 From the navigation tree select Network gt MSTP 2 Click the Global tab 192 Figure 180 Configuring MSTP globally Region Port Summary Port Setup Global MSTF Configuration BPDU Protection Disable Made Max Hops Path Cost Standard LJ Bridge Diameter Timertin centiseconds Forward Delay 1500 400 3000 Must be a multiple of 100 Hello Time 200 100 4000 Must be a multiple of 100 Max Age 2000s 00 4 000 Must be a multiple of 100 instance Instance ID Root Type Bridge Priority TG Protection Threshold 1 255 default 6 Apply Configure the global MSTP configuration as described in Table 59 and then click Apply Table 59 Configuration items ltem Descri ption Selects whether to enable STP globally Enable STP Globally Other MSTP configurations take effect only after you enable STP globally Selects whether to enable BPDU guard BPDU Guard BPDU guard can protect the device from malicious BPDU attacks making the network topology stable 193 liem Description Sets the operating mode of STP e STP Each port on a device sends out STP BPDUs e RSTP Each port on a device sends out RSTP BPDUs and automatically es migrates to
393. ked with an asterisk are required Apply Cancel 4 Configure an SNMP user a Click the User tab b Click Add The page in Figure 126 appears c Type user in the User Name field select Auth Priv from the Security Level list select group from the Group Name list select MD5 from the Authentication Mode list type authkey in the Authentication Password and Confirm Authentication Password fields select DES56 from the Privacy Mode list and type prikey in the Privacy Password and Confirm Privacy Password fields d Click Apply 129 5 6 Figure 126 Creating an SNMP user Setup Community Group Trap WIE Add SNMP User User Mame lusert 1 32Chars Security Level AuUthiPriv k Group Name group 1 NoAuth MoPriv Authentication Mode MOS vw Authentication Password eessees JH BAChars Confirm Authentication Password eessees JH BAChars Privacy Mode Privacy Password ecseee lH BAChars Confirm Privacy Password essees lH BAChars ACL sl a 2999 tems marked with an asterisk are required Apply Cancel Enable SNMP traps a Click the Trap tab The Trap tab page appears b Select Enable SNMP Trap c Click Apply Figure 127 Enabling SNMP traps Setup Community Group ser MR V Enable SNMP Trap Apply Trap Target Host a Destination IP Address Search Advanced SaaFh Destination IF UDP Security Security l C tade IPFVAIPYE Domain Security Mame Port Model ree Operation Add Delete Selec
394. l Copies packets both received and sent on a mirroring source Mirroring group Port mirroring is implemented through mirroring groups which include local and remote mirroring groups Only local mirroring groups are supported Local port mirroring In local port mirroring the mirroring source and the mirroring destination are on the same device A mirroring group that contains the mirroring source and the mirroring destination on the device is called a local mirroring group 79 Figure 65 Local port mirroring implementation Mirroring process in the device O GE1 0 1 GE1 0 2 GE1 0 1 Data monitoring Host Device device Original packets Source port p Mirrored packets C Monitor port As shown in Figure 65 the source port GigabitEthernet 1 0 1 and monitor port GigabitEthernet 1 0 2 reside on the same device Packets of GigabitEthernet 1 0 1 are copied to GigabitEthernet 1 0 2 which then forwards the packets to the data monitoring device for analysis Contiguration restrictions and guidelines When you configure port mirroring follow these restrictions and guidelines e A local mirroring group can contain multiple source ports but only one monitor port e Do not enable the spanning tree feature on the monitor port e Use a monitor port only for port mirroring to make sure the data monitoring device receives and analyzes only the mirrored traffic rather than a mix of mirrored traffic and
395. l Query Source Address IPv6 linklocal address Default FESO 2FF FFFF FE00 1 Special Query Source Address Pv6 linklocal address Default FEBOC2FF FEFF FEOO 1 Items marked with an asterisk are required Apply Cancel 3 Configure the parameters as described in Table 86 4 Click Apply Table 86 Configuration items ltem Description Enable or disable MLD snooping in the VLAN MLD snooping You can proceed with the subsequent configurations only if Enable is selected here The default setting is MLDv1 By configuring an MLD snooping version you actually configure the versions of MLD messages that MLD snooping can process e MLDv1 snooping can process MLDv1 messages but it floods MLDv2 messages in Veron the VLAN instead of processing them e MLDv2 snooping can process MLDv1 and MLDv2 messages O IMPORTANT If you change the MLDv2 snooping to MLDv1 snooping the system clears all MLD snooping forwarding entries that are dynamically added Enable or disable the MLD snooping querier function In an IPv multicast network that runs MLD a Layer 3 device acts as the MLD querier to send MLD queries and establish and maintain IPv6 multicast forwarding entries ensuring correct IPv6 multicast traffic forwarding at the network layer Querier On an IPv network without Layer 3 multicast devices MLD querier cannot work because a Layer 2 device does not support MLD To address this issue you can enable MLD snooping querier on a
396. l device information as TLV type length and value triplets in LLDP Data Units LLDPDUs to the directly connected devices Local device information includes its system capabilities management IP address device ID port ID and so on The device stores the device information in LLDPDUs from the LLDP neighbors in a standard MIB LLDP enables a network management system to quickly detect and identity Layer 2 network topology changes For more information about MIBs see Configuring SNMP Basic concepts LLDP frame formats LLDP sends device information in LLDP frames LLDP frames are encapsulated in Ethernet Il or SNAP frames e LLDP frames encapsulated in Ethernet II Figure 195 LLDP frame encapsulated in Ethernet II 0 15 31 Destination MAC address Source MAC address Data LLDPU 1500 bytes Table 69 Fields in an Ethernet Il encapsulated LLDP frame Field Description MAC address to which the LLDP frame is advertised It is fixed to Ox0180 C200 O00E a multicast MAC address Source MAC address MAC address of the sending port Destination MAC address Type Ethernet type for the upper layer protocol It is Ox88CC for LLDP 217 LLDPDUS TLVs Field Description Data LLDPDU Frame check sequence a 32 bit CRC value used to determine the validity of the received Ethernet frame FCS e LLDP frames encapsulated in SNAP Figure 196 LLDP frame encapsulated in SNAP 0 15 31 Destination MAC address Source MA
397. l key 205 Ethernet link aggregation port configuration class 206 523 Ethernet link aggregation static mode 206 Ethernet link dynamic aggregation group configuration 208 Ethernet link static aggregation group contiguration 208 IGMP snooping configuration 252 IGMP snooping member port 252 IGMP snooping port function configuration 258 IGMP snooping related ports 252 IGMP snooping router port 252 IP multicast IGMP snooping aging timer for dynamic port 253 IPv multicast MLD snooping aging timer for dynamic port 267 isolation See port isolation LLDP contiguration 217 236 LLDP disable operating mode 221 LLDP enable 223 LLDP frame reception 222 LLDP frame transmission 221 LLDP parameter setting for a single port 224 LLDP parameter setting for ports in batch 227 LLDP Rx operating mode 221 LLDP Tx operating mode 221 LLDP TxRx operating mode 221 loopback detection contiguration 447 447 loopback test configuration 89 89 MAC address learning 173 MAC address table configuration 173 174 175 MAC authentication contiguration 408 management 69 5 mirroring See port mirroring MLD snooping contiguration 266 MLD snooping member port 266 MLD snooping port function configuration 272 MLD snooping related ports 266 MLD snooping router port 266 modification 144 MST port roles 187 MST port states 188 operation parameters 69 3 RSTP network convergence 184 security
398. l mode reducing the consumption of system resources due to source MAC addresses checking HP recommends not transmitting both voice packets and non voice packets in a voice VLAN If you have to first make sure that the voice VLAN security mode is disabled Table 48 How a voice VLAN enable port processes packets in security normal mode Voice VLAN operating mode __ Packet type Packet processing mode Untagged packets If the source MAC address of a packet matches an OUI address configured for the device it is Packets carrying the voice VLAN tag forwarded in the voice VLAN otherwise it is dropped Security mode If the packet is a voice packet does not carry the voice VLAN tag or PVID tag the packet is dropped Packets carrying other tags Otherwise the packet is forwarded or dropped depending on whether the port allows packets of these VLANs to pass through Untagged packets The port does not check the source MAC addresses of inbound packets All types of packets can Packets carrying the voice VLAN tag be transmitted in the voice VLAN Normal mode Forwarded or dropped depending Packets carrying other tags on whether the port allows packets of these VLANs to pass through Recommended voice VLAN configuration procedure Before configuring the voice VLAN you must create the VLAN and configure the link type of each port to be assigned to the VLAN Because VLAN 1 is the system detault VLAN you do not need to create it how
399. laying all the operation parameters for a port Select Device gt Port Management from the navigation tree Click the Detail tab Select a port whose operation parameters you want to view in the chassis front panel The operation parameter settings of the selected port are displayed on the lower part of the page Whether the parameter takes effect is displayed in the square brackets Figure 60 The Detail tab Summary Setup Select a Port eee db H k k d Port State PVID Flow Control Link Type MDI Speed Duplex Max MAC Count Broadcast Suppression Multicast Suppression Power Save EEE Unicast Suppression Description The table shows the configured values for the selected port while those inside the square brackets are the actual values of the selected port 74 Port management configuration example Network requirements As shown in Figure 61 e Server A Server B and Server C are connected to GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 of the switch respectively The rates of the network adapters of these servers are all 1000 Mbps e The switch connects to the external network through GigabitEthernet 1 0 4 whose speed is 1000 Mbps To avoid congestion at the egress port GigabitEthernet 1 0 4 configure the autonegotiation speed range on GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 as 100 Mbps Figure 61 Network diagram IP network GE1 0 4 S
400. le If the timer expires during MAC authentication the user cannot access the network Using MAC authentication with other features VLAN assignment You can specify a VLAN in the user account for a MAC authentication user to control its access to network resources After the user passes MAC authentication the authentication server either the local access device or a RADIUS server assigns the VLAN to the port as the default VLAN After the user logs off the initial default VLAN or the default VLAN configured before any VLAN is assigned by the authentication server restores If the authentication server assigns no VLAN the initial default VLAN applies A hybrid port is always assigned to a server assigned VLAN as an untagged member After the assignment do not re configure the port as a tagged member in the VLAN If MAC based VLAN is enabled on a hybrid port the device maps the server assigned VLAN to the MAC address of the user The default VLAN of the hybrid port does not change ACL assignment You can specify an ACL in the user account for a MAC authentication user to control its access to network resources After the user passes MAC authentication the authentication server either the local access device or a RADIUS server assigns the ACL to the access port to filter the traffic from this user You must configure the ACL on the access device for the ACL assignment function You can change ACL rules while the user is online Auth
401. le reboot the switch to validate the upgraded image 33 Configuration wizard The contiguration wizard guides you through configuring the basic service parameters including the system name system location contact information and management IP address Basic service setup Entering the configuration wizard homepage Select Wizard from the navigation tree Figure 21 Configuration wizard homepage Welcome to the Management IP Interface Setup Wizard Step 1 of 4 This ward helps you set modify or quickhy view the IP configuration parameters Te continue click Next Next gt Cancel Contiguring system parameters 1 On the wizard homepage click Next 34 Figure 22 System parameter configuration page System Parameters Step 2 of 4 Sysname sysname 1 20Char Syslocation Server room 501 i 200Char Syscontact Hewlett Packard Development Company L P 1 200Char lt Back Next gt Cancel 2 Configure the parameters as described in Table 3 Table 3 Configuration items ltem Descri ption Specify the system name The system name appears at the top of the navigation tree Sysname You can also set the system name in the System Name page you enter by selecting Device gt Basic For more information see Configuring basic device settings Specify the physical location of the system Syslocation You can also set the physical location in the setup page you enter by selecting Device gt SNMP For more in
402. le destination packet flooding in a switched LAN an Ethernet device uses a MAC address table to forward frames This table describes from which port a MAC address or host can be reached Upon receiving a frame the device uses the destination MAC address of the frame to look for a match in the MAC address table If a match is found the device forwards the frame out of the outgoing interface in the matching entry If no match is found the device floods the frame out of all but the incoming port How a MAC address entry is created The device automatically learns entries in the MAC address table or you can add them manually MAC address learning The device can automatically populate its MAC address table by learning the source MAC addresses of incoming frames on each port When a frame arrives at a port for example Port A the device performs the following tasks 1 Verifies the source MAC address for example MAC SOURCE of the frame 2 looks up the source MAC address in the MAC address table o If an entry is found the device updates the entry o If no entry is found the device adds an entry for MAC SOURCE and Port A 3 When the device receives a frame destined for MAC SOURCE atter learning this source MAC address the device finds the MAC SOURCE entry in the MAC address table and forwards the frame out of Port A The device performs this learning process each time it receives a frame from an unknown source MAC address until the
403. lients such as shared keys and IP addresses e Dictionary Stores RADIUS protocol attributes and their values 363 Security and authentication mechanisms The RADIUS client and the RADIUS server use a shared key to authenticate RADIUS packets and encrypt user passwords exchanged between them For security this key must be manually configured on the client and the server RADIUS servers support multiple authentication protocols including PPP PAP and CHAP A RADIUS server can act as the client of another AAA server to provide authentication proxy services Basic RADIUS message exchange process Figure 347 illustrates the interactions between the host the RADIUS client and the RADIUS server Figure 347 Basic RADIUS message exchange process Host RADIUS client RADIUS server 1 Username and password ans 2 Access Request 3 Access Accept Reject 4 Accounting Request start a 5 Accounting Response 6 The host accesses the resources 7 Accounting Request stop 8 Accounting Response 9 Notification of access termination RADIUS operates in the following manner 1 The host initiates a connection request that carries the user s username and password to the RADIUS client 2 Having received the username and password the RADIUS client sends an authentication request Access Request to the RADIUS server with the user password encrypted using the MD5 algorithm and the shared key 3 The RA
404. limit 64 time 2001 4 ping statistics 5 packet s transmitted 5 packet s received 0 00 packet loss round trip min avg max 2 8 15 ms The output shows that IPv address 2001 4 is reachable and the echo replies are all returned from the destination The minimum average and maximum roundtrip intervals are 2 millisecond 8 milliseconds and 15 milliseconds respectively quit Syntax quit Parameters None Description Use quit to log out of the system Examples Log out of the system lt Sysname gt quit KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK Copyright c 2010 2014 Hewlett Packard Development Company L P x Without the owner s prior written consent i no decompiling or reverse engineering shall be allowed N RR RR KOK KOK KRKK KK K OK KERK KOK K KOK K OK KOK KOK K KOK KOK K RR KOK KOK RR KOK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK User interface auxO0 is available 28 reboot Syntax reboot Parameters None Description Use reboot to reboot the device and run the main configuration file Use the command with caution because reboot results in service interruption It the main configuration tile is corrupted or does not exist the device cannot be rebooted with the reboot command In this case you can specify a new main configuration file to reboot the device or you can power off the device and then power it on and the system will automatically use the backup con
405. ling Event If you select the Create Default Event box this option is not configurable Displaying RMON statistics 1 Select Device gt RMON from the navigation tree The page in Figure 80 appears 2 Click the icon for the statistics entry of an interface 101 Figure 88 RMON statistics Statistics History Event Log Add an Alarm Group Alarm Variable Static Item Number of Packet Discarding Events v Interface Name GigabitEthernet1 0 1 v Sample Item Interval Seconds 5 65535 Sample Type Absolute v Owner Chars 1 127 Alarm Create Default Event Rising Threshold 0 2147483647 Rising Event 1 v Falling Threshold 0 2147483647 Falling Event 1 v e Before creating Alarm please create Statistic and Event at fisrt Items marked with an asterisk are required Apply Cancel Table 28 Field description Field Description Total number of octets received by the interface Number of Received Bytes corresponding to the MIB node etherStatsOctets Total number of packets received by the interface Number of Received Packets corresponding to the MIB node etherStatsPkts Total number of broadcast packets received by the Number of Received Broadcasting Packets interface corresponding to the MIB node etherStatsBroadcastPkts Total number of multicast packets received by the Number of Received Multicast Packets interface corresponding to the MIB node etherStatsMulticastPkts Total number of
406. ling MLD snooping in a VLAN 270 MLD snooping contiguration 266 MLD snooping port function configuration 272 IRF DHCP overview 292 isolating ports See port isolation isolation group configuration 440 ISP AAA ISP domain accounting methods configuration 357 AAA ISP domain authentication methods configuration 355 AAA ISP domain authorization methods configuration 356 AAA ISP domain configuration 354 AAA user management by ISP domains 353 IST MST region 187 K key Ethernet link aggregation operational key 205 L LACP configuration 205 213 Ethernet link aggregation 205 LACP enabled port Ethernet link aggregation 211 LAN VLAN configuration 133 145 Layer 2 Ethernet aggregate intertace 205 Ethernet aggregation group 205 Ethernet link aggregation and LACP configuration 205 Ethernet link aggregation group contiguration 208 516 Ethernet link aggregation group creation 208 Ethernet link dynamic aggregation group configuration 208 Ethernet link static aggregation group contiguration 208 LLDP configuration 236 loopback detection contiguration 447 447 loopback test configuration 89 89 NMM port mirroring configuration 79 port isolation configuration 440 441 portbased VLAN configuration 135 VLAN configuration 133 145 VLAN type 134 Layer 2 aggregate interface management 69 Layer 2 Ethernet port management 69 5 Layer 3 DHCP overview 292 DHCP relay agent confi
407. link local address prefix FE80 64 Manual and the link layer address of the interface Configure IPv e Manual Select this option to manually assign an IPv link local link local address address to the interface IPv address Specify an IPv link local address for the VLAN interface This field is configurable if you select Manual The address prefix must be FE80 64 Finishing configuration wizard After finishing the management IP address configuration click Next The page displays your configurations Review the configurations and if you want to modify the settings click Back to go back to the page Click Finish to confirm your settings and the system performs the configurations 37 Figure 24 Configuration complete IP Setup Completing the Management IF Interface Setup Wizard Step 4 of 4 You have successfully completed the Management F Interface Setup waard You have specified the following settings Sysname sysname Syslocation Server room 501 Syscontact Hewlett Packard Development Company L P VLAN Interface 1 Admin Status UP Config IPv4 address Method Manual IPv4 address 192 168 1 60 Subnet mask 255 255 255 0 Config IPv link local address Method NoChange IPv6 address NoChange 38 Configuring stack Overview The stack management feature allows you to configure and monitor a group of connected devices by logging in to one device in the stack as shown in Figure 25
408. lock the client will not synchronize its clock to the server s 59 The synchronization process takes some time The clock status might be displayed as unsynchronized after your configuration In this case refresh the page to view the clock status and system time later on If the system time of the NTP server is ahead of the system time of the device and the time gap exceeds the Web idle time specitied on the device all online Web users are logged out because of timeout after the synchronization finishes 60 Configuring syslog System logs record network and device information including running status and contiguration changes With system logs administrators can take corresponding actions against network problems and security problems The system sends system logs to the following destinations Console Monitor terminal a terminal that has logged in to the device through the AUX or VTY user interface Log buffer Log host Web intertace Log tile Displaying syslogs l 2 Select Device gt Syslog from the navigation tree The page for displaying syslogs appears You can click Reset to clear all system logs saved in the log buffer on the Web interface You can click Refresh to manually refresh the page or you can set the refresh interval on the Log Setup page to enable the system to automatically refresh the page periodically For more information see Setting buffer capacity and refresh interval Figure 50 Dis
409. lt in personal injury A An alert that calls attention to important information that if not understood or followed can CAUTION result in data loss data corruption or damage to hardware or software OD IMPORTANT An alert that calls attention to essential information NOTE An alert that contains additional or supplementary information Q TIP An alert that provides helpful information 504 Network topology icons Represents a generic network device such as a router switch or firewall Represents a routing capable device such as a router or Layer 3 switch Represents a generic switch such as a Layer 2 or Layer 3 switch or a router that supports Layer 2 forwarding and other Layer 2 features Represents an access controller a unified wired WLAN module or the switching engine on a unified wired WLAN switch Represents an access point 0 9 6 GE Represents a mesh access point Represents omnidirectional signals Represents directional signals Represents a security product such as a firewall UTM multiservice security gateway or load balancing device Represents a security card such as a firewall load balancing NetStream SSL VPN IPS or ACG card Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device 505 Index Numerics 802 1X access control methods 321 ACL assignment 331 architecture 321 authent
410. lues are supported Select the time range during which the rule takes effect 465 Configuring QoS Grayed out options on Web configuration pages cannot be configured Overview Quality of Service QoS reflects the ability of a network to meet customer needs In an internet QoS evaluates the ability of the network to forward packets of different services The evaluation can be based on different criteria because the network might provide various services Generally QoS performance is measured with respect to bandwidth delay jitter and packet loss ratio during packet forwarding process Networks without QoS guarantee On traditional IP networks without QoS guarantee devices treat all packets equally and handle them using the first in first out FIFO policy All packets share the resources of the network and devices How many resources the packets can obtain completely depends on the time they arrive This service is called best effort It delivers packets to their destinations as possibly as it can without any guarantee for delay jitter packet loss ratio and so on This service policy is only suitable for applications insensitive to bandwidth and delay such as Word Wide Web WWW and email QoS requirements of new applications The Internet has been growing along with the fast development of networking technologies Besides traditional applications such as WWW email and FTP network users are experiencing new s
411. ly obtain its IP address through the DHCP server You can log in to the device through the console port and execute the summary command to view the information about its IP address lt Sysname gt summary Select menu option Summary IP Method DHCP IP address 169 254 1 2 Subnet mask 2992990 Default gateway 0 0 0 0 lt Omitted gt Assuming that the IP address of the device is 169 254 1 2 to log in to the Web interface of the device from a PC 1 Connect the Ethernet interface of the device to a PC by using a crossover Ethernet cable By default all interfaces belong to VLAN 1 2 Configure an IP address for the PC and make sure that the PC and device can reach each other For example assign the PC an IP address for example 169 254 1 27 within 169 254 0 0 16 except for the IP address of the device 3 Open the browser and input the login information a Type the IP address http 169 254 1 2 in the address bar and press Enter The login page of the web interface see Figure 5 appears b Enter the username admin and the verification code leave the password blank and click Login Figure 5 Login page of the Web interface Web User Login verityCode SDT Login a Logging out of the Web interface AN CAUTION e You cannot log out by directly closing the browser e For security purposes log out of the Web interface after you finish your operations 1 Save the current configuration Bec
412. m number of handshake attempts set by the Retry Times setting has been made the Enable Handshake network access device sets the user in the offline state For information about the timers see Configuring 802 1X globally NOTE If the network has 802 1X clients that cannot exchange handshake packets with the network access device disable the online user handshake function to prevent their connections from being inappropriately torn down 334 ltem Descri ption Specifies whether to enable periodic online user re authentication on the port Periodic online user re authentication tracks the connection status of online users and updates the authorization attributes assigned by the server such as the ACL and VLAN The re authentication interval is specified by the Re Authentication Period setting in Table 104 NOTE e The periodic online user re authentication timer can also be set by the authentication server in the session timeout attribute The server assigned timer overrides the timer setting on the access device and it enables periodic online user re authentication even if the function is not configured on the access device Support for the server assignment of re authentication timer and the re authentication timer configuration on the server vary with servers Enable Re Authentication e The VLAN assignment status must be consistent before and after re authentication If the authentication server has assigned a VLAN
413. main Select Authentication gt AAA from the navigation tree 2 Click the Authentication tab Figure 336 Authentication method configuration page Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain system Default Auth Local Name Secondary Method LAN access AuthN Name Secondary Method Login Auth Name Secondary Method PPP Auth Name Secondary Method Portal Auth Name Secondary Method 3 Select the ISP domain and specify authentication methods for the domain as described in Table 109 4 Click Apply Table 109 Configuration items ltem Description Select an ISP domain Select the ISP domain for which you want to specify authentication methods Configure the default authentication method and secondary authentication method for all types of users Options include Default AuihN e HWTACACS HWTACACS authentication You must specify the HWTACACS scheme to be used Name Secondary Method e Local Local authentication None No authentication This method trusts all users and is not for general use e RADIUS RADIUS authentication You must specify the RADIUS scheme to be used e Not Set The device uses the default authentication setting which is local authentication 355 ltem Descri ption Configure the authentication method and secondary authentication method for LAN access users LAN access AuthN Options include Local Local authentication None
414. make sure the product of the TTL multiplier and the LLDP frame transmission interval is less than 255 seconds for CDP compatible LLDP to work correctly with Cisco IP phones Fast LLDPDU Count Set the number of LLDP frames sent each time fast LLDP frame transmission is triggered 228 ltem Descri ption Set the TTL multiplier The TTL TLV carried in an LLDPDU determines how long the device information carried in the LLDPDU can be saved on a recipient device You can configure the TTL of locally sent LLDPDUs to determine how long information about the local device can be saved on a neighbor device by setting the TTL multiplier The TTL is expressed as TTL multiplier x LLDP frame transmission interval TTL Multiplier When you configure the TTL multiplier follow these guidelines e If the product of the TTL multiplier and the LLDP frame transmission interval is greater than 65535 the TTL carried in transmitted LLDP frames takes 65535 seconds e Because the maximum TTL allowed by CDP is 255 seconds you must make sure the product of the TTL multiplier and the LLDP frame transmission interval is less than 255 seconds for CDP compatible LLDP to work correctly with Cisco IP phones Set the minimum interval for sending traps With the LLDP trapping function enabled on a port traps are sent out of the Trap Interval port to advertise the topology changes detected over the trap interval to neighbors By tuning this interval you can prev
415. mar Remove Time Range Mame testtime Ma2 Chars Periodic Time Range StatTime 8 lo w End TImel 18 lo w Sun V Mon Tue v wer V Thu VJFri Sat J Absolute Time Range From i i l T l SUMIMm ary 2 Add an advanced IPv4 ACL a Select QoS gt ACL IPv4 from the navigation tree b Click the Add tab c Enter the ACL number 3000 d Click Apply Figure 478 Adding an advanced IPv4 ACL Summar Basic Setup Advanced Setup Link Layer Setup Remove ACL Number S000 2000 2999 for basic ACLS 3000 3999 for advanced ACLS Match Order 4000 4999 for Ethernet frame header ACLs Description Characters 0 1277 ACL Number Type Humber of Rules Match Order Description 3 Define an ACL rule for traffic to the FTP server a Click the Advanced Setup tab b Select 3000 in the ACL list 490 c Select the Rule ID box and enter rule ID 2 d Select Permit in the Action list e Select the Destination IP Address box and enter IP address 10 1 1 1 and destination wildcard 0 0 0 0 f Select test time in the Time Range list g Click Add Figure 479 Defining an ACL rule for traffic to the FTP server Summary Add Basic Setup Link Layer Setup Remove ACL 3000 Ww Help configure an Advanced ACL Rule ID 2 O Ne If no ID is entered the system will specify one Non first Fragments Only LI Logging IF Address Filter Destination IP Address 10 1 1 1 Destination Wildcard 0 0 0 0 Pro
416. me Select the name of the interface on which the history entry is created Set the capacity of the history record list corresponding to this history entry the maximum number of records that can be saved in the history record list If the current number of the entries in the table has reached the maximum Buckets Granted number the system deletes the earliest entry to save the latest one The statistics include total number of received packets on the current interface total number of broadcast packets and total number of multicast packets in a sampling period Interval Set the sampling period Owner Set the owner of the entry 98 Contiguring an event entry 1 Select Device gt RMON from the navigation tree 2 Click the Event tab Figure 84 Event entry Statistics History Alarm Log search Advanced Search Index Description sel Es Owner otatus aii null Log es useri Active Add Del Selected 3 Click Add Figure 85 Adding an event entry Statistics History Alarm Log Add an Event Group Description ears Maan Owner Ooo saaa Event Type Clog Trap tems marked with an asterisk are required Apply Cancel Configure an event entry as described in Table 26 5 Click Apply Table 26 Configuration items liem Description Description Set the description for the event Owner Set the entry owner Set the actions that the system takes when the event is triggered e Log The system logs the event Eve
417. minutes 63 Managing the configuration You can back up restore save or reset the device configuration Backing up the configuration Configuration backup allows you to do the following e Open and view the configuration files for the next startup including the cdfg tile and xml file e Back up the configuration files for the next startup to your local host D IMPORTANT HP recommends backing up both the cfg and xml files If you back up only the cfg file some configuration information might not be restored when for example the configuration is mistakenly removed To back up the configuration 1 Select Device gt Configuration from the navigation tree The Backup page appears Figure 53 Backing up the configuration Restore Save Initialize Configuration File Backup Backup the configuration file with the extension cfg Backup Backup the configuration file with the extension xml Backup 2 Click the upper Backup button The tile download dialog box appears 3 Choose to view the cfg file or to save the file to your local host Click the lower Backup button The tile download dialog box appears 5 Choose to view the xml file or to save the file to the local host Restoring the contiguration Configuration restoration allows you to do the following e Upload a efg file from your local host to the device e Upload an xml file from your local host to the device and delete the xml con
418. mmary displaying 42 state Ethernet link aggregation member port state 205 static ARP configuration 246 DHCP address allocation 292 Ethernet link aggregation mode 206 Ethernet link aggregation static mode 206 Ethernet link static aggregation group configuration 208 MAC address table entry 174 static ARP table entry 244 static routing contiguration IPv4 283 configuration IPv6 287 contiguration guideline 291 route creation IPv4 280 route creation IPv6 281 statistics NMM RMON configuration 93 105 105 NMM RMON Ethernet statistics group 93 NMM RMON statistics function 95 statistics entry configuration 97 STP 530 algorithm calculation 179 basic concepts 178 BPDU forwarding 184 CIST 187 CST 187 designated bridge 178 designated port 178 IST 187 loop detection 177 MST common root bridge 187 MST port roles 187 MST port states 188 MST region 186 MST region configuration 191 MST regional root 187 MSTI 186 MSTI calculation 189 MSTP 185 See also MSTP MSTP CIST calculation 189 MSTP device implementation 189 path cost 1 9 protocol packets 177 root bridge 178 root port 178 RSTP 184 See also RSTP timers 184 VLAN to instance mapping table 187 summary displaying basic system information 47 displaying device information 47 48 displaying recent system logs 48 displaying system information 47 47 displaying system resource state 48 setti
419. move the CA certificate and local certificate first Required When requesting a certificate an entity introduces itself to the CA by providing its identity information and public key which will be the major components of the certificate A certificate request can be submitted to a CA in online mode or offline mode e In online mode if the request is granted the local certificate will be 5 Requesting a local retrieved to the local system automatically certificate e In offline mode you must retrieve the local certificate by an out of band means IMPORTANT If a local certificate already exists you cannot perform the local certificate retrieval operation This will avoid possible mismatch between the local certificate and registration information resulting from relevant changes To retrieve a new local certificate you must remove the CA certificate and local certificate first 387 Step Remarks Optional a Deseo ynatne Res ke bal Destroy the existing RSA key pair and the corresponding local certificate If the certificate to be retrieved contains an RSA key pair you must destroy the existing key pair Otherwise the retrieving operation will fail 7 Retrieving and displayinga Optional certificate Retrieve an existing certificate 8 Retrieving and displayinga Optional CRL Retrieve a CRL and display its contents Recommended configuration procedure for automatic request Task Remarks Required Create a PKI
420. ms marked with an asterisk are required Apply Cancel 3 Generate an RSA key pair a Click the Certificate tab b Click Create Key c Enter 1024 as the key length and click Apply to generate an RSA key pair Figure 384 Generating an RSA key pair Entity Domain CRL Add Key o Key Length 1024 512 2048 Default 1024 f there is already a key overwrite it tems marked with an asteriski are required A Retrieve the CA certificate a Click the Certificate tab b Click Retrieve Cert c Select torsa as the PKI domain select CA as the certificate type and click Apply 401 Figure 385 Retrieving the CA certificate Entity Domain CRL Retrieve Certificate Domain Name Certificate Type C Enable Offline Mode tems marked with an asteriski are required Apply Cancel 5 Request a local certificate a Click the Certificate tab b Click Request Cert c Select torsa as the PKI domain select Password and enter challenge word as the password d Click Apply The system displays Certificate request has been submitted e Click OK to finish the operation Figure 386 Requesting a local certificate Entity Domain CRL Request Certificate Domain Name torsa Password LELEL EEEE EEE 1 31 Chars Enable Offline Made tems marked with an asterisk are required Apply Cancel 6 Retrieve the CRL a Click the CRL tab b Click Retrieve CRL of the PKI domain of torsa Figure 38
421. n intormation about an ISP domain Specify authentication methods for an ISP domain Display the authorization method configuration intormation about an ISP domain Specify authorization methods for an ISP domain Monitor Configure Configure Monitor Configure Monitor Configure Configure Management Visitor Visitor Visitor Visitor Monitor Configure Monitor Configure Monitor Contigure Monitor Management Monitor Management Monitor Management Function menu Description User level Secu rity QoS RADIUS Users Certificate Manageme nt Port Isolate Group Authorized IP Loopback Detection Time Range ACL IPv4 Accounting RADIUS Server RADIUS Setup Local User User Group Entity Domain Certificate CRL Summary Port Setup Summary Setup Loopback Detection Summary Create Remove Summary Create Basic Setup Advanced Setup Display the accounting method configuration intormation about an ISP domain Specify accounting methods for an ISP domain Display and configure RADIUS server information Display and configure RADIUS parameters Display contiguration information about local users Create modify and remove a local user Display configuration information about user groups Create modify and remove a user group Display information about PKI entities Add modify and delete a PKI entity Display information about
422. n you must enter a number in the box below e kbps Sets the maximum number of kilobits of unicast traffic that can be forwarded on an Ethernet port per second When you select this option you must enter a number in the box below Interface or interfaces that you have selected from the chassis front panel and the Selected Ports aggregate interface list below for which you have set operation parameters You can set only the state and MAC learning limit for an aggregate interface If you set operation parameters that a port does not support you are notified of invalid settings and might fail to set the supported operation parameters for the port or other ports Displaying port operation parameters Displaying a specified operation parameter for all ports 1 Select Device gt Port Management from the navigation tree The Summary page appears by default 2 Select the option for a parameter you want to view The parameter information for all the ports is displayed in the lower part of the page 73 Figure 59 The Summary tab Detail Setup Select Feature PortState Max MAC Count Flow Control Default VLAN ID PVID Link Type MDI Duplex Speed Broadcast Suppression Multicast Suppression Unicast Suppression Power Save Description EEE Feature Summary Ports Setting GE1 0 1 Enabled GE1 0 2 Enabled GE1 0 3 Enabled GE1 0 4 Enabled GE1 0 5 Enabled GE1 0 6 Enabled Disp
423. n 192 168 1 2 1812 i Pri mary Accounting 192 168 1 2 1813 il Add Items marked with an asterisk are required Apply Cancel 4 Click Apply Configuring AAA 1 Configure AAA authentication method a From the navigation tree select Authentication gt AAA b Click the Authentication tab c Select the ISP domain system d Select Default AuthN select the authentication method RADIUS from the list and select authentication scheme system from the Name list 435 Figure 428 Configuring AAA authentication Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain system Default AuthN RADIUS Name system Secondary Method E LAN access Auth Name Secondary Method L Login Auth Name Secondary Method PPP Auth Name Secondary Method Portal Auth Name Secondary Method Apply e Click Apply A dialog box appears displaying the configuration progress as shown in Figure 429 Figure 429 Configuration progress dialog box Current Configuration setting Default Auth OK f When the configuration process is complete click Close 2 Configure AAA authorization method a Click the Authorization tab b Select the ISP domain system c Select Default AuthZ select authorization method RADIUS from the list and select the authorization scheme system from the Name list d Click Apply 436 Figure 430 Configuring AAA authorization Domain Setup Authenticati
424. n Configuration of AAA Select an ISP domain test Default Auth Local Name secondary Method LAN access Auth Name secondary Method Login Auth Name secondary Method PPP Auth Name secondary Method Portal Authz Name secondary Method Command AuthZ Name Apply 7 Configure the ISP domain to use local accounting a Select Authentication gt AAA from the navigation tree b Click the Accounting tab c Select the domain test d Select Login Accounting and select the accounting method Local e Click Apply A configuration progress dialog box appears f After the configuration process is complete click Close Figure 345 Configuring the ISP domain to use local accounting Domain Setup Authentication Authorization Accounting Configuration of AAA Select an IEP domain test Accounting Optional Disable E Default Accounting Local Name Secondary Method EH LAN access Accounting Name Secondary Method Login Accounting Name Secondary Method PPP Accounting Name Secondary Method Portal Accounting Name Secondary Method Verifying the configuration Telnet to the switch and enter the username telnet test and password abed You will be serviced as a user in domain test 362 Configuring RADIUS Overview Remote Authentication Dial In User Service RADIUS is a distributed information interaction protocol that uses a client server model to implement AAA It can protect networks against unauthorized acc
425. n manual mode During this period the applicant needs to query the status of the request periodically to get the certificate as soon as possible after the certificate is signed Polling Interval Enable CRL Checking Select this box to specify that CRL checking is required during certificate verification Enter the CRL update period that is the interval at which the PKI entity downloads the latest CRLs This item is available atter you click the Enable CRL Checking box By default the CRL update period depends on the next update field in the CRL file CRL Update Period 392 ltem Description CRL URL Enter the URL of the CRL distribution point The URL can be an IP address or a domain name This item is available atter you click the Enable CRL Checking box If the URL of the CRL distribution point is not set you should get the CA certificate and a local certificate and then get a CRL through SCEP Generating an RSA key pair 1 From the navigation tree select Authentication gt Certificate Management 2 Click the Certificate tab Figure 372 Certificate configuration page Entity Domain CAL Domain Mame Issuer Subject abcd abcd Certificate Type Operation Delete the certificate view the certificate Delete the certificate view the certificate CAHCA server CAH CA server CA CAHCA server Ch aaa Coch Local Create Key Destroy Key Retrieve Cert Request Cert There are two w
426. n of AAA select an ISP domain test Default AuthzZ RADIUS Name system Secondary Method d E LAN access Auth Name Secondary Method El Login Auth Name Secondary Method PPP AuthZ Name Secondary Method Portal Auth Name secondary Method Command Authz Name d Click Apply A configuration progress dialog box appears e After the contiguration process is complete click Close Configure AAA accounting method for the ISP domain a Click the Accounting tab b Select test from the Select an ISP domain list c Select Default Accounting select the accounting method RADIUS as the default accounting method and select the accounting scheme system trom the Name list as shown in Figure 319 342 Figure 319 Configuring the AAA accounting method for the ISP domain Domain Setup Authentication Authorization Accounting Configuration of AAA Select an ISP domain test E Accounting Optional Disable Default Accounting RADIUS Name system Secondary Method E LAN access Accounting Name Secondary Method El Login Accounting Name Secondary Method PFF Accounting Name Secondary Method Portal Accounting Name Secondary Method d Click Apply e After the contiguration process is complete click Close 802 X with ACL assignment configuration example Network requirements As shown in Figure 320 perform 802 1X authentication on port GigabitEthernet 1 0 1 Use the RADIUS se
427. n to take depend on the rule order The following ACL match orders are available e Config Sorts ACL rules in ascending order of rule ID A rule with a lower ID is matched before a rule with a higher ID If you use this method check the rule content and order caretully e Auto Sorts ACL rules in depth first order Depth first ordering makes sure any subset of a rule is always matched before the rule Table 136 lists the sequence of tie breakers that depth first ordering uses to sort rules for each type of ACL 450 Table 136 Depth first match for ACLs ACL category Sequence of tie breakers 1 More Os in the source IP address wildcard more Os means a narrower IPv4 basic ACL IP address range 2 Smaller rule ID 1 Specific protocol number 2 More Os in the source IP address wildcard mask IPv4 advanced ACL 3 More Os in the destination IP address wildcard 4 Narrower TCP UDP service port number range 5 Smaller ID 1 Longer prefix for the source IP address a longer prefix means a Pv basic ACL narrower IP address range 2 Smaller ID 1 Specific protocol number 2 longer prefix for the source IPv6 address IPv advanced ACL 3 Longer prefix for the destination IPv6 address 4 Narrower TCP UDP service port number range 5 Smaller ID 1 More 1s in the source MAC address mask more 1s means a smaller MAC address Ethernet frame header ACL More 1s in the destination MAC address mask 3 Smaller ID
428. nal Please select a VLAN ID 1 32 Chars Apply Select membership type a F Fy i Untagged f B i E Not A Member Select ports to be modified and assigned to this VLAN C Not avaliable for selection Note You can assign multiple ports in different membership types to this VLAN Summary Untagged Membership Tagged Membership 3 Modify the member ports of a VLAN as described in Table 41 4 Click Apply A progress dialog box appears 5 Click Close on the progress dialog box when the dialog box prompts that the configuration succeeds Table 41 Configuration items ltem Description Select the VLAN to be modified The VLANS available for selection are existing VLANs selected on the page for selecting VLANS Please select a VLAN to modify Modify the description string of the selected VLAN Modify Description By default the description string of a VLAN is its VLAN ID such as VLAN 0001 Set the member type of the port to be modified in the VLAN e Untagged Configures the port to send the traffic of the VLAN after removing the Select membership VLAN tag type e Tagged Configures the port to send the traffic of the VLAN without removing the VLAN tag e Nota Member Removes the port from the VLAN 143 ltem Description Select ports to be Select the ports to be modified in the selected VLAN modified and assigned to this VLAN When you configure an access port as a tagged member of a V
429. nce it provides a better load sharing mechanism for redundant links by allowing data flows of different VLANs to be forwarded along separate paths MSTP provides the following features e MSTP divides a switched network into multiple regions each of which contains multiple spanning trees that are independent of one another e MSTP supports mapping VLANs to spanning tree instances by means of a VLAN to instance mapping table MSTP can reduce communication overheads and resource usage by mapping multiple VLANs to one instance e MSIP prunes a loop network into a loop free tree which avoids proliferation and endless cycling of packets in a loop network In addition it supports load balancing of VLAN data by providing multiple redundant paths for data forwarding e MSTP is compatible with STP and RSTP MSTP basic concepts Figure 176 shows a switched network that comprises four MST regions each MST region comprising four MSTP devices 185 Figure 176 Basic concepts in MSTP Region AO VLAN 1 mapped to instance 1 VLAN 2 mapped to instance 2 Other VLANs mapped to CIST BPD BPDU CST ed BPDU BPD Region BO eee VLAN 1 mapped to instance 1 VLAN 1 mapped to instance 1 B as regional root bridge VLAN 2 mapped to instance 2 VLAN 2 mapped to instance 2 Other VLANs mapped to CIST C as regional root bridge Other VLANs mapped to CIST 7 FE Region CO VLAN 1 mapped to instance 1 VLAN 2 mapped to instance 2 Other VL
430. nd are neglected upon reception If the length of a received packet is less than this length the packet is dropped The value of this field is in the range 20 to 4096 The Authenticator field 16 bytes long is used to authenticate replies from the RADIUS server and to encrypt user passwords There are two types of authenticators request authenticator and response authenticator The Attributes field variable in length carries the specific authentication authorization and accounting information that detines the configuration details of the request or response This field may contain multiple attributes each with three sub tields o Type 1 byte long Type of the attribute It is in the range 1 to 255 Commonly used attributes for RADIUS authentication authorization and accounting are listed in Table 113 o Length 1 byte long Length of the attribute in bytes including the Type Length and Value fields o Value Up to 253 bytes Value of the attribute Its format and content depend on the Type and Length fields Table 113 Commonly used RADIUS attributes No Attribute No Attribute 1 User Name 45 Acct Authentic 2 User Password 46 Acct Session Time 3 CHAP Password 47 Acct Input Packets 4 NAS IP Address 48 Acct Output Packets 5 NAS Port 49 Acct Terminate Cause 6 Service Type 50 Acct Multi Session Id 7 Framed Protocol 51 Acct Link Count 8 Framed IP Address 52 Acct Input Gigawords 9 Framed IP Netmask 53 Acct OutputGiga
431. neric endpoint devices Class III A communication endpoint device The class II endpoint devices directly support end users of the IP communication system Providing all capabilities of generic and media endpoint devices Class Ill endpoint devices are used directly by end users 232 Field Description Media policy type e Unknown e Voice e Voice signaling e Guest voice Media policy type Man e Guest voice signaling e Soft phone voice e Videoconferencing e Streaming video e Video signaling Unknown Policy Indicates whether the media policy type is unknown VLAN tagged Indicates whether packets of the media VLAN are tagged Media policy VlanID ID of the media VLAN Media policy L2 priority Layer 2 priority Media policy Dscp DSCP value HardwareRev Hardware version of the neighbor FirmwareRev Firmware version of the neighbor SoftwareRev Software version of the neighbor SerialNum Serial number advertised by the neighbor Manufacturer name Manufacturer name advertised by the neighbor Model name Model name advertised by the neighbor Asset ID advertised by the neighbor This ID is used for the purpose of Asset tracking identifier inventory management and asset tracking PSE power source type PoE PSE power source e Primary e Backup PoE power supply priority of PSE ports e Unknown Unknown PSE priority Port PSE priority e Critical Priority level 1 e High Priority level 2 e Low
432. nfiguration 408 SNMPv1 configuration 124 SNMPv2c configuration 124 SNMPv3 configuration 127 stack global parameters configuration 40 syslog configuration 61 system name configuration 50 VCT configuration 91 Web common page features 16 Web configuration backup 64 Web configuration management 64 Web contiguration reset 66 Web configuration restoration 64 Web configuration save 65 Web device local user adding 86 Web device privilege level switching 88 Web device super password setting 87 Web device user management 86 Web file displaying 67 Web file download 67 Web file management 67 Web file removing 68 Web file upload 68 Web interface 7 Web interface HTTP login 6 Web interface logout 7 Web main boot file specifying 68 Web service management 314 315 Web stack configuration 39 Web user level 8 Web based NM functions 8 device information displaying device information 47 48 device management device reboot 53 diagnostic information 54 electronic label 54 software upgrade 52 DHCP configuring client s IP to MAC bindings 302 configuring DHCP relay agent advanced parameters 299 configuring snooping functions on interface 309 creating DHCP server group 300 displaying client s IP to MAC bindings 302 310 enable 299 enable snooping 309 enabling relay agent on interface 301 IP address allocation 292 293 IP address lease extension 293 message forma
433. nfiguration environment To set up the configuration environment connect a terminal a PC in this example to the console port on the switch with a console cable A console cable is an 8 core shielded cable with a crimped RJ 45 connector at one end for connecting to the console port of the switch and a DB 9 female connector at the other end for connecting to the serial port on the console terminal Figure 14 Console cable A side Main label WE NE C m i 0 Es De Use a console cable to connect a terminal device to the switch as follows 1 Plug the DB 9 female connector to the serial port of the console terminal or PC 2 Connect the RJ 45 connector to the console port of the switch AN CAUTION Identity the mark on the console port to make sure that you are connecting to the correct port 20 NOTE e The serial port on a PC does not support hot swapping When you connect a PC to a powered on switch connect the DB 9 connector of the console cable to the PC before connecting the RJ 45 connector to the switch e When you disconnect a PC from a powered on switch disconnect the DB 9 connector of the console cable from the PC atter disconnecting the RJ 45 connector from the switch Setting terminal parameters To configure and manage the switch you must run a terminal emulator program on the console terminal The following are the required terminal settings e Bits per second 3
434. nfigure the voice VLAN function for ports as described in Table 50 Click Apply Table 50 Configuration items ltem Description Set the voice VLAN assignment mode of a port fo Voice VLAN port mode e Auto Automatic voice VLAN assignment mode e Manual Manual voice VLAN assignment mode 161 ltem Description Select Enable or Disable in the list to enable or disable the voice VLAN function Voice VLAN port state onde Ee Voice VLAN ID Set the voice VLAN ID of a port when the voice VLAN port state is set to Enable Select the port on the chassis front panel You can select multiple ports to configure them in bulk The numbers of the selected ports will be displayed in the Ports selected for voice VLAN field Select Ports NOTE To set the voice VLAN assignment mode of a port to automatic you must make sure that the link type of the port is trunk or hybrid and that the port does not belong to the voice VLAN Adding OUI addresses to the OUI list 1 Select Network gt Voice VLAN from the navigation tree 2 Click the OUI Add tab Figure 152 Adding OUI addresses to the OUI list summary Setup Port Setup OUI Summary OUl Remove specify an QUI and click Apply to add itto the list There can be 6 entries at most OUI Address Example 0070 dc28 a4e9 Mask FFFF FFOO 0000 Description Chars 1 30 tems marked with an asterisk are required Apply Cancel OUI Address Mask Description 0003 6500 0000 fff ffO
435. nfinitely A more eftective solution is to provide differentiated services for different applications through traftic control and resource allocation In this way resources can be used more properly During resources allocation and trattic control the direct or indirect factors that might cause network congestion should be controlled to reduce the probability of congestion Once congestion occurs resource allocation should be performed according to the characteristics and demands of applications to minimize the effects of congestion 467 End to end QoS Figure 454 End to end QoS model Traffic classification Traffic policing Traffic classification Traffic policing Traffic policing Traffic policing So oo Wy ROUTER Oh TA Congestion management Congestion management Congestion management Congestion management Congestion avoidance Congestion avoidance Congestion avoidance Congestion avoidance Traffic shaping Traffic shaping Traffic shaping Traffic shaping ROUTER As shown in Figure 454 traffic classification traffic policing traffic shaping congestion management and congestion avoidance are the foundations for a network to provide differentiated services Mainly they implement the following functions e Traffic classification Uses certain match criteria to organize packets with different characteristics into different classes Traffic classification is usually applied in the inbound direction of a
436. ng DHCP and contiguring advanced parameters for the DHCP relay agent From the navigation tree select Network gt DHCP to enter the default DHCP Relay page 2 Click Display Advanced Configuration to expand the advanced DHCP relay agent configuration area as shown in Figure 274 Figure 274 DHCP relay agent configuration page DHCP Snooping DHCP Service Enable Disable Hide Advanced Configuration Unauthorized Server Detect Enable Disable Dynamic Bindings Refresh Enable Disable Track Timer Interval Auto O Custom Seconds 1 120 Apply Cancel Server Group R server Group ID Search Advanced Search Serer Group IO IP Address Operation 0 10112 i Add Interface Contig i A Interface Mame Search Advanced Search Interface Mame DHCP Relay State Operation Viar interfacet Disabled ES vlar interfacreddg Disabled ES User Information User Information 3 Enable DHCP service and configure advanced parameters for DHCP relay agent as shown in Table 94 299 A Click Apply Table 94 Configuration items ltem Description DHCP Service Enable or disable global DHCP Enable or disable unauthorized DHCP server detection There are unauthorized DHCP servers on networks which reply DHCP clients with wrong IP addresses l With this feature enabled upon receiving a DHCP request the DHCP relay agent Unauthorized Server records the IP address of any DHCP server that
437. ng DHCP relay agent Overview Since the DHCP clients request IP addresses through broadcast messages the DHCP server and clients must be on the same subnet Through a DHCP relay agent DHCP clients can get IP addresses from a DHCP server on another subnet This feature avoids deploying a DHCP server for each subnet to centralize management and reduce investment Figure 272 shows a typical application of the DHCP relay agent Figure 272 DHCP relay agent application DHCP client DHCP client DHCP relay agent DHCP client DHCP client DHCP server The DHCP server and client interact with each other in the same way regardless of whether the relay agent exists see DHCP overview For more information about DHCP packet exchange see IP address allocation process The following only describes steps related to the DHCP relay agent 1 After receiving a DHCP DISCOVER or DHCP REQUEST broadcast message from a DHCP client the DHCP relay agent fills the giaddr tield of the message with its IP address and forwards the message to the designated DHCP server in unicast mode 2 Based on the giaddr field the DHCP server returns an IP address and other configuration parameters in a response 3 The relay agent conveys the response to the client 297 Figure 273 DHCP relay agent operation DHCP client DHCP relay agent DHCP server IE DHCP DISCOVER broadcast DHGP OFFER DHCP REOUEST broadcast DHCP ACK Mr 2 w
438. ng Type e CoS to Queue e DSCP to Queue Input Priority Value Set the output priority value for an input priority value Output Priority Value Click Restore to display the default settings of the current priority mapping Restore table on the page To restore the priority mapping table to the default click Apply 487 Configuring priority trust mode on a port 1 Select QoS gt Port Priority from the navigation tree Figure 474 Configuring port priorities h Interface Name Search Advanced Search Interface Name Priority Trust Mode Operation GigabitEthernet1 0 1 0 Untrust A GigabitEthernet1 0 2 0 Untrust A GigabitEthernet1 0 3 0 Untrust A GigabitEthernet1 0 4 0 Untrust A GigabitEthernet1 0 5 0 Untrust A GigabitEthernet1 0 6 0 Untrust A GigabitEthernet1 0 7 0 Untrust A GigabitEthernet1 0 8 0 Untrust A GigabitEthernet1 0 9 0 Untrust A GigabitEthernet1 0 10 0 Untrust A GigabitEthernet1 0 11 0 Untrust A GigabitEthernet1 0 12 0 Untrust A GigabitEthernet1 0 13 0 Untrust A GigabitEthernet1 0 14 0 Untrust A GigabitEthernet1 0 15 0 Untrust A 28 records 15 v per page page 1 2 record 1 15 Next Last 1 GO 2 Click the A icon for a port Figure 475 Modifying the port priority Interface Name Priority 0 v Trust Mode Untrust v Restore Apply Cancel 3 Configure the port priority for a port as described in Table 162 4 Click Apply Table 162 Configuration items ltem Description Interface Interface to be
439. ng entries Configure Display port priority and trust mode information Monitor Port Priority Port Priority Modify port priority and trust mode Configure Function menu Description User level PoE PoE Display PSE information and PoE interface l Monitor information Configure a PoE interface Configure Configure a port Configure Common items on the Web pages Buttons and icons Table 2 Commonly used buttons and icons Button and icon Apply Cancel Refresh Clear Add Remove Del Selected Select All Select Mone Hess Back Finish Function Applies the configuration on the current page Cancels the configuration on the current page Refreshes the current page Clears all entries in a list or all statistics Adds an item Removes the selected items Selects all the entries in a list Clears selection of all entries in a list Buffers but does not apply the configuration of the current step and enters the next configuration step Buffers but does not apply the configuration of the current step and returns to the previous configuration step Applies the configurations of all configuration steps Enters the modification page of an item so that you can modify the configurations of the item Deletes the item corresponding to this icon Page display function The Web interface can display contents by pages as shown in Figure 7 You can set the number of entries displayed p
440. ng leave 255 IPv multicast MLD snooping done 269 security ARP attack protection configuration 250 method 802 1X access control 321 MIB LLDP contiguration 217 236 SNMP 111 mirroring port See port mirroring MLD snooping aging timer for dynamic port 267 basic concepts 266 contiguration 266 contiguring 274 configuring port functions 272 displaying MLD snooping multicast forwarding entries 2 3 done message 269 enable globally 270 enable in a VLAN 270 enabling MLD snooping globally 270 enabling MLD snooping in a VLAN 270 general query 268 how it works 268 membership report 268 protocols and standards 269 related ports 266 mode Ethernet link aggregation dynamic 206 Ethernet link aggregation dynamic mode 207 Ethernet link aggregation static 206 Ethernet link aggregation static mode 206 LLDP disable 221 LLDP Rx 221 LLDP Tx 221 LLDP TxRx 271 port security advanced mode 421 port security basic mode 421 security 802 1X EAP relay termination comparison 325 security 802 1X multicast trigger mode 324 security 802 1X unicast trigger mode 324 moditying port 144 VLAN 143 VLAN interface 152 CIST 187 common root bridge 187 CST 187 IST 187 MSTI 186 port roles 187 port states 188 region 186 region configuration 19 regional root 187 MSTI calculation 189 MST instance 186 MSTP basic concepts 185 CIST calculation 189 configuration
441. ng or Please select a port ne p traffic directing on the chassis front panel Configuring other actions for a traffic behavior 1 Select QoS gt Behavior from the navigation tree 2 Click Setup to enter the page for setting a traffic behavior 481 Figure 467 Setting a traffic behavior summary Add Fort Setup Remove Please select a behavior Select a behavior E CAR 3 Enable Disable CIR Kops 16 1000000 it must be a multiple of 16 CBS byte 0 429496 7294 Red 2 Discard Pass Remark IP Precedence 0 El Dotip 0 Local Precedence 0 E pscPp 0 default Queue EF Max Bandwidth kbps 8 1000000 CBS byte 32 2000000 Percent 1 100 CBS Ratio 25 500 AF Max Bandwidth Kbps 8 1000000 Percent 1 100 WFQ 16 4096 Filter Permit Accounting Enable Behavior Detail 3 Configure other actions for a traffic behavior as described in Table 155 4 Click Apply Table 155 Configuration items ltem Description Please select a behavior Select an existing behavior in the list CAR Enable Disable Enable or disable CAR 482 ltem Description CIR Set the committed information rate CIR the average traffic rate Set the committed burst size CBS number of bytes that can be sent in CBS each interval This function is not supported in the current software version and it is reserved for future support Set the action to perform for exceeding packets Discard After selecting the Red box you can select one of the follow
442. ng refresh period 48 switch CLI configuration 20 setting configuration environment 20 setting terminal parameters 21 switching MAC address table configuration 173 174 175 port isolation configuration 440 441 port management 69 5 VLAN configuration 133 145 Web device privilege level 88 syslog configuration 61 display 61 setting buffer capacity and refresh interval 63 setting log host 62 system administration basic device settings contiguration 50 CLI configuration 20 configuration wizard 34 device idle timeout period configuration 50 device system name configuration 50 ping 31 7 traceroute 31 7 317 Web common page features 16 Web device contiguration backup 64 Web device configuration management 64 Web device contiguration reset 66 Web device contiguration restoration 64 Web device contiguration save 65 Web device file displaying 67 Web device file download 67 Web device file management 67 Web device file removing 68 Web device file upload 68 Web device local user adding 86 Web device main boot file specitying 68 Web device management 52 Web device privilege level switching 88 Web device super password setting 87 Web device user management 86 Web interface 7 Web interface HTTP login 6 Web interface logout 7 Web service management 314 315 Web user level 8 Web based NM functions 8 system information displaying basic system information 47
443. ng the IP address allocation o After the client receives the DHCP ACK message it broadcasts a gratuitous ARP packet to verify whether the IP address assigned by the server is in use o If the client receives no response within the specitied time the client uses this IP address Otherwise the client sends a DHCP DECLINE message to the server and requests an IP address again IP address lease extension A dynamically assigned IP address has a lease When the lease expires the IP address is reclaimed by the DHCP server To continue using the IP address the client must extend the lease duration When half of the lease duration elapses the DHCP client unicasts a DHCP REQUEST to the DHCP server to extend the lease Depending on the availability of the IP address the DHCP server returns either a DHCP ACK unicast confirming that the client s lease duration has been extended or a DHCP NAK unicast denying the request If the client receives no reply it broadcasts another DHCP REQUEST message for lease extension when seven eighths of the lease duration elapses Again depending on the availability of the IP address the DHCP server returns either a DHCP ACK unicast confirming that the client s lease duration has been extended or a DHCP NAK unicast denying the request 293 DHCP message format Figure 268 shows the DHCP message format DHCP uses some of the fields in significantly different ways The numbers in parentheses indicate the size
444. ng the spanning tree topology e Topology change notification TCN BPDUs Used for notifying the concerned devices of network topology changes Configuration BPDUs contain sufficient information for the network devices to complete spanning tree calculation Important fields in a configuration BPDU include the following e Root bridge ID Consisting of the priority and MAC address of the root bridge e Root path cost Cost of the path to the root bridge denoted by the root identifier from the transmitting bridge e Designated bridge ID Consisting of the priority and MAC address of the designated bridge e Designated port ID Consisting of the priority and global port number of the designated port e Message age Age of the configuration BPDU while it propagates in the network e Max age Maximum age of the configuration BPDU stored on a device e Hello time Configuration BPDU transmission interval 177 e Forward delay Delay that STP bridges use to transit port state The descriptions and examples in this chapter only use the following fields in the contiguration BPDUs e Root bridge ID represented by device priority e Root path cost e Designated bridge ID represented by device priority e Designated port ID represented by port name Basic concepts in STP Root bridge A tree network must have a root bridge The entire network contains only one root bridge and all the other bridges in the network are call
445. ng voice VLAN globally Select Network gt Voice VLAN from the navigation tree 2 Click the Setup tab Figure 150 Configuring voice VLAN Summar Fort Setup Ol Summary OW Add Ol Remove voice VLAN security Enable Ge ie ete 1440 minutes 5 43200 Default 1440 tems marked with an asteriski are required Apply Cancel 160 3 4 Configure the global voice VLAN settings as described in Table 49 Click Apply Table 49 Configuration items ltem Description Select Enable or Disable in the list to enable or disable the voice VLAN security Voice VLAN security mode By default the voice VLANS operate in security mode Set the voice VLAN aging timer The voice VLAN aging timer setting only applies to a port in automatic voice Voice VLAN aging time VLAN assignment mode The voice VLAN aging timer starts as soon as the port is assigned to the voice VLAN If no voice packet has been received before the timer expires the port is removed from the voice VLAN Configuring voice VLAN on ports 3 4 Select Network gt Voice VLAN from the navigation tree Click the Port Setup tab Figure 151 Configuring voice VLAN on ports Summary Setup OUl Summary OUI Add OUl Remove Voice VLAN port mode No Change Voice VLAN port state No Change Voice VLAN ID 2 4094 tems marked with an asterisk are required Select ports Select All Select None Ports selected for voice VLAN Apply Cancel Co
446. ng works between the DHCP client and server or between the DHCP client and DHCP relay agent It guarantees that DHCP clients obtain IP addresses from authorized DHCP servers Also it records P to MAC bindings of DHCP clients called DHCP snooping entries for security purposes DHCP snooping does not work between the DHCP server and DHCP relay agent Overview DHCP snooping defines trusted and untrusted ports to make sure clients obtain IP addresses only from authorized DHCP servers e Trusted A trusted port can forward DHCP messages correctly to make sure the clients get IP addresses from authorized DHCP servers e Untrusted An untrusted port discards received DHCP ACK and DHCP OFFER messages to prevent unauthorized servers from assigning IP addresses DHCP snooping reads DHCP ACK messages received from trusted ports and DHCP REQUEST messages to create DHCP snooping entries A DHCP snooping entry includes the MAC and IP addresses of a client the port that connects to the DHCP client and the VLAN The DHCP snooping entries can be used by ARP detection to prevent ARP attacks For more information about ARP detection see Configuring ARP attack protection Application of trusted ports Configure ports facing the DHCP server as trusted ports and configure other ports as untrusted ports As shown in Figure 283 configure the DHCP snooping device s port that is connected to the DHCP server as a trusted port The trusted port forwa
447. ngs on the upper part of the page as described in Table 33 Click Apply Table 33 Configuration items ltem Description SNMP Specify to enable or disable SNMP agent Configure the local engine ID The validity of a user after it is created depends on the engine ID of the SNMP agent If the engine ID when the user is created is not identical to the current engine ID the user is invalid Local Engine ID Configure the maximum size of an SNMP packet that the agent can receive Maximum Packet Size or send Set a character string to describe contact information for system maintenance Contact ad mad If the device is faulty the maintainer can contact the manufacture factory according to the contact information of the device 114 ltem Description Location Set a character string to describe the physical location of the device SNMP Version Set the SNMP version run by the system Configuring an SNMP view Creating an SNMP view 1 Select Device gt SNMP from the navigation tree 2 Click the View tab The View tab appears Figure 102 View tab Setup Community Group ser Trap R Search Advanced Search View Mamet Rule MIB Subtree OID Subtree Mask Operation viewDefault ii 3 ViewDefault Included 1 ae il ViewDetault Excluded 1 3 6 1 6 3 15 eel i ViewDetault Excluded 1 3 6 1 6 3 16 ae Ti ViewDetault Excluded 1 3 6 1 6 3 18 eel T ViewDetault Excluded 1 3 6 1 4 1 25506 2 111 Ee il Add 3 Click Add The Add Vi
448. ns e Disable Port Temporarily Disables the port for a period of time The period can be configured in the global settings For more information see Configuring global settings for port security e Disable Port Permanently Disables the port permanently upon detecting an illegal frame received on the port The port does not come up unless you bring it up manually e Block MAC Adds the source MAC addresses of illegal frames to the blocked MAC addresses list and discards the frames All subsequent frames sourced from a blocked source MAC address will be dropped A blocked MAC address is restored to normal state after being blocked for 3 minutes The interval is fixed and cannot be changed Specifies whether to enable the outbound traffic control and selects a control method Available control methods e Only MAC Known Unicasts Allows only unicasts frames with their destination MAC addresses being authenticated to pass through e Only Broadcasts and MAC Known Unicasts Allows only broadcast and unicasts packets with their destination MAC addresses being authenticated to pass through e Only Broadcasts Multicasts and MAC Known Unicasts Allows only broadcast multicast and unicasts packets with their destination MAC addresses being authenticated to pass through Specifies whether to configure the port to ignore the authorization information from the authentication server The authorization information is delivered by the
449. nt Type e Trap The system sends a trap in the community name of null If you select both Log and Trap the system logs the event and sends a trap If neither is selected the system takes no action 29 Contiguring an alarm entry 1 Select Device gt RMON from the navigation tree 2 Click the Alarm tab Figure 86 Alarm entry Statistics History Event Log h Index v Search Advanced Search i Current m Rising Falling TEN Sampling Rising Falling 3 Index Interval Sec Static Item Interface Name Type Sampling sie a Event Event Owner Status Operation Value Index Index Number of m 1 10000 Packet GigabitEthernet1 0 1 Absolute 0 10000000 100 1 1 user1 Active A Discarding Events Add Del Selected 3 Click Add Figure 87 Adding an alarm entry Statistics History Event Log Add an Alarm Group Alarm Variable Static Item Number of Packet Discarding Events hd Interface Name GigabitEthernet1 0 1 v Sample Item Interval Seconds 5 65535 Sample Type Absolute Owner Chars 1 127 Alarm E Create Default Event Rising Threshold 0 2147483647 Rising Event 1 Falling Threshold 0 2147483647 Falling Event 1 v e Before creating Alarm please create Statistic and Event at fisrt Items marked with an asterisk are required Apply Cancel 4 Configure an alarm entry as described in Table 27 5 Click Apply Table 27 Configuration items ltem Description Alarm variable Set the traffic statistic
450. nter expert again to confirm the key e Click Apply The RADIUS scheme configuration page refreshes The added servers appear in the server list Figure 356 RADIUS accounting server configuration page Add RADIUS Serer Server Type Primary Accounting IP Address Pv4 1Pv6 10 110 91 146 Part 1613 1 65535 Default 1813 Key TILLI 1 64 Chars Confirm Key pa 1 64 Chars Apply Cancel 5 Click Apply 375 Figure 357 RADIUS scheme configuration Add RADIUS Scheme Scheme Name system 1 32 Chars Common Configuration Server Type Extended Username Format Without domain name F Advanced RADIUS Server Configuration Server Type IP Address Operation Primary Authentication 10 110 91 146 i Primary Accounting 10 110 91 146 i Add Items marked with an asterisk are required Apply Cancel Configuring AAA 1 Select Authentication gt AAA in the navigation tree The domain setup page appears 2 On the domain setup page configure a domain a Enter test for Domain Name b Click Enable to use the domain as the detault domain c Click Apply Figure 358 Creating an ISP domain Authentication Authorization Accounting ISP Domain Domain Name test Bt 24 chars Default Domain Apply Please selectthe ISF domainis Domain Mame Default Domain 376 Select the Authentication tab to configure the authentication scheme a Select the domain name test b Select Default Auth
451. nterface as shown in Table 96 4 Click Apply Table 96 Configuration items ltem Description Interface Name This field displays the name of a specific interface DHCP Relay Enable or disable the DHCP relay agent on the interface Enable or disable IP address check With this function enabled the DHCP relay agent checks whether a requesting Address Match Check client s IP and MAC addresses match a binding dynamic or static on the DHCP relay agent If not the client cannot access outside networks through the DHCP relay agent This prevents invalid IP address configuration Correlate the interface with a DHCP server group Server Group ID A DHCP server group can be correlated with multiple interfaces 301 Configuring and displaying dlients IP 4o MAC bindings 1 From the navigation tree select Network gt DHCP to enter the default DHCP Relay page shown in Figure 274 2 Inthe User Information area click User Information to view static and dynamic bindings as shown in Figure 277 Figure 277 Displaying dlients IP to MAC bindings DHCP Snooping RB Address v Search advanced Search IP Address MAC Address Type Interface Mame Operation 1 1 1 2 00el 1234 5678 Static Vian intertace i Add Return Refresh Reset 3 Click Add to enter the page as shown in Figure 278 Figure 278 Creating a static IP to MAC binding DHCP Snooping tems marked with an asterisk are required Apply Cancel 4 Configure the static
452. ntity EAP Response packet in a RADIUS Access Request packet to the authentication server 326 10 11 12 13 14 The authentication server uses the identity information in the RADIUS Access Request to search its user database If a matching entry is found the server uses a randomly generated challenge EAP Request MD5 challenge to encrypt the password in the entry and sends the challenge in a RADIUS Access Challenge packet to the network access device The network access device relays the EAP Request MD5 Challenge packet in a RADIUS Access Request packet to the client The client uses the received challenge to encrypt the password and sends the encrypted password in an EAP Response MD5 Challenge packet to the network access device The network access device relays the EAP Response MD5 Challenge packet in a RADIUS Access Request packet to the authentication server The authentication server compares the received encrypted password with the one it generated at step 5 If the two are identical the authentication server considers the client valid and sends a RADIUS Access Accept packet to the network access device Upon receiving the RADIUS Access Accept packet the network access device sends an EAP Success packet to the client and sets the controlled port in the authorized state so the client can access the network After the client comes online the network access device periodically sends handshake requests to check whet
453. nutes 53 seconds Table 8 Field description ltem Description Product Information Description for the device Device location which you can configure on the page you enter by Device Location selecting Device gt SNMP gt Setup Contact information which you can configure on the page you enter Contact Information by selecting Device gt SNMP gt Setup SerialNum Serial number of the device Software Version Software version of the device Hardware Version Hardware version of the device Bootrom Version Boot ROM version of the device Running Time System up time 47 Displaying the system resource state The System Resource State area displays the most recent CPU usage memory usage and temperature Displaying recent system logs Table 9 Field description Field Description Time Time when the system logs were generated Level Severity of the system logs Description Description for the system logs The System Information page displays up to five the most recent system logs To display more system logs click More to enter the Log List page You can also enter this page by selecting Device gt Syslog For more information see Configuring syslog Setting the refresh period To set the interval for refreshing system information select one of the following options from the Refresh Period list e Ifyou select a certain period the system refreshes system information at the specified interval e Ifyou select Manual
454. o 78 Configuring port mirroring Port mirroring refers to the process of copying the packets passing through a port VLAN CPU to the monitor port connecting to a monitoring device for packet analysis Terminology Mirroring source The mirroring source can be one or more monitored ports called source ports The device where the ports reside is called a source device Packets called mirrored packets passing through them are copied to a port connecting to a monitoring device for packet analysis Mirroring destination The mirroring destination is the destination port also known as the monitor port of mirrored packets and connects to the data monitoring device The device where the monitor port resides is called the destination device The monitor port forwards the mirrored packets to its connecting monitoring device A monitor port might receive multiple duplicates of a packet in some cases because it can monitor multiple mirroring sources For example assume that Port 1 is monitoring bidirectional trattic on Port 2 and Port 3 on the same device If a packet travels from Port 2 to Port 3 two duplicates of the packet will be received on Port 1 Mirroring direction The mirroring direction indicates that the inbound outbound or bidirectional traffic can be copied on a mirroring source e Inbound Copies packets received on a mirroring source e Outbound Copies packets sent out of a mirroring source e Bidirectiona
455. o authentication no privacy e Auth NoPriv Authentication without privacy Security Level e Auth Priv Authentication and privacy IMPORTANT For an existing SNMP group its security level cannot be modified Read View Select the read view of the SNMP group Select the write view of the SNMP group Write View If no write view is configured the NMS cannot perform the write operations to all MIB objects on the device Er Select the notify view the view that can send trap messages of the SNMP group otify View If no notify view is configured the agent does not send traps to the NMS Associate a basic ACL with the group to restrict the source IP address of SNMP ACL packets To restrict the intercommunication between the NMS and the agent you can allow or prohibit SNMP packets with a specific source IP address 119 Contiguring an SNMP user Select Device gt SNMP from the navigation tree 2 Click the User tab The User tab appears Figure 110 SNMP user Setup Community Group Trap TT 2 Search Advanced Search Authentication F User Mame Group Mame Mode Privacy Wode ALL Operation group mi Bl user NoAuthNoPriyy DS GER i Add Delete Selected 3 Click Add The Add SNMP User page appears Figure 111 Creating an SNMP user Setup community Group Trap View Add SMMP User User Mame st 32a Security Level NoAuth oP riy w Group Name group MoAuth MoPriw Authentication Mode Authentication Passwor
456. o configure rules Select the Rule ID box and enter a number for the rule If you do not specify the rule number the system will assign one Rule ID automatically If the rule number you specify already exists the following operations modify the contiguration of the rule Select the operation to be performed for IPv packets matching the rule Operation po e Permit Allows matched packets to pass e Deny Drops matched packets 464 ltem Descri ption Check Fragment Check Logging IP Address Filter Protocol ICMPv6 Type TCP UDP Port Time Range Source IP Address Source Prefix Destination IP Address Destination Prefix Named ICMPv Type ICMPv6 Type ICMPv6 Code Operator Source Port To Port Operator Port Destinati on To Port Select this box to apply the rule to only non first fragments If you do no select this box the rule applies to all fragments and non fragments Select this box to keep a log of matched IPv packets A log entry contains the ACL rule number operation for the matched packets protocol number source destination address source destination port number and number of matched packets This function is not supported Select the Source IP Address box and enter a source IPv6 address and prefix length The IPv address must be in a format like X X X X An IPv address consists of eight 16 bit long fields each of which is expressed with two hexad
457. o devices that have passed authentication or whose MAC addresses have been learned or configured on the access device Intrusion protection The intrusion protection feature checks the source MAC addresses in inbound frames for illegal frames and takes a predetined action on each detected illegal frames The action can be disabling the port temporarily disabling the port permanently or blocking frames from the illegal MAC address for 3 minutes not user configurable Port security traps You can contigure the port security module to send traps for port security events such as login logoff and MAC authentication These traps help you monitor user behaviors Port security modes Port security supports the following categories of security modes 421 Basic mode In this mode a port can learn the specified number of MAC addresses and save those addresses as secure MAC addresses It permits only frames whose source MAC addresses are secure MAC addresses or configured static MAC addresses When the number of secure MAC addresses reaches the upper limit no more secure MAC addresses can be added Advanced mode Port security supports 802 1X and MAC authentication Different port security modes represent different combinations of the two methods Table 127 describes the advanced security modes Table 127 Advanced security modes Advanced mode Description MAC Auth A port performs MAC authentication for users It services multiple use
458. o example Set the revision level to 0 Select Manual Select 1 from the Instance ID list Set the VLAN ID to 10 Click Apply The system maps VLAN 10 to MSTI 1 and adds the VLAN to instance mapping entry to the VLAN to instance mapping list i Repeat the preceding three steps to map VLAN 20 to MSTI 2 and VLAN 30 to MSTI 3 and add the VLAN to instance mapping entries to the VLAN to instance mapping list gt a mp ao 200 Click Activate Figure 185 Configuring an MST region Global Port Summary Port Setup eee 0 655 Default 0 Manual CO Modula Instance ID VLAN Mapped Contigure MSTP globally a gt a mp ao From the navigation tree select Network gt MSTP Click the Global tab Select Enable from the Enable STP Globally list Select MSTP from the Mode list Select the box before Instance Set the Instance ID field to 1 Set the Root Type field to Primary Click Apply 201 lEampeissio Apply Remove Activate Cancel Figure 186 Configuring MSTP globally on Switch A Region Port Summary Port Setup Global MSTP Configuration Enable STP Globally Mode MSTP Max Hops Path Cost Standard Legacy Bridge Diameter CJ Timertin centiseconds Forward Delay 500s 3000 Must be a multiple of 100 Hello Time 00 100 Must be a multiple of 100 Max Age 2000 00 4000 Must be a multiple of 100 Instance Instance ID Root Type Bridge Priority
459. o support tagged voice traffic Voice VLAN assignment mode Port link type supported for tagged voice Configuration requirements traffic Access Manual Configure the PVID of the port as the voice VLAN In automatic mode the PVID of the port cannot be the voice VLAN Trunk Automatic and manual In manual mode configure the port to permit packets of the voice VLAN to pass through In automatic mode the PVID of the port cannot be the voice VLAN Hybrid Automatic and manual In manual mode configure the port to permit packets of the voice VLAN to pass through tagged e P phones send untagged voice traffic When IP phones send untagged voice traffic you can only configure the voice traffic receiving ports on the device to operate in manual voice VLAN assignment mode Table 47 Required configurations on ports of different link types for them to support tagged voice traffic Voice VLAN assignment mode Port link type supported for untagged voice Configuration requirements traffic Configure the PVID of the port as the voice Access Manual VLAN Trunk ar Configure the PVID of the port as the voice VLAN and assign the port to the voice VLAN Configure the PVID of the port as the voice Hybrid Manual VLAN and configure the port to permit packets of the voice VLAN to pass through untagged NOTE e f an IP phone sends tagged voice traffic and its access port is configured with 802 1X authentication and guest VLAN you must assign different V
460. o the MLD querier for the following purposes Responds to queries if the host is an IPv6 multicast group member Applies tor an IPv multicast group membership After receiving an MLD report the switch forwards it through all the router ports in the VLAN and resolves the address of the reported IPv6 multicast group The switch also performs one of the following actions If no forwarding entry matches the IPv group address the switch creates a forwarding entry for the group adds the receiving port as a dynamic member port to the forwarding entry and starts an aging timer for the port If a forwarding entry matches the IPv group address but the receiving port is not in the forwarding entry tor the group the switch adds the port as a dynamic member port to the forwarding entry and starts an aging timer for the port It a forwarding entry matches the IPv group address and the receiving port is in the forwarding entry for the group the switch resets an aging timer for the port A switch does not forward an MLD report through a non router port If the switch forwards a report through a member port the MLD report suppression mechanism causes all attached hosts that monitor 268 the reported IPv multicast group address to suppress their own reports In this case the switch cannot determine whether the reported IPv6 multicast group still has active members attached to that port Done message When a host leaves an IPv multica
461. ocal Information Global LLDP local information a Chassis ID 0000 2013 1524 System name HP1920 System description 1920 24G Switch Software Version 5 20 99 Alpha 1101 Copyright c 2010 2014 Hewlett Packard Development Company L P System capabilities supported Bridge Router System capabilities enabled Bridge Router MED information Device class Connectivity device MED inventory information of master board HardwareRev REV A Statistic Information LLDP statistics global information LLDP neighbor information last change time 0 days 0 hours 0 minutes 19 seconds The number of LLDP neighbor information inserted 1 The number of LLDP neighbor information deleted 0 The number of LLDP neighbor information dropped 0 The number of LLDP neighbor information aged out 0 Table 79 Field description Field Description Chassis ID Local chassis ID depending on the chassis type defined Capabilities supported on the system System capabilities e Repeater supported o Bridge e Router Capabilities enabled on the system System capabilities e Repeater enabled e Bridge e Router MED device class e Connectivity device An intermediate device that provide network connectivity e Class I A generic endpoint device All endpoints that require the discovery service of LLDP belong to this category e Class II A media endpoint device The class Il endpoint devices support the media stream capabilities
462. ocal from the list 409 Figure 392 Configuring the authentication method for the ISP domain Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain aabbcc net Default Authn Local Name Secondary Method LAN access Auth Local Name Secondary Method C Login Auth Name Secondary Method PPP Auth Name secondary Method Portal Auth Name Secondary Method 6 Click Apply A configuration progress dialog box appears as shown in Figure 393 Figure 393 Configuration progress dialog box Current Configuration Setting LAN access Authh Ok 7 After the configuration process is complete click Close Configuring MAC authentication 1 Configure MAC authentication globally a From the navigation tree select Authentication gt MAC Authentication Select Enable MAC Authentication ll Click Advanced and configure advanced MAC authentication Set the offline detection period to 180 seconds Set the quiet timer to 180 seconds Select aabbcc net from the Authentication ISP Domain list Select MAC with hyphen from the Authentication Information Format area Click Apply gt a mp ao 410 Figure 394 Configuring MAC authentication globally MAC Authentication Configuration Enable MAC Authentication wT Advanced Offline Detection Period 180 seconds 60 2147483647 Default 300 Quiet Time 180 seconds 1 3600 Default 60 Server Timeout Time 100 seconds 100
463. of a nonexistent VLAN VLAN IDs e When you configure an access port as a tagged member of a VLAN or configure a trunk port as an untagged member of multiple VLANs in bulk the link type of the port is automatically changed into hybrid e You can configure a hybrid port as a tagged or untagged member of a VLAN only if the VLAN is an existing static VLAN VLAN configuration example Network requirements As shown in Figure 140 trunk port GigabitEthernet 1 0 1 of Switch A is connected to trunk port GigabitEthernet 1 0 1 of Switch B Configure the PVID of GigabitEthernet 1 0 1 as VLAN 100 and configure GigabitEthernet 1 0 1 to permit packets from VLAN 2 VLAN 6 through VLAN 50 and VLAN 100 to pass through Figure 140 Network diagram WA GE1 0 1 GE1 0 1 WSF Switch A Switch B Contiguring Switch A 1 Configure GigabitEthernet 1 0 1 as a trunk port and configure VLAN 100 as the PVID a From the navigation tree select Device gt Port Management b Click Setup to enter the page for setting ports c Select Trunk in the Link Type list select the PVID box and then enter PVID 100 d Select GigabitEthernet 1 0 1 on the chassis front device panel e Click Apply 145 Figure 141 Configuring GigabitEthernet 1 0 1 as a trunk port and its PVID as 100 Summary Detail Basic Configuration Port State No Change v Speed No Change Duplex No Change LinkType Trunk PVID 100 1 4094 Description Chars 1 80 Advanced Configurat
464. of each field in bytes Figure 268 DHCP message format file 128 options variable e op Message type defined in option field 1 REQUEST 2 REPLY e htype hlen Hardware address type and length of the DHCP client e hops Number of relay agents a request message traveled e xid Transaction ID a random number chosen by the client to identify an IP address allocation e secs Filled in by the client the number of seconds elapsed since the client began address acquisition or renewal process This field is reserved and set to O e flags The leftmost bit is defined as the BROADCAST B flag If this flag is set to O the DHCP server sent a reply back by unicast If this flag is set to 1 the DHCP server sent a reply back by broadcast The remaining bits of the flags field are reserved for future use e ciaddr Client IP address if the client has an IP address that is valid and usable Otherwise it is set to zero The client does not use this field to request a specific IP address to lease e yiaddr Your client IP address assigned by the server e siaddr Server IP address from which the client obtained configuration parameters e giaddr Gateway IP address of the first relay agent a request message traveled e chaddr Client hardware address e sname Server host name from which the client obtained configuration parameters e file Bootfile name and path information defined by the serv
465. of the MAC addresses 1234 0200 0000 and 1234 0300 0000 439 Configuring port isolation The port isolation feature isolates Layer 2 traftic for data privacy and security without using VLANs You can also use this feature to isolate the hosts in a VLAN from one another The switch supports only one isolation group that is automatically created as isolation group 1 You cannot remove the isolation group or create other isolation groups on the device The number of ports assigned to the isolation group is not limited Within the same VLAN ports in an isolation group can communicate with those outside the isolation group at Layer 2 Contiguring the isolation group 1 Select Security gt Port Isolate Group from the navigation tree 2 Click the Port Setup tab Figure 435 Configuring the port isolation group Summary Config type a B ated port D plink port Select portis 4 m T at Select All Select None Isolated port Uplink port Apply 3 Configure the port isolation group as described in Table 132 4 Click Apply Table 132 Configuration items ltem Descri ption Specify the role of the ports to be assigned to the isolation group e Isolated port Assign the ports to the isolation group as isolated ports see e Uplink port Assign the port to the isolation group as the uplink port The switch does not support the Uplink port config type Select the ports you want to assign to the isolation
466. omain test Configure the shared key as name for packets between the access device and the authentication server and the shared key as money for packets between the access device and the accounting server Exclude the ISP domain name from the username sent to the RADIUS servers Specity the device to try up to 5 times at an interval of 5 seconds in transmitting a packet to the RADIUS server until it receives a response from the server and to send real time accounting packets to the accounting server every 15 minutes Figure 311 Network diagram Vlan int2 A 10 1 1 1 8 10 1 1 2 GE1 0 1 Supplicant Authenticator Authentication servers 1 1 1 10 24 Switch RADIUS server cluster Configuring IP addresses Assign an IP address to each interface as shown in Figure 311 Make sure the supplicant switch and servers can reach each other Details not shown Configuring the RADIUS servers For more information about the RADIUS configuration see Configuring RADIUS Configuring 802 1X for the switch 1 Configure global 802 1X a From the navigation tree select Authentication gt 802 1X b Select Enable 802 1X select the authentication method as CHAP and click Apply Figure 312 Configuring 802 1X globally 002 1 Configuration Enable 602 1 Authentication Method CHAP s F Advanced Apply Ports with 602 14 Enabled Max i Port Me Guest Auth Fail Port L Port Control Mandshake 4 inentication MUMPS VLAN VLAN Autho
467. on 1 From the navigation tree select Network gt Diagnostic Tools 2 Click the Trace Route tab The traceroute configuration page appears Figure 296 Traceroute configuration page Ping Destination IP address orhostmame a Summar 319 Enter the IP address or host name of the destination device in the Trace Route field Click Start View the output in the Summary area Figure 297 Traceroute operation result Summar traceroute to 192 168 2 1 192 168 2 1 30 hops max 40 bytes packet 1 192 168 2 1 1 ms lt 1 ms 1 ms 320 Configuring 802 1X 802 1X overview 802 1X is a port based network access control protocol initially proposed by the IEEE 802 LAN WAN committee for the security of WLANs It has been widely used on Ethernet for access control 802 1X controls network access by authenticating the devices connected to 802 1 X enabled LAN ports This chapter describes how to configure 802 1 X on an HP device You can also configure the port security feature to perform 802 1X Port security combines and extends 802 1X and MAC authentication It applies to a network for example a WLAN that requires different authentication methods for different users on a port For more information see Configuring port security 802 1X architecture 802 1X operates in the client server model It comprises three entities the client the supplicant the network access device the authenticator and the authentication
468. on 368 security 802 1X EAP over RADIUS 323 security 802 1X RADIUS EAP Message attribute 324 security 802 1X RADIUS Message Authentication attribute 324 security and authentication mechanisms 364 security MAC authentication 404 server configuration 373 rate rate limit 473 rate limit working mechanism 474 rebooting device 53 receiving LLDP frames 222 region MST 186 MST region configuration 191 MST regional root 187 relay agent DHCP configuration 297 298 303 DHCP Option 82 295 DHCP overview 292 DHCP snooping configuration 306 308 enabling DHCP relay agent on interface 301 Remote Authorization Dial In User Service Use RADIUS Remote Network Monitoring Use RMON removing IP services ARP entry 245 Web device file 68 reporting IGMP snooping membership 254 MLD snooping membership 268 resetting Web device contiguration 66 restoring Web device contiguration 64 restrictions NMM port mirroring configuration 80 Web interface login 2 RMON alarm function contiguration 95 alarm group 94 configuration 93 105 Ethernet statistics group 93 event group 94 group 93 history group 94 running status displaying 96 statistics function configuration 95 RMON event logs displaying 104 RMON history sampling information displaying 103 RMON statistics displaying 101 root MST common root bridge 187 MST regional root 187 MST root port role 187 STP algorithm calculation 179 STP root bridge
469. on Its padding formats vary with vendors By default the normal padding format is used on the device You can specify the code type for the sub options as ASCII or HEX The padding contents for sub options in the normal padding format are as follows e Sub option 1 Padded with the VLAN ID and interface number of the interface that received the client s request The following figure gives its format The value of the sub option type is 1 and that of the circuit ID type is O Figure 270 Sub option 1 in normal padding format 0 7 15 23 31 Sub option type 0x01 Length 0x06 Circuit ID type 0x00 Length 0x04 VLAN ID Interface number e Sub option 2 Padded with the MAC address of the DHCP relay agent interface or the MAC address of the DHCP snooping device that received the client s request The following figure gives its format The value of the sub option type is 2 and that of the remote ID type is 0 Figure 271 Sub option 2 in normal padding format 0 7 15 23 31 Sub option type 0x02 Length 0x08 Remote ID type 0x00 Length 0x06 MAC Address Protocols and standards e RFC 2131 Dynamic Host Configuration Protocol e RFC 2132 DHCP Options and BOOTP Vendor Extensions e RFC 1542 Clarifications and Extensions for the Bootstrap Protocol e RFC 3046 DHCP Relay Agent Information Option e RFC 3442 The Classless Static Route Option for Dynamic Host Configuration Protocol DHCP version 4 296 Configuri
470. on Accounting Authorization Configuration of AAA Select an ISP domain system v Default Auth RADIUS Jam Secondary Method E LAN access Auth Name Secondary Method El Login Auth Name Secondary Method PPP Auth Name Secondary Method Portal Auth Name Secondary Method Command Authz Name e When the configuration process is complete click Close 3 Configure AAA accounting method a Click the Accounting tab b Select the ISP domain system c Select Default Accounting select the accounting method RADIUS from the list and select the accounting scheme system from the Name list d Click Apply Figure 431 Configuring AAA accounting Domain Setup Authentication Authorization Accounting Configuration of AAA select an ISP domain system E Accounting Optional Disable Default Accounting RADIUS Name system Secondary Method E LAN access Accounting Name Secondary Method El Login Accounting Name Secondary Method PPP Accounting Name Secondary Method Portal Accounting Name Secondary Method e When the configuration process is complete click Close Configuring port security 1 Enable port security a From the navigation tree select Authentication gt Port Security b Select Enable Port Security c Click Apply 437 Figure 432 Configuring global port security settings Port Security Configuration Enable Port Security F Advanced Apply Security Ports And Secure MAC Address List
471. on at the specified interval e If you select Manual the system refreshes device information only when you click the Refresh button 49 Configuring basic device settings The device basic information feature provides the following functions e Set the system name of the device The configured system name is displayed on the top of the navigation bar e Set the idle timeout period for logged in users The system logs an idle user off the Web for security purpose after the configured period Contiguring system name 1 Select Device gt Basic from the navigation tree The system name configuration page appears Figure 38 Configuring the system name Web Idle Timeout Get sysname sysname HP Chars 1 30 ltems marked with an asterisk are required Apply 2 Enter the system name 3 Click Apply Contiguring idle timeout period 1 Select Device gt Basic from the navigation tree 2 Click the Web Idle Timeout tab The page for configuring idle timeout period appears Figure 39 Configuring the idle timeout period System Name oet idle timeout Idle timeout 10 Minutes 1 999 Default 10 tems marked with an astensk are required Apply 50 3 Set the idle timeout period for logged in users 4 Click Apply 51 Maintaining devices Software upgrade AN CAUTION Software upgrade takes some time Avoid performing any operation on the Web interface during the upgrading procedu
472. onfiguration 352 359 AAA ISP domain authorization methods configuration 356 security 802 1X port authorization status 322 auto DHCP automatic address allocation 292 automatic ACL automatic rule numbering 451 451 B backing up Web device contiguration 64 backup port MST 187 bandwidth QoS policy configuration 466 basic port security basic mode 421 port security basic mode configuration 430 basic ACLs 450 basic management LLDPDU TLV types 218 bidirectional NMM port mirroring 79 blackhole entry MAC address table 174 boundary port MST 187 BPDU STP BPDU forwarding 184 bridge MST common root bridge 187 187 MST regional root 187 STP designated bridge 178 STP root bridge 178 buttons on webpage 16 C cable status testing 91 calculating MSTI calculation 189 MSTP CIST calculation 189 STP algorithm 179 category ACL advanced 450 ACL auto match order sort 450 ACL basic 450 ACL config match order sort 450 ACL Ethernet frame header 450 508 choosing Ethernet link aggregation selected state 205 Ethernet link aggregation unselected state 205 CIST calculation 189 network device connection 187 class Ethernet link aggregation port configuration 206 class two Ethernet link aggregation MAC address learning configuration class 206 Ethernet link aggregation port isolation configuration class 206 Ethernet link aggregation VLAN configuration class 206 CLI commands 24 c
473. onfiguration items ltem Description Select the VLAN interface to be configured Select VLAN Interface The VLAN interfaces available for selection in the list are those created on the page for creating VLAN intertaces 153 ltem Description DHCP Configure the way in which the VLAN interface gets an IPv4 address BOOTP Allow the VLAN interface to get an IP address automatically by selecting the DHCP or _ BOOTP option or manually assign the VLAN interface an IP address by selecting the Manual option In the latter case you must set the mask length or enter a mask in Manual dotted decimal notation format Select Up or Down from the Admin Status list to bring up or shut down the selected VLAN interface Modify Pd When the VLAN interface fails shut down and then bring up the VLAN interface Addes which might restore the VLAN interface By default a VLAN interface is down if all Ethernet ports in the VLAN are down rn Otherwise the VLAN interface is up Status When you set the admin status follow these guidelines e The current VLAN interface state in the Modify IPv4 Address and Modify IPv Address frames changes as the VLAN interface state is modified in the Admin Status list e The state of each port in the VLAN is independent of the VLAN interface state Auto Configure the way in which the VLAN interface gets an IPv link local address Select the Auto or Manual option e Auto The device automaticall
474. onfigure a correct system time so that the device can operate correctly with other devices The system time module allows you to display and set the device system time on the Web interface You can set the system time through manual configuration or network time protocol NTP automatic synchronization Defined in RFC 1305 the NTP synchronizes timekeeping among distributed time servers and clients NTP can keep consistent timekeeping among all clock dependent devices within the network and ensure a high clock precision so that the devices can provide diverse applications based on consistent time Displaying the current system time To view the current system date and time select Device gt System Time from the navigation tree to enter the System Time page Figure 45 System time configuration page Network Time Protocal System Time Configuration 2013 06 25 08 56 19 Apply Manually contiguring the system time 1 Select Device gt System Time from the navigation tree The page for configuration the system time appears 2 Click the System Time Configuration text to open a calendar 56 Figure 46 Calendar page 2013 07 04 13 45 10 Mon Tue Wed Thu Fri Sat Co 15 7 bed bed i 3 Enter the system date and time in the Time field or select the date and time in the calendar To set the time on the calendar page select one of the following methods o Click Today The date setting in the calendar is synchronized
475. ontiguration 20 getting started 20 logging in 24 client DHCP snooping Option 82 support 308 security 802 1X authentication 325 security 802 1X authentication access device initiated 324 security 802 1X authentication client initiated 324 security 802 1X authentication configuration 336 security 802 1X authentication initiation 324 security 802 1X configuration 321 332 security 802 1X configuration global 332 security 802 1X configuration portspecific 333 commands CLI 24 common DHCP options 295 common root bridge 187 comparing security 802 1X EAP relay termination authentication modes 325 contiguration guideline LLDP 241 static routing 291 contiguration guidelines ACL 452 QoS 476 contiguration wizard basic service setup 34 contiguring 509 802 1X ACL assignment 343 802 1X Auth Fail VLAN 336 802 1X guest VLAN 335 AAA 352 359 AAA accounting methods for ISP domain 357 AAA authentication methods for ISP domain 355 AAA authorization methods for ISP domain 356 AAA ISP domain 354 ACL 489 ACL Ethernet frame header 459 ACL time range 453 ACLs 450 advanced IPv4 ACL 456 advanced Pv6 ACL 463 alarm entry 100 ARP 242 ARP static 246 Auth Fail VLAN 802 1X 330 authorized IP 443 444 basic device settings 50 basic IPv4 ACL 455 basic IPv6 ACL 462 client s IP to MAC bindings 302 DHCP relay agent 297 298 303 DHCP relay agent advanced param
476. ontrols and plug ins Script ActiveX controls marked safe for scripting and Active scripting Figure 2 Internet Explorer settings 2 Security Settings Settings Disable Enable j Active scripting F Disable 5 Click OK to save your settings Enabling JavaScript in a Firefox browser 1 Launch the Firefox browser and select Tools gt Options 2 In the Options dialog box click the Content icon and select Enable JavaScript 3 Others Figure 3 Firefox browser settings ira ef A F Main Tabs Content Applications Privacy Security Advanced Options Block pop up windows Exceptions Load images automatically Exceptions Enable JavaScript Advanced Enable Jaya Fonts amp Colors Default Font Times New Size 16 kd Colors Languages Choose your preferred language For displaying pages Choose Click OK to save your settings The Web interface does not support the Back Next and Refresh buttons provided by the browser Using these buttons might result in abnormal display of Web pages To ensure correct display of Web page contents after software upgrade or downgrade clear data cached by the browser before you log in If you click the verification code displayed on the Web login page you can get a new verification code Up to five users can concurrently log in to the device through the Web interface A list can contain a maximum of 20000 entries
477. operation parameters for a port 74 displaying basic system information 47 displaying client s IP to MAC bindings 302 310 displaying current system time 56 displaying device information 48 displaying global LLDP 234 displaying IGMP snooping multicast forwarding entries 259 displaying interface statistics 132 displaying IP services ARP entries 244 displaying LLDP for a port 229 displaying LLDP information 236 displaying MLD snooping multicast forwarding entries 2 3 displaying MSTP information on port 197 displaying PoE 500 displaying port operation parameters 73 displaying recent system logs 48 displaying RMON event logs 104 displaying RMON history sampling information 103 displaying RMON running status 96 displaying RMON statistics 101 displaying SNMP packet statistics 123 displaying specified operation parameter for all ports 73 displaying stack device summary 42 displaying stack topology summary 42 displaying syslogs 61 displaying system information 47 displaying system resource state 48 displaying Web device file 67 downloading Web device file 67 enabling DHCP 299 enabling DHCP relay agent on interface 301 enabling DHCP snooping 309 enabling IGMP snooping globally 256 enabling IGMP snooping in a VLAN 257 enabling LLDP globally 227 enabling LLDP on ports 223 enabling MLD snooping globally 270 enabling MLD snooping in a VLAN 270 enabling PSE detect nonstandard PDs
478. oping can process IGMPv1 and IGMPv2 messages but it floods IGMPv3 messages in the VLAN instead of processing them e IGMPv3 snooping can process IGMPv1 IGMPv2 and IGMPv3 messages Version IMPORTANT If you change IGMPv3 snooping to IGMPv2 snooping the system clears all IGMP snooping forwarding entries that are dynamically added 257 ltem Description Enable or disable the IGMP snooping querier function On an IP multicast network that runs IGMP a Layer 3 device acts as an IGMP querier to send IGMP queries and establish and maintain multicast forwarding entries ensuring correct multicast traffic forwarding at the network layer Querier On a network without Layer 3 multicast devices IGMP querier cannot work because a Layer 2 device does not support IGMP To address this issue you can enable IGMP snooping querier on a Layer 2 device so that the device can generate and maintain multicast forwarding entries at the data link layer providing IGMP querier functions Query interval Configure the IGMP query interval General Query Source IP Specify the source IP address of general queries Special Query Source IP Specify the source IP address of group specific queries Contiguring IGMP snooping port tunctions 1 From the navigation tree select Network gt IGMP snooping 2 Click the Advanced tab Figure 231 Configuring IGMP snooping port functions Basic Port Configuration Part Please select a port VLAN IO
479. or an advanced IPv ACL Complete one of the tasks according to the ACL category Contiguring a time range 1 Select QoS gt Time Range from the navigation tree 2 Click the Add tab Figure 445 Adding a time range SUMM ary Remove Time Range Name NN Chars Periodic Time Range Star Time i End Time Sun Mon Tue ved Thu Fri Sat Absolute Time Range From i l l To i Apply SUMIM ary 3 Configure a time range as described in Table 137 453 A Click Apply Table 137 Configuration items liem Description Time Range Name Set the name for the time range Start Time Set the start time of the periodic time range You can define Set the end time of the periodic time range The end time must both a periodic de ie be greater than the start time time range and Periodic oo Time Range Sun Mon pas Select the day or days of the week on which the periodic time time range to Tue Wed ae Thu Fri range is valid You can select any combination of the days of adda ee the week compound time and Sat range This Set the start time and date of the absolute time range The time compound time From of the day is in the hh mm format 24 hour clock and the date range recurs on is in the MM DD YYYY format the day or days Absolute esses of the week Time Range Set the end time and date of the absolute time range The time oy within th N y within the of the day is in the hh mm format 24 hour clock and th
480. or designated port to enter the forwarding state much faster than STP If the old root port on the device has stopped forwarding data and the upstream designated port has started forwarding data a newly elected RSTP root port rapidly enters the forwarding state A newly elected RSTP designated port rapidly enters the forwarding state if it is an edge port a port that directly connects to a user terminal rather than to another network device or a shared LAN segment or it connects to a point to point link Edge ports directly enter the forwarding state Connecting to a point to point link a designated port enters the forwarding state immediately after the device receives a handshake response from the directly connected device 184 Introduction to MSTP MSTP overcomes the following STP and RSTP limitations e STP limitations STP does not support rapid state transition of ports A newly elected port must wait twice the forward delay time before it transits to the forwarding state even if it connects to a point to point link or is an edge port e RSTP limitations Although RSTP enables faster network convergence than STP RSTP fails to provide load balancing among VLANs As with STP all RSTP bridges in a LAN share one spanning tree and forward packets from all VLANs along this spanning tree MSTP features Developed based on IEEE 802 1s MSTP overcomes the limitations of STP and RSTP In addition to supporting rapid network converge
481. ot provide an independent Boot ROM image instead it integrates the Boot ROM image with the system software image file together in a software package file with the extension name of bin Examples Download software package file main bin from the TFTP server and use the Boot ROM image in the package as the startup configuration file lt Sysname gt upgrade 192 168 20 41 main bin bootrom Download software package file main bin from the TFTP server and use the system software image file in the package as the startup configuration file lt Sysname gt upgrade 192 168 20 41 main bin runtime upgrade ipv Syntax upgrade ipv serveraddress source filename bootrom runtime Parameters server address IPv address of a TFTP server source filename Software package name on the TFTP server bootrom Specities the Boot ROM image in the software package file as the startup configuration file Specities the system software image file in the software package file as the startup configuration ile Description Use upgrade ipv server address source filename bootrom to upgrade the Boot ROM image If the Boot ROM image in the downloaded software package file is not applicable the original Boot ROM image is still used as the startup configuration file Use upgrade ipv server address source filename runtime to upgrade the system software image file If the system software image file in the downloaded software package file is not ap
482. other forwarded traffic Recommended contiguration procedures Step Remarks Required 1 Configure a local mirroring group For more information see Configuring a mirroring group Select the mirroring group type local in the Type list Required 2 Configure source ports for ad p od For more information see Configuring ports for the mirroring group the mirroring group Select the port type Mirror Port Required 3 Configure the monitor port for the mirroring group For more information see Configuring ports for the mirroring Qroup Select the port type Monitor Port Configuring a mirroring group 1 From the navigation tree select Device gt Port Mirroring 80 2 Click Add to enter the page for adding a mirroring group Figure 66 Adding a mirroring group summary Remove Modify Port Mirroring Group ID 1 1 Type Local Apply Group ID Type 3 Configure the mirroring group as described in Table 16 4 Click Apply Table 16 Configuration items ltem Descri ption Mirroring Group ID ID of the mirroring group to be added Tupe Specify the type of the mirroring group to be added as Local which indicates YP adding a local mirroring group Configuring ports for the mirroring group 1 From the navigation tree select Device gt Port Mirroring 2 Click Modify Port to enter the page for configuring ports for a mirroring group 8 Figure 67 Modifying ports Summary Add Remove
483. otoco type type address address address address 2 2 1 1 2 6 4 6 4 28 byte ARP request reply e Hardware type Hardware address type The value 1 represents Ethernet e Protocol type Type of the protocol address to be mapped The hexadecimal value Ox0800 represents IP e Hardware address length and protocol address length Length in bytes of a hardware address and a protocol address For an Ethernet address the value of the hardware address length field is 6 For an IPv4 address the value of the protocol address length field is 4 e OP Operation code which describes type of the ARP message Value 1 represents an ARP request and value 2 represents an ARP reply e Sender hardware address Hardware address of the device sending the message e Sender protocol address Protocol address of the device sending the message e Target hardware address Hardware address of the device to which the message is being sent e Target protocol address Protocol address of the device to which the message is being sent ARP operating mechanism As shown in Figure 217 Host A and Host B are on the same subnet Host A sends a packet to Host B as follows 1 Host A looks through its ARP table for an ARP entry for Host B If one entry is found Host A uses the MAC address in the entry to encapsulate the IP packet into a data link layer frame Then Host A sends the frame to Host B 242 2 If Host A finds no entry tor Host B Host A buff
484. ou can select any available Layer 3 interface for example a virtual interface of the device If you select NULL O the destination IPv6 address is unreachable 282 IPv4 static route configuration example Network requirements As shown in Figure 258 configure IPv4 static routes on Switch A Switch B and Switch C for any two hosts to communicate with each other Figure 258 Network diagram Vlan int600 1 1 5 6 30 Vlan int300 Vian int900 1 1 2 3 24 y 1 1 3 1 24 Host A Switch A Switch C Host C 1 1 2 2 24 1 1 3 2 24 Configuration considerations On Switch A configure a default route with Switch B as the next hop On Switch B configure one static route with Switch A as the next hop and the other with Switch C as the next hop On Switch C configure a default route with Switch B as the next hop Configuration procedure 1 Configure a default route to Switch B on Switch A a Select Network gt IPv4 Routing from the navigation tree of Switch A b Click the Create tab c Enter 0 0 0 0 for Destination IP Address O for Mask and 1 1 4 2 for Next Hop d Click Apply 283 Figure 259 Configuring a default route summary Remove dees ee 0 0 0 0 Mask Dok Preference Ps 1 255 Default 60 Next Hop 1 1 4 2 CJ interface tems marked with an asteriski are required Apply Configured Static Route Information Destination IP Address Wask Protocol Preference Fest Hop Interface 2 Configure a s
485. oup ports for the static aggregation group By default no link aggregation group exists 2 Optional Displaying aggregate Display detailed information of an existing aggregation intertace information group Contiguring a dynamic aggregation group Step Remarks Create a dynamic aggregate interface and configure member ports for the 1 Creating a link dynamic aggregation group automatically created LACP is enabled aggregation group automatically on all the member ports By default no link aggregation group exists 2 Optional Displaying aggregate interface Display detailed information of an existing aggregation group information Set LACP priority for the local system and link aggregation member ports 3 Optional Setting Ch RED fh b LACP priority anges o priorities affect the aggregation state of the member ports The default port LACP priority and system LACP priority are both 32768 4 Optional Displayi Te Display detailed information of LACP enabled ports and the corresponding remote partner ports Creating a link aggregation group 1 From the navigation tree select Network gt Link Aggregation 2 Click Create 208 Figure 188 Creating a link aggregation group Summary Modify Remove Enter Link Aggregation Interface ID 1 1 8 Specify Interface Type Static LACP Disabled Note The type ofthe link aggregation interface set here z i overwrites the existing LACF settings ofthe ports in the
486. oute operations access data on the device and configure the device but they cannot upgrade the software add delete modify users or back up or restore the configuration file e Management A management level user can perform any operations on the device Password Set the password for the user Confirm Password Enter the same password again Select the password encryption type e Reversible Uses a reversible encryption algorithm The ciphertext password can be mara decrypted to get the plaintext password e Irreversible Uses an irreversible encryption algorithm The ciphertext password cannot be decrypted to get the plaintext password Select the service types for the user to use including Web FTP and Telnet You must Service Type select at least one service type Setting the super password A management level user can set the password for non management level users to switch to the management level If the password is not set non management level users cannot switch to the management level from a lower level To set the super password 1 2 Select Device gt Users from the navigation tree Click the Super Password tab Figure 73 Setting the super password Summary Create Modify Remove Switch To Management Please specify the super password Create Remove Password 1 16 Chars Confirm Password Password Encryption Reversible Irreversible Apply Note Use the super password to switch from the c
487. packets with CRC errors received on the interface corresponding to the MIB node etherStatsCRCAlignErrors Number of Received Packets With CRC Check Failed Total number of undersize packets shorter than 64 octets received by the interface corresponding to the MIB node etherStatsUndersizePkts Number of Received Packets Smaller Than 64 Bytes Total number of oversize packets longer than 1518 octets received by the interface corresponding to the MIB node etherStatsOversizePkts Number of Received Packets Larger Than 1518 Bytes Total number of undersize packets shorter than 64 octets with CRC errors received by the interface corresponding to the MIB node etherStatsFragments Number of Received Packets Smaller Than 64 Bytes And FCS Check Failed Number of oversize packets longer than 1518 octets with CRC errors received by the interface corresponding to the MIB node etherStatsJabbers Number of Received Packets Larger Than 1518 Bytes And FCS Check Failed 102 Field Description Total number of collisions received on the interface Number of Network Conflicts corresponding to the MIB node etherStatsCollisions EE Diccard na Eveni Total numker of drop events received on the interface a a LE corresponding to the MIB node etherStatsDropEvents Total numker of received packets with 64 octets on the Numbker of Received 64 Bytes Packets interface corresponding to the MIB node etherStatsPkts64Octets Total
488. pe is delta Retresh 108 Configuring energy saving Energy saving enables a port to operate at the lowest transmission speed disable PoE or go down during a specitic time range on certain days of a week The port resumes when the effective time period ends Contiguring energy saving on a port 1 Select Device gt Energy Saving from the navigation tree to enter the energy saving configuration page 2 Click a port Figure 98 Energy saving configuration page Please select a port BEDE Bee eee 1910 24 PoE 1 LILLIE BIL BIR LALIEAEA Index Time Range Sun Mon Tue Wed Thu Fri Sat PoE Disabled LowestSpeed Shutdown 1 08 30 16 00 A mM M E A E 2 22 00 0300 H m M E E E 3 00 00 00 00 A A A A A FB A A E E 4 00 00 00 00 A A P A A PA P A Al E 5 00 00 00 00 Fi A A A A FB A A E E Note lf PoE is enabled through a PoE profile PoE configured in energy saving does nat take effect Cancel 3 Configure an energy saving policy for the port as described in Table 30 4 Click Apply Table 30 Configuration items ltem Descri ption Time Range Set the time period when the port is in the state of energy saving IMPORTANT e Up to five energy saving policies with different time ranges can be configured on a port Sun through Sat e Specify the start time and end time in units of 5 minutes such as 08 05 to 10 15 Otherwise the start time is postponed and the end time is brought forward so that they meet the requirements For
489. peed 100Mbps Speed 100Mbps Speed 100Mbps Server A Server B Server C Configuring the switch 1 As shown in Figure 62 set the speed of GigabitEthernet 1 0 4 to 1000 Mbps 75 Figure 62 Configuring the speed of GigabitEthernet 1 0 4 Summary Detail Basic Configuration Port State No Change Speed 1000 Duplex No Change Link Type No Change E Pyp 1 4094 Combo No Change Description Chars 1 80 Advanced Configuration MDI No Change Flow Control Ma Change Max MAC Power Save Mo Change Count Mo Change 0 8192 Storm Suppression Broadcast Mo Change Multicast Na Change No Change Suppression Suppression Suppression pps range 1 148610 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port kbps range 1 102400 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port See AEAA AAR 1910 24 Switch BOOG mimi mimi ABEE Ha Select All Select None Selected Ports GE1 0 25 ee it may take some time if you apply the above settings to multiple ports Apply Cancel Batch contigure the autonegotiation speed range on GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 as 100 Mbps a On the Setup tab select Auto 100 from the Speed list b Select 1 2 and 3 on the chassis front panel 1 2 and 3 represent ports GigabitEthernet 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 3 c Click Apply 76 Figure 63 B
490. perating Mode list Click Apply A progress dialog box appears Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds Figure 212 Setting the LLDP operating mode to Tx Global Setup Global Summary Neighbor Summary Interface Name GE1 0 1 LLDP State Enable Basic Settings LLDP Operating Mode Tx v Encapsulation Format ETHII CDP Operating Mode Disable v LLDP Polling Interval LLDP Trapping Disable v Base TLV Settings V Port Description V System Capabilities V System Description V System Name V Management Address Number v Addtional TLV Settings Cancel Enable global LLDP a Click the Global Setup tab b Select Enable from the LLDP Enable list Click Apply A progress dialog box appears seconds 1 30 Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds Verifying the configuration 1 Display the status information of port GigabitEthernet 1 0 1 on Switch A a From the navigation tree select Network gt LLDP By default the Port Setup tab is displayed 237 2 b Click the GigabitEthernet1 0 1 port name in the port list c Click the Status Information tab at the lower half of the page The output shows that port GigabitEthernet 1 0 1 is connected to an MED neighbor device Figure 213 The status information tab 1 Local Information Neighbor Information Statistic Informat
491. perform operations on the multiple tagged VLANs Detail Modify VLAN and Modify Port tabs You can repeat these steps b Modifying a VLAN to configure multiple Configure the hybrid port as a tagged tagged VLANs for the member of the specitied VLAN hybrid port Configure the tagged 7 Modifying ports VLAN of the hybrid port Creating VLANs From the navigation tree select Network gt VLAN Click Create to enter the page for creating VLANs Enter the VLAN IDs a VLAN ID range or both Click Create Ak N 139 Figure 134 Creating VLANS Select VLAN Port Detail Detail bodite WYLAN Modity Port Remove Create VLAN IDs _ Bample3 5 10 Create ID Description 1 VLAN 0001 Modity VLAN description Note vou can da this later on the Modify VLAN page Modity the description ofthe selected VLAN ID Description et chars Table 40 Configuration items ltem Description VLAN IDs IDs of the VLANs to be created Modify the description of the selected VLAN e ID Select the ID of the VLAN whose description string is to be modified Click the ID of the VLAN to be modified in the list in the middle of the page e Description Set the description string of the selected VLAN By default the description string of a VLAN is its VLAN ID such as VLAN 0001 Contiguring the link type of a port You can also configure the link type of a port on the Setup tab of Device gt Port Management For more information see Man
492. playing device information eeeeeeeeeeeeeeereresereeeeeereserseeeseesseeseceseceseeseresereseeeseesseoseresreesresseseresereeserereosereseeeseeseeeseeeseeeseese 48 Configuring basic device settings EE EE T E A EE E S E E E E EE EO P E EE E E 50 Configuring system EE COSCO SOOOeer errr eee eeee rere reee rere rerrreerreerrerrrerrrerrreerterereerreerrererrteereerree 50 Configuring idle timeout period EE EE EE EO S OE EO EE TEE 50 Maintaining ET ERR EOEO OOOO OST eee ree eer eter erreer eer eereeererreereer rere erreer eee cerreererreereeererreerrerrerreereeeee 52 Software upgrade ER EE OE E E E E EE A E 52 Device TE EE RRR TREE ERE EERE REETO SET OEEOOSEEOSEO CEO Seer tere reeeteeereeereerreerrerr rere reerreeereerreerreeerrterrrerreerreerreetreerrrerrreerreerreerreerree 53 Electronic label eeeeeeeereeeseeseresereereseeeseeseeeseeeseenseesseeseeeseeeseesseoseeeseeeseeseesseeseresereseessresereseressreseroseresecesreseresereseceseesseesereseeeseee 54 Diagnostic TE RE Ee ee 5A Configuring system TE ee 56 Overy rasan anes ER RE EE RE EE EE EE EE ER TR N 56 Displaying the current system TT ee 56 Manually configuring the system TE ee 56 Configuring system time by using NTP E E RE ET EE HE EE E E E E E T 57 System time configuration example EE EE RE OE EE OE EO OE 58 Network requirements RE EE EE EE EL OO N AE EE 58 Configuring the system TT eee eee eee Ce ee eee tee ee etree terete reer eeer tere teeereeereerreerree 59 Verifying the configuration EE EE
493. playing syslogs Loghas Log Seup This page impements the sytem log manasernerd function a TimeDate Seach advanced Search Timeabe corte Level Digesi Desorption Jul 4 12454 036 2013 Cup Notficaion WEBOPT_CLI_CHANGECLOCK System dock changed Ape 26 120226 891 2000 CFM Notficaion CPM_SAVECONFIG SUCCESSFULLY Configuration b saved successfully aa l Perii e Evyertinders 1 CommandSouces 1 CongSsuces2 Apr AA 172 EA Soo CFGMAN Matficaboan BPMN CGCtHAN GED Confighlesmnanon a Gonaguration is cnangea Apr 26 120222 054 200 WEE Wamang WEBOPT_LOGIN_SUC admin logged in ram 192 168 1 169 aa Aaa 4 PERS AAATPRSAOOCOUMTAAAS die res local Sanvice login Apr 26 1202 ZYEAA 2000 SC Information SC_AsA_SUCCESS Usemtlame acmingsystemy MAA Is successful EE i AAT ppe AT AAA ere hals wire logins Apr 26 1202 71 649 200 SC Inlermatien aC LAUNCH ror MA UseiNamesadnin srstem MA launched T i BAAT pesAUTAOR AMSrhe mes local Sonteosllogin pt 26 120221 EAT C information AAA SUCCES ER ER N sia l TUER Usertamesadmin system MA is Succes styl ET re me AAATRSALITANR AAAS che nas Inral Aardraslngin ma t T 1 i ir t ii Ji me E a dd ER UseNamesadnin system MA launched OE i i AAATIDESAUTAEM AAAS heme local Senice login J f ke I d E EL Apr di iioa aga MOM oe Infarmatien BO AA SUCCESS Userttamesadming system MAA is successful many yn AAATYpE AUTHEN AAAScheme local Senice logint Ape FA 102 EAE NON ac Information Sf AAA AUINGH Lis erPLame BATuNgNSy
494. plicable the original system software image file is still used as the startup configuration file To validate the downloaded software package file reboot the device NOTE The HP 1920 Switch Series does not provide an independent Boot ROM image instead it integrates the Boot ROM image with the system software image file together in a software package file with the extension name of bin 3 Examples Download software package file main bin from the TFTP server and use the Boot ROM image in the package as the startup configuration file lt Sysname gt upgrade ipv6 2001 2 main bin bootrom Download software package file main bin from the TFTP server and use the system software image file in the package as the startup configuration file lt Sysname gt upgrade ipv 2001 2 main bin runtime Contiguration example for upgrading the system software image at the CLI Network requirements As shown in Figure 20 a 1920 switch is connected to the PC through the console cable and connected to the gateway through Ethernet 1 0 1 The IP address of the gateway is 192 168 1 1 24 and that of the TFTP server where the system software image suppose its name is Switch1920 bin is located is 192 168 10 1 24 The gateway and the switch can reach each other The administrator upgrades the Boot ROM image and the system software image file of the 1920 switch through the PC and sets the IP address of the switch to 192 168 1 2 24 Figure
495. port e Traffic policing Polices particular flows entering or leaving a device according to configured specitications and can be applied in both inbound and outbound directions of a port When a flow exceeds the specification some restriction or punishment measures can be taken to prevent overconsumption of network resources e Traffic shaping Proactively adjusts the output rate of traffic to adapt traffic to the network resources of the downstream device and avoid unnecessary packet drop and congestion Trattic shaping is usually applied in the outbound direction of a port e Congestion management Provides a resource scheduling policy to arrange the forwarding sequence of packets when congestion occurs Congestion management is usually applied in the outbound direction of a port e Congestion avoidance Monitors the usage status of network resources and is usually applied in the outbound direction of a port As congestion becomes worse it actively reduces the amount of trattic by dropping packets Among these QoS technologies traffic classification is the basis for providing differentiated services Traffic policing traffic shaping congestion management and congestion avoidance manage network traffic and resources in different ways to realize differentiated services This section is focused on traffic classification and the subsequent sections will introduce the other technologies in details Traffic classification When def
496. ptional 1 Select Device gt SNMP from the navigation tree The SNMP configuration page appears 113 Figure 101 Setup tab Community Group User Trap View SNMP Enable Disable Local Engine ID AOODE3AAOSACESABCDAAFE e 0 64 Hex Chars Maximum Packet Size 1500 Bytes 464 17940 Default 1500 Contact Hewlett Packard Development LomparF1 200 Chars Location HP 1 200 Chars SNMP Version vt Lovee iva Mote Ifyou disable SNMP all SMMP related configurations will not be saved tems marked with an asteriski are required Apply Cancel SNMP Statistics Count Messages delivered to the SNMP entity Messages which were for an Unsupported version Messages which used a SNMP community name not known Messages which represented an illegal operation forthe community supplied ASM 1 or HER errors in the process of decoding MIB objects retrieved successfully MIB objects altered successfully GetRequestPDU accepted and processed GetNextRequestPDOW accepted and processed SetRequestPDU accepted and processed Messages passed fram the SNMP entity SNMP POWs which had tooBig errorstatus Maximum packet size 1500 SNMP POU s which had nosuchName errorstatus SNMP PDUs which had badValue errot status SNMP POWs which had denErr errorstatus GetResponse PDW accepted and processed Trap POWs accepted and processed 17 records 100 per page page 1 1 record 1 17 Refresh Z2 a Aa Aa A A A A Se eo prey ore oo A a Configure SNMP setti
497. ptional intormation You can display the local global LLDP information and statistics 6 Displaying LLDP information received from LLDP neighbors You can display the LLDP information received from LLDP neighbors Optional Enabling LLDP on ports 1 From the navigation tree select Network gt LLDP By default the Port Setup tab is displayed This tab displays the enabling status and operating mode of LLDP on a port 2 Select one or more ports and click Enable To disable LLDP on a port select the port and click Disable Figure 198 The port setup tab Global Setup Global Summary Neighbor Summary h Port Name v Search Advanced Search FI Port Name LLDP Status LLDP Work Mode Operation GigabitEthernet1 0 1 Enabled TXRX A E GigabitEthernet1 0 2 Enabled TXRX A GigabitEthernet1 0 3 Enabled TxRx A F GigabitEthernet1 0 4 Enabled TXRX A F GigabitEthernet1 0 5 Enabled TXRX A F GigabitEthernet1 0 6 Enabled TxRx A GigabitEthernet1 0 7 Enabled TXRX A E GigabitEthernet1 0 8 Enabled TxRx A F GigabitEthernet1 0 9 Enabled TxRx A F GigabitEthernet1 0 10 Enabled TXRX A GigabitEthernet1 0 11 Enabled TXRX A F GigabitEthernet1 0 12 Enabled TxRx A GigabitEthernet1 0 13 Enabled TXRX A E GigabitEthernet1 0 14 Enabled TxRx fe F GigabitEthernet1 0 15 Enabled TxRx A 28 records 15 v per page page 1 2 record 1 15 Next Last 1 GO Enable Disable Modify Selec
498. r 802 1Q Destination u Length Type Data CRC 32 Address i Address TPID 6 bytes 6 bytes 4 bytes 2 bytes 46 to 1500 bytes 4 bytes As shown in Figure 456 the 4 byte 802 1Q tag header consists of the tag protocol identifier TPID two bytes in length whose value is 0x8100 and the tag control information TCI two bytes in length Figure 457 presents the format of the 802 1Q tag header The priority in the 802 1Q tag header is called 802 1p priority because its use is defined in IEEE 802 1 p Table 147 presents the values for 802 1 p priority 470 Figure 457 802 1 tag header Byte 1 Byte 2 Byte 3 Byte 4 TPID Tag protocol identifier TCI Tag control information 765432107645 432107605 4321310765 4 3 2 1 0 Table 147 Description on 802 1p priority 802 1p priority decimal 802 1p priority binary Description O 000 best effort 001 background 2 010 spare 3 011 excellent effort 4 100 controlled load 5 101 video 6 110 voice 7 111 network management Queue scheduling In general congestion management uses queuing technology The system uses a certain queuing algorithm for traffic classitication and then uses a certain precedence algorithm to send the traffic Each queuing algorithm handles a particular network traffic problem and has significant impacts on bandwidth resource assignment delay and jitter In this section two common hardware queue scheduling algorithms Strict Priority SP queu
499. r ACLs Description Characters 0 12 7 Apply ACL Number Type Number of Rules Match Order Description 4 Click the Advanced Setup tab 5 Configure the following parameters a Select 3000 from the ACL list b Select Rule ID enter the rule ID 0 and select the action Deny 348 c In the IP Address Filter area select Destination IP Address Enter 10 0 0 1 as the destination IP address Enter 0 0 0 0 as the destination IP address wildcard d Click Add Figure 330 ACL rule configuration SUMMar Add Basic Setup Link Layer Setup Remove ACL 3000 wt Help Configure an Advanced ACL Rule ID Of 5534 fno ID is entered the system will specify one Action C Mon first Fragments Only L Logging IPF Address Filter Destination IP Address 10 0 0 1 Destination Wildcard 0 0 0 0 Protocol IP_ sl ICMP Type IMP Message eme Twe koss temp code oss TEP UDP Part TCP Connection Established u e N eeina E era por NL Range of Portis 0 65535 Precedence Filter DSCP Not Check yt TOS Not Check ka Precedence Mot Check wt C Time Range Add Rule ID Operation Description Time Fiat Configuring 802 1X 1 Configure 802 1X globally a From the navigation tree select Authentication gt 802 1X b Select Enable 802 1X 349 c Select the authentication method CHAP d Click Apply Figure 331 Configuring 802 1X globally 02 1 Configuration Enable 802 1 Authentication Method C
500. r communicate by using the proprietary RADIUS protocol and packet format 370 ltem Descri ption Select the format of usernames to be sent to the RADIUS server Typically a username is in the format of userid isp name of which isp name is used by the device to determine the ISP domain for the user If a RADIUS server such as a RADIUS server of some early version does not accept a username that contains an ISP domain name you can configure the device to remove the domain name of a username before sending it to the RADIUS Username Format server The options include e Original format Configure the device to send the username of a user on an as is basis e With domain name Configure the device to include the domain name in a username e Without domain name Configure the device to remove any domain name of a username Set the shared key for RADIUS authentication packets and that for RADIUS accounting packets The RADIUS client and the RADIUS authentication accounting server use MD5 to encrypt RADIUS packets They verify packets through the specified Authentication Key shared key The client and the server can receive and respond to packets Confirm Authentication Key from each other only when they use the same shared key Accounting Key IMPORTANT Confirm Accounting Key e The shared keys contigured on the device must be consistent with those contigured on the RADIUS servers e The shared keys configure
501. r configuration 380 port security advanced control configuration 428 507 port security advanced mode contiguration 433 port security authentication modes 421 port security basic control configuration 425 port security basic mode configuration 430 port security configuration 421 423 430 port security configuration global 424 port security permitted OUls configuration 429 RADIUS common parameter configuration 369 RADIUS scheme configuration 368 RADIUS server contiguration 373 security 802 1X access device initiated authentication 324 security 802 1X authentication 325 security 802 1X client initiated 324 security 802 1X EAP over RADIUS 323 security 802 1X EAP relay authentication 326 security 802 1X EAP relay termination mode 325 security 802 1X EAP termination 327 security 802 1X initiation 324 security 802 1X RADIUS Message Authentication attribute 324 security MAC authentication 404 security MAC authentication ACL assignment 411 security MAC authentication contiguration 406 408 security MAC local authentication configuration 408 user group configuration 382 using 802 1X authentication with other features 329 using MAC authentication with other features 405 Authentication Authorization and Accounting Use AAA Auth Fail VLAN 802 1X authentication 330 configuring 802 1X 336 MAC authentication 405 authorized IP configuration 443 444 authorizing AAA c
502. r ports of the ports aggregated at one end are also aggregated The two ends can automatically negotiate the aggregation state of each member port 215 Do not assign the following types of ports to Layer 2 aggregate groups O O O O O O MAC address authentication enabled ports port security enabled ports packet filtering enabled ports Ethernet frame filtering enabled ports IP source guard enabled ports 802 1 X enabled ports Deleting a Layer 2 aggregate interface also deletes its aggregation group and causes all member ports to leave the aggregation group When a load sharing aggregation group becomes non load sharing because of insufficient load sharing resources one of the following problems might occur o The number of Selected ports of the actor is inconsistent with that of the partner which might result in incorrect traffic forwarding o The peer port of a Selected port is Unselected which might result anomalies in upper layer protocol and traffic forwarding 216 Configuring LLDP Overview In a heterogeneous network a standard configuration exchange platform makes sure different types of network devices from different vendors can discover one another and exchange configuration The Link Layer Discovery Protocol LLDP is specified in IEEE 802 1AB The protocol operates on the data link layer to exchange device information between directly connected devices With LLDP a device sends loca
503. r the ISP domain a Click the Authentication tab b Select test from the Select an ISP domain list c Select Default AuthN select RADIUS as the default authentication method and select the authentication scheme system from the Name list as shown in Figure 325 Figure 325 Configuring the AAA authentication method for the ISP domain Domain Setup Authorization Accounting Authentication Configuration of AAA Select an ISP domain test Default AuthN RADIUS Name system Secondary Method Ol LAN access AuthN Name Secondary Method El Login Authn Name Secondary Method PFP Authh Name Secondary Method Portal Auth Name Secondary Method d Click Apply A configuration progress dialog box appears as shown in Figure 326 346 Figure 326 Configuration progress dialog box Current Configuration setting Default Authh OK e After the contiguration process is complete click Close Configure AAA authorization method for the ISP domain a Click the Authorization tab b Select test trom the Select an ISP domain list c Select Default AuthZ select RADIUS as the default authorization method and select the authorization scheme system from the Name list as shown in Figure 327 Figure 327 Configuring the AAA authorization method for the ISP domain Domain Setup Authentication Accounting Authorization Configuration of AAA Select an ISP domain test Default Authz RADIUS Name system Secondary Method E
504. ration in fast mode click the Save button at the upper right of the auxiliary area 65 Figure 55 Saving the configuration Save Help Logout Backup Restore Initialize Save Current Settings Note Click Save Current Settings to save the current configuration e Common mode To save the configuration in common mode a Select Device gt Configuration trom the navigation tree b Click the Save tab c Click Save Current Settings Resetting the contiguration Resetting the configuration restores the device s factory defaults deletes the current configuration files and reboots the device To reset the configuration 1 Select Device gt Configuration from the navigation tree 2 Click the Initialize tab 3 Click Restore Factory Default Settings Figure 56 Resetting the configuration Backup Restore save Restore Factory Default Settings Note Click Restore Factory Default Settings to restore and initialize the factory default settings and reboot 66 Managing files The device requires a series of files for correct operation including boot files and configuration files These files are saved on the storage media You can display files on the storage media download upload or remove a file or specify the main boot file Displaying tiles 1 Select Device gt File Management from the navigation tree Figure 57 File management page Please select disk flash v Used space 22 18 MB Free space
505. rations on its member ports nor do they take part in aggregation calculations The configuration on a member port of the aggregate group does not take effect until the port leaves the aggregate group Specify the ID of the VLAN in which port functions are to be configured VLAN ID The configurations made in a VLAN take effect on the ports only in this VLAN Configure the maximum number of IPv multicast groups on a port With this feature you can regulate IPv multicast traffic on the port Multicast Group IMPORTANT Limit When the number of IPv multicast groups on a port exceeds the limit that you are setting the system deletes all the IPv forwarding entries related to that port from the MLD snooping forwarding table The receiver hosts to that port can join the IPv multicast groups again before the number of IPv multicast groups on this port reaches the limit 272 ltem Descri ption Enable or disable fast leave processing on the port When a port that is enabled with the MLD snooping fast leave processing feature receives an MLD done message the switch immediately deletes that port from the IPv forwarding table entry for the multicast group specified in the message When the switch receives MLD multicast address specific queries for that multicast group it does not forward them to that port Fast Leave You can enable MLD snooping fast leave processing on ports to save bandwidth and resources Displaying
506. rd table ethernetHistoryTable The statistics include bandwidth utilization number of error packets and total number of packets The history statistics table record trattic statistics collected for each sampling interval The sampling interval is user contigurable Event group The event group detines event indexes and controls the generation and notifications of the events triggered by the alarms defined in the alarm group and the private alarm group The events can be handled in one of the following ways e Log Logs event information including event time and description in the event log table so the management device can get the logs through SNMP e Trap Sends an SNMP notification when the event occurs e Log Trap Logs event information in the event log table and sends an SNMP notification when the event occurs None No action Alarm group The RMON alarm group monitors alarm variables such as the count of incoming packets etherStatsPkts on an interface After you define an alarm entry the system gets the value of the monitored alarm variable at the specified interval If the value of the monitored variable is greater than or equal to the rising threshold a rising event is triggered If the value of the monitored variable is smaller than or equal to the falling threshold a falling event is triggered The event is then handled as defined in the event group If an alarm entry crosses a threshold multiple times in
507. rds response messages from the DHCP server to the client The untrusted port connected to the unauthorized DHCP server discards incoming DHCP response messages 306 Figure 283 Trusted and untrusted ports DHCP server DHCP client Unauthorized DHCP server gt gt DHCP reply messages In a cascaded network as shown in Figure 284 configure each DHCP snooping device s ports connected to other DHCP snooping devices as trusted ports To save system resources you can disable the untrusted ports that are not directly connected to DHOP clients from generating DHCP snooping entries Figure 284 Trusted and untrusted ports in a cascaded network DHCP client Host A DHCP snooping Switch A GE1 0 1 GE1 0 2 GE1 0 4 DHCP server Device GE1 0 2 GEVORM n GE1 0 1 ir DHCP client GE1 0 3 Host B DHCP snooping Switch C GE1 0 1 GE1 0 4 ait DHCP client GEuor3f DHCP snooping Host C Switch B Untrusted ports Trusted ports disabled from recording binding entries DHCP client Trusted ports enabled to record binding entries Host D Table 98 describes roles of the ports shown in Figure 284 Table 98 Roles of ports Trusted port disabled from Trusted port enabled to Device Untrusted port EE Er a recording binding entries record binding entries Switch A ee GigabitEthernet 1 0 3 GigabitEthernet 1 0 2 307 Trusted port disabled from Trusted port enabled to Device Untruste
508. re Otherwise the upgrade operation may be interrupted A boot file also known as the system software or device software is an application file used to boot the device Software upgrade allows you to obtain a target application file from the local host and set the file as the boot file to be used at the next reboot In addition you can select whether to reboot the device to bring the upgrade software into effect 1 Select Device gt Device Maintenance from the navigation tree to enter the Software Upgrade tab Figure 40 Software upgrade configuration page Reboot Diagnostic Information File Type C ifa file with the same name already exists overwrite it without any prompt 1To Upgrade the files of slave boards at one time _ Reboot after the Upgrade is finished Mote Do not perform any operation when Upgrade is in process The length of filename cannot exceed 37 and must end with an extension of app or bin tems marked with an asteriski are required Apply 2 Configure software upgrade parameters as described in Table 10 3 Click Apply Table 10 Configuration items ltem Description File Specify the path and filename of the local application file which must be suffixed with the app or bin extension Specify the type of the boot file for the next boot File Type e Main Boots the device e Backup Boots the device when the main boot file is unavailable 52 ltem Description ia tileawih t
509. re 366 User group configuration page Local User Add User Group Group name 1 32 Chars WLAN Potty ACL 000 4999 Userprofile Ys 1 32 Chars Allow Guest Accounts tems marked with an asterisk are required Apply Cancel Configure the user group as described in Table 119 Click Apply Table 119 Configuration items ltem Descri ption Group name Specify a name for the user group level Select an authorization level for the user group Visitor Monitor Configure or m Management in ascending order of priority VLAN Specify the VLAN to be authorized to users of the user group after the users pass authentication ACL Specify the ACL to be used by the access device to control the access of users of the user group after the users pass authentication Specify the user profile for the user group User profile This option does not take effect on this software version Select this option to allow guest accounts to be added to the user group Allow Guest Accounts This option is selected for the system defined user group system and cannot be modified However this option does not take effect on this software version 383 Managing certificates Overview The Public Key Infrastructure PKI offers an infrastructure for securing network services through public key technologies and digital certificates and for verifying the identities of the digital certificate owners A digital certificate is a bin
510. rect 0 127 0 0 1 InLoopBackO 127 0 0 0 255 0 0 0 Direct 0 127 0 0 1 InLoopBacko 127 0 0 1 255 255 255 255 Direct 0 127 0 0 1 InLoopBack0 192 168 10 255 255 255 0 Direct 0 192 168 12 Vlan interface100 192 168 12 255 255 255 255 Direct 0 127 0 0 1 InLoopBack0 8 records 15 perpagelpage 1 1 record 1 8 1 GO Table 90 Field description Field Description Destination IP Address Destination IP address and subnet mask of the IPv4 route Mask Protocol Protocol that discovered the IPv4 route Preference value for the IPv4 route Preference l The smaller the number the higher the preference Next Hop Next hop IP address of the IPv4 route Interi Output interface of the IPv4 route Packets destined for the specified nterface network segment are sent out of the interface 279 Creating an Pv4 static route Select Network gt IPv4 Routing from the navigation tree 2 Click the Create tab The page for configuring an IPv4 static route appears Figure 255 Creating an Pv4 static route Summar Remove de IE EE Address ask fF Preference 1 255 Default 60 NetHop interface tems marked with an asterisk are required Apply Configured Static Route Information Destination IP Address Wask Protocol Preference Mest Hop 3 Create an IPv4 static route as described in Table 91 4 Click Apply Table 91 Configuration items ltem Description Destination IP Address Enter the destination host or network IP address in dot
511. reerrereeer terete eerrerreereeererreeriere 317 Ping RE RR EE TR T E E E EE N O E ER es 317 Wicelec ell cr EE AE ER 317 Ping operation EE EE EE EE EE OE 318 Traceroute operation EE EE EE EE EE OO EE N N EE EE TN 319 Vil Configuring BOD X EE ee 32 002 LX overia EE EE EE RE EE 372 802 1X architecture OR 321 Access control methods seeeeeeeeeeseeeseesseeseeesereseeeseeseeeseeeseesseeseoseeeseeeseesseosereseesseeseeosereseeeseeseeosereseeesreseroseeeseeeseeseeesee 3921 Controlled uncontrolled port and port authorization status EE Ee EE ee EE ee AE EE ee ee EE EE ee ee ee 399 Packet ET 322 EAP over VEE EE E ENEE EE OE 323 Initiating 802 1X GT TER RE Ee 394 802 1X authentication procedures AT ET EE 395 ee aeons TERE TE hea anatasecaisetesedsinterneaeutaeee 328 Using 802 1X authentication with other features srrresserssssteseeseestecnsestecneestecneennecneenecneeneensenneenneceneeneennes 399 Configuration ed 0 1 DE EE 331 Recommended configuration procedure EE EE ET E 339 Configuring 802 1X globally EE EE ee ee 339 Configuring 802 1X ona DOr eseseseseseseee ee EER EE EE EE EE EE EE EE EE EE EE EE EE EE ee ee ER ER ER ER ER ER ER ee ee ee ee ee ee ee ee ee 333 Configuring an 802 1X guest VLAN eers sees Rg ee GER GER EER GE GER gek EER GER GER gek EER eER GER gee ee GER GER gek gek ee ee ge Rek ee 335 Configuring an Auth Fail VLAN sesse sere esse sesse ee se see ee EE ee Ee Re EER Oe EE Ee EE EE Re EER Oe EE Ee GE EE Re DE EE Re RE Ee Re E
512. regate interfaces below the chassis front panel You can select aggregate interfaces from this list and configure them as mirroring ports of a port mirroring group Select port s 82 Local port mirroring contiguration example Network requirements As shown in Figure 68 configure local port mirroring on Switch A so the server can monitor the packets received and sent by the Marketing department and Technical department Figure 68 Network diagram Marketing Dept GE1 0 1 GE1 0 3 Device A GE1 0 2 Technical Dept amp Source port C Monitor port Configuration procedure Adding a local mirroring group 1 From the navigation tree select Device gt Port Mirroring 2 Click Add to enter the page for adding mirroring groups as shown in Figure 69 Figure 69 Adding a local mirroring group Summary Remove Modify Port Mirroring Group ID 1 Type Local Group ID Type 83 3 Enter 1 for Mirroring Group ID and select Local from the Type list 4 Click Apply Configuring GigabitEthernet 1 0 1 and GigabitEthernet 1 0 2 as the source ports Click Modify Port Select 1 Local from the Mirroring Group ID list Select Mirror Port from the Port Type list Select both from the Stream Orientation list Select 1 GigabitEthernet 1 0 1 and 2 GigabitEthernet 1 0 2 on the chassis front panel Figure 70 Configuring the source ports N de Se Ma Summary Add Remove Mirroring Group ID 1 Local Port Type Mir
513. retransmits an authentication request if it does not receive a response to the request it has sent to the client within a period of time set Retry Times f f i by the TX Period or the Supplicant Timeout Time value The network access device stops retransmitting the request if it has made the maximum number of request transmission attempts but still received no response TX Period Sets the username request timeout timer Handshake Period Sets the handshake timer Re Authentication l Sets the periodic online user re authentication timer Period Supplicant Timeout Sets the client timeout timer Time Server Timeout Time Sets the server timeout timer NOTE You can set the client timeout timer to a high value in a low performance network and adjust the server timeout timer to adapt to the performance of different authentication servers In most cases the default settings are sufficient Configuring 802 1X on a port 1 From the navigation tree select Authentication gt 802 1X 2 In the Ports With 802 1X Enabled area click Add 3 Configure 802 1X features on a port as shown in Figure 310 and then click Apply Ys Figure 310 Configuring 802 1X on a port Apply 802 1X Port Configuration Port GigabitEthernet1 0 1 X Port Control MAC Based hi Port Authorization Auto ad Max Number of Users 256 1 256 Default 256 7j Enable Handshake Enable Re Authentication Guest VLAN 1 4094 Enable MAC VLAN Only hybrid
514. ribute types which are defined by RFC 2865 RFC 2866 RFC 2867 and RFC 2568 Extended RADIUS attributes Attribute 26 Vendor Specific an attribute defined by RFC 2865 allows a vendor to define extended attributes to implement functions that the standard RADIUS protocol does not provide A vendor can encapsulate multiple sub attributes as TLVs in attribute 26 to provide extended functions As shown in Figure 349 a sub attribute encapsulated in Attribute 26 consists of the following parts e Vendor ID ID of the vendor lts most significant byte is O The other three bytes contains a code that is compliant to RFC 1700 e Vendor Type Type of the sub attribute e Vendor Length Length of the sub attribute e Vendor Data Contents of the sub attribute 367 Figure 349 Format of attribute 26 23 31 0 7 15 Vendor ID continued Vendor Type Vendor Length Vendor Data Specified attribute value Protocols and standards e RFC 2865 Remote Authentication Dial In User Service RADIUS e RFC 2866 RADIUS Accounting e RFC 2867 RADIUS Accounting Modifications for Tunnel Protocol Support e RFC 2868 RADIUS Attributes for Tunnel Protocol Support RFC 2869 RADIUS Extensions Contiguring a RADIUS scheme A RADIUS scheme defines a set of parameters that the device uses to exchange information with the RADIUS servers There might be authentication servers and accounting servers or primary servers and secondary servers
515. ring common parameters 1 Click the expand button before Advanced in the Common Configuration area to expand the advanced configuration area 369 Figure 352 Common configuration Common Configuration Server Type standard Username Format Without domain name Advanced Authentication Key 1 64 Chars Confirm Authentication Key 1 64 Chars Accounting Key 1 64 Chars Confirm Accounting Key 1 64 Chars Quiet Time Minutes 0 255 Default 5 Sever Response Timeout Time Seconds 1 10 Default 3 Request Transmission Attempts 1 20 Default 3 Realtime Accounting Interval Minutes 0 60 Default 12 must be a multiple of 3 Realtime Accounting Attempts 1 255 Default 5 Unit for Data Flows Byte Unit for Packets One packet Security Policy Server RADIUS Packet Source IP Pv4 C IPv6 E Buffer stop accounting packets Stop Accounting Attempts 10 65535 Default 500 EF Send accounting on packets Attribute Interpretation ki 2 Configure the parameters as described in Table 115 Table 115 Configuration items ltem Description Select the type of the RADIUS servers supported by the device which can be e Standard Standard RADIUS servers The RADIUS client and RADIUS server communicate by using the standard RADIUS protocol and packet Server Type format defined in RFC 2138 2139 or later e Extended Extended RADIUS servers usually running on CAMS or IMC The RADIUS client and the RADIUS serve
516. ring rate limit on a ee OO EE Ee A86 Configuring priority mapping de A87 Configuring priority trust mode on q URE EE EE Ee A88 ACL and QoS configuration example OE OO EO EE EE EO Ee ee A89 Network requirements srsssssssssssessessesssecesssseesssssscssssssssssnssessssseesssssscsssssecssassscssssscssssssecssassssssassesssasscessnescsssnessssnnneeen A89 Configuring Switch EE 489 Contiguring POE eeeereeeseseeseseseeseeeeseseneoseereseeresesrereseereseeresesroresesreseerereeroreseoresesreseereresrereseoresresesrsreseeresesreseseereseereseeeeee 497 GT EE EE EE OE aaa 497 Configuring POE eereeeseeseeesereseeeseeeseesereseeeseesseosereseceseeseeeeresereseeesresereseceseeesreseresecesressreseresreereeseresereseeeseeseresereseeeseesereseeeseee 498 Configuring PoE ports ER LE EE RE T T 498 Configuring non standard PD detection ee EE EE EE EE EE EER EER EER EER EER EER AE ERA EE ee ERA Ee Ee Ee ee A99 Displaying information about PSE and PoE ports EE OE EE 500 PoE configuration example EE RE N TE EE EE RE EA 501 Support and other resources teeeeeeeeereeseeeeerereseseereerereseeeereseeeeseoreseseeseseoreseereseerosesrosescoresrsreseerereerereseeresesresesrereseeresee 503 Contacting HP ssesese sesse sesse sees ee es ER ER EE EE EE EE EE EE ER ER ER EE EE EE EE EE EE EE EE EE ER ER ER ER EE EE EE EE EE EE ER ER ER ER anes EE ER ER ER EE EE EE EE EE EE EE EER ER ER ER ee 503 Subscription TT TE nese eeu neeeeeeunseu seu eseeaseeaseeaneeeeeeuees 503 Related EES BR 5
517. rization OP eration of Users Add Del Selected 337 2 Configure 802 1X for GigabitEthernet 1 0 1 a In the Ports With 802 1X Enabled area click Add b Select GigabitEthernet1 0 1 from the Port list select Enable Re Authentication and click Apply Figure 313 Configuring 802 1X for GigabitEthernet 1 0 1 Apply 802 1X Port Configuration Port GigabitEthernet1 0 1 4 Port Control MAC Based v Por Authorization Auto Max Number of Users 256 1 256 Default 256 Vv Enable Handshake J Enable Re Authentication Guest VLAN 1 4094 Enable MAC VLAN Only hybrid ports support this configration Auth Fail VLAN 1 4094 Items marked with an asterisk are required Apply Cancel Configuring the RADIUS scheme for the switch 1 Configure authentication and accounting attributes for the RADIUS scheme a From the navigation tree select Authentication gt RADIUS and click Add b Enter the scheme name system c Select the server type Extended and select Without domain name from the Username Format list Click Advanced Enter name in the Authentication Key and Confirm Authentication Key fields Enter money in the Accounting Key and Confirm Accounting Key fields Enter 5 as the server timeout timer gt a mo 8 Enter 5 as the maximum number of request transmission attempts i Enter 15 as the realtime accounting interval 338 Figure 314 Configuring the RADIUS scheme Add RADIUS scheme Scheme Name 1 32 Chars
518. roduce Specify the range of VLANs available for l the same result and the latest selection during related operations er ie N Configure a subset of all existing VLANS n n Ga This step is required before you perform NN By default the untagged operations on the Detail Modify VLAN VLAN of a trunk port is VLAN and Modify Port tabs l b Modifying a VLAN When you change the Configure the trunk port as an untagged untagged VLAN PVID of a member of the specified VLANSs trunk port the former untagged VLAN automatically becomes a Configure the untagged tagged VLAN of the trunk port 5 Modifyi ts ai dk iki VLAN of the trunk port 6 Configure the trunk port as a tagged member of the specified VLANs a Selecting VLANs Specify the range of VLANs available for selection during related operations Required Configure a subset of all existing VLANs This step is required before you perform operations on the Detail Modify VLAN and Modify Port tabs b Modifying a VLAN Configure the trunk port as a tagged member of the specified VLANs N A A trunk port can have multiple tagged VLANs You can repeat these steps to configure multiple tagged VLANs for the trunk port Configure the tagged 7 Modifyi ts Ak ae VLAN of the trunk port Recommended configuration procedure for assigning a hybrid port to a VLAN Step Remarks Required 1 Creating VLANs Create one or multiple VLANs Optional Configure th
519. ror Port v Stream Orientation both Select port s AE Select All Select None N Port s Mm Available for Selection Apply Selected Port s GE1 0 1 GE1 0 2 Note 1 Selected Port s Configured member port s 2 Not Available for Selection All the member ports of mirroring group on the device except Selected Port s 6 Click Apply A contiguration progress dialog box appears 7 After the success notification appears click Close Configuring GigabitEthernet 1 0 3 as the monitor port Click Modify Port Select 1 Local from the Mirroring Group ID list Select Monitor Port from the Port Type list Select 3 GigabitEthernet 1 0 3 on the chassis front panel gt YS 84 Figure 71 Configuring the monitor port Summary Add Remove Modify Po Mirroring Group ID 1 Local Port Type Monitor Port v Stream Orientation both Select port s nate aoa EHEHE E N Port s Mm Available for Selection Selected Port s Note 1 Selected Port s Configured member port s 2 NotAvailable for Selection All the member ports of mirroring group on the device except Selected Port s 5 Click Apply A configuration progress dialog box appears 6 After the success notification appears click Close 85 Apply Managing users The user management function allows you to do the following e Adding a local user and specifying the password access level and service types for the user e Settin
520. routers on the local subnet to determine whether any active multicast group members exist on the subnet The destination address of IGMP general queries is 224 0 0 1 After receiving an IGMP general query the switch forwards the query through all ports in the VLAN except the receiving port The switch also performs one of the following actions e Ifthe receiving port is a dynamic router port in the router port list the switch restarts the aging timer for the port e Ifthe receiving port is not in the router port list the switch adds the port as a dynamic router port into the router port list and starts an aging timer for the port IGMP report A host sends an IGMP report to the IGMP querier for the following purposes e Responds to IGMP queries if the host is a multicast group member e Applies for a multicast group membership After receiving an IGMP report the switch forwards it through all the router ports in the VLAN resolves the address of the reported multicast group and performs one of the following actions e If no forwarding entry matches the group address the switch creates a forwarding entry for the group adds the receiving port as a dynamic member port to the forwarding entry and starts an aging timer for the port e fa forwarding entry matches the group address but the receiving port is not in the forwarding entry for the group the switch adds the port as a dynamic member port to the forwarding entry and
521. rrent user level to the management level Login 88 Configuring a loopback test You can check whether an Ethernet port operates correctly by performing Ethernet port loopback test During the test time the port cannot forward data packets correctly Ethernet port loopback test has the following types Internal loopback test Establishes self loop in the switching chip and checks whether there is a chip failure related to the functions of the port External loopback test Uses a loopback plug on the port Packets forwarded by the port will be received by itself through the loopback plug The external loopback test can be used to check whether there is a hardware failure on the port Contiguration guidelines When you contigure a loopback test follow these restrictions and guidelines When a port is physically down you cannot pertorm an external loopback test on the port After a port is shut down manually you can perform neither internal nor external test on the port When a port is under loopback test you cannot apply Rate Duplex Cable Type and Port Status contiguration to the port An Ethernet port operates in full duplex mode when a loopback test is performed It restores its original duplex mode after the loopback test is finished Contiguration procedure 1 2 3 From the navigation tree select Device gt Loopback Figure 75 Loopback test page Testing type External Internal 4 a4 gt
522. rs A port performs 802 1X authentication and implements port based access control In this mode a port can service multiple 802 1X users If one 802 1X user 802 1X Port Based passes authentication all the other 802 1X users of the port can access the network without authentication In this mode neither outbound restriction nor intrusion protection will be triggered A port performs 802 1X authentication and implements MAC based access control It services only one user passing 802 1X authentication 802 1X Single Host A port performs 802 1X authentication of users and implements MAC based access control The port in this mode supports multiple online 802 1X users 802 1X MAC Based Similar to the 802 1X Single Host mode a port in this mode performs 802 1X authentication of users and allows only one 802 1X user to access at a time 802 1X MAC Based Or OUI e The port also permits frames from a wired terminal whose MAC address contains a specific OUI e For frames from a wireless user the port performs OUI check at first If the OUI check fails the port performs 802 1X authentication This mode is the combination of the 802 1X Single Host and MAC Auth modes with 802 1X authentication having higher priority e For wired users the port performs MAC authentication upon receiving non 802 1X frames and performs 802 1X authentication upon receiving 802 1X frames e For wireless users 802 1X authentication is performed
523. rt rate of an aggregate interface equals the total rate of its member ports in Selected state and its duplex mode is the same as that of the selected member ports For more information about the states of member ports in an aggregation group see Static aggregation mode and Dynamic aggregation mode LACP The Link Aggregation Control Protocol LACP is defined in IEEE 802 3ad It uses LACPDUs to exchange aggregation information between LACP enabled devices LACP is automatically enabled on member ports in a dynamic aggregation group An LACP enabled port sends LACPDUs to notify the remote system the partner of its system LACP priority system MAC address LACP port priority port number and operational key Upon receiving an LACPDU the peer port compares the received information with the information received on other member ports In this way the two systems reach an agreement on which ports are placed in Selected state Operational key When aggregating ports link aggregation control automatically assigns each port an operational key based on port attributes including the port rate duplex mode and link state configuration In an aggregation group all Selected ports are assigned the same operational key 205 Configuration classes Port configurations include the following classes e Class two configurations A member port can be placed in the Selected state only if it has the same class two configurations as the aggregat
524. rver at 10 1 1 1 as the authentication and authorization server and the RADIUS server at 10 1 1 2 as the accounting server Assign an ACL to GigabitEthernet 1 0 1 to deny the access of 802 1X users to the FTP server at 10 0 0 1 24 Figure 320 Network diagram Authentication servers RADIUS server cluster 10 1 1 1 10 1 1 2 l A gv Vlan int2 n Internet GE1 0 1 N Host Switch FTP server 192 168 1 10 10 0 0 1 Configuring IP addresses Assign an IP address to each interface as shown in Figure 320 Details not shown Configuring a RADIUS scheme 1 Create a RADIUS scheme a From the navigation tree select Authentication gt RADIUS and then click Add b Enter the scheme name system c Select the server type Extended 343 d Select Without domain name from the Username Format list e Click Apply Configure the primary authentication server in the RADIUS scheme a In the RADIUS Server Configuration area click Add b Select the server type Primary Authentication c Enter the IP address 10 1 1 1 and enter the port number 1812 d Enter expert in the Key and Confirm Key fields e Click Apply Figure 321 Configuring the RADIUS authentication server Add RADIUS Server IP Address IPv4 IPvG Part 181200 Default 1512 Key eeeeee 64 Chars Confirm Key eeeeese MA Chars Apply Cancel Configure the primary accounting server in the RADIUS scheme a In the RADIUS Server Con
525. rvice IPv4 Ping IPv Ping Pv4 Traceroute IPv6 Traceroute MAC Authentication 802 1X Port Security Domain Setup Authentication Authorization Display the IPv active route table Create an Pv6 static route Delete the selected IPv static routes Display information about the DHCP status advanced configuration information about the DHCP relay agent DHCP server group contiguration DHCP relay agent interface configuration and the DHCP client information Enable disable DHCP configure advanced DHCP relay agent settings contigure a DHCP server group and enable disable the DHCP relay agent on an interface Display the status trusted and untrusted ports and DHCP client information about DHCP snooping Enable disable DHCP snooping and configure DHCP snooping trusted and untrusted ports Display the states of services enabled or disabled Enable disable services and set related parameters Ping an IPv4 address Ping an IPv6 address Perform IPv4 trace route operations Perform Pv6 trace route operations Display MAC authentication configuration information Configure MAC authentication Display 802 1X configuration information globally or on a port Configure 802 1X globally or on a port Display port security configuration information Configure port security Display ISP domain configuration information Add and remove ISP domains Display the authentication configuratio
526. s Ping IP address 1 1 2 2 lt Sysname gt ping 1 1 2 2 PING 1 1 2 2 56 data bytes press CTRL_C to break Reply from 1 1 2 2 bytes 56 Sequence 1 ttl 254 time 205 ms Reply from 1 1 2 2 bytes 56 Sequence 2 ttl 254 time 1 ms Reply from 1 1 2 2 bytes 56 Sequence 3 ttl 254 time 1 ms Reply from 1 1 2 2 bytes 56 Sequence 4 ttl 254 time 1 ms Reply from 1 1 2 2 bytes 56 Sequence 5 ttl 254 time 1 ms 1 1 2 2 ping statistics 5 packet s transmitted 5 packet s received 0 00 packet loss round trip min avg max 1 41 205 ms The output shows that IP address 1 1 2 2 is reachable and the echo replies are all returned from the destination The minimum average and maximum roundtrip intervals are 1 millisecond 41 milliseconds and 205 milliseconds respectively ping ipv6 Syntax ping ipv6 host Parameters host Destination IPv address or host name a string of 1 to 255 characters Description Use ping ipv6 to ping a specified destination To terminate a ping operation press Ctrl C 27 Examples Ping IPv address 2001 4 lt Sysname gt ping ipv6 2001 4 PING 2001 4 56 data bytes press CTRL_C to break Reply from 2001 4 bytes 56 Sequence 1 hop limit 64 time 15 ms Reply from 2001 4 bytes 56 Sequence 2 hop limit 64 time 2 ms Reply from 2001 4 11 ms bytes 56 Sequence 3 hop limit 64 time Reply from 2001 4 bytes 56 Sequence 4 hop limit 64 time 2 ms Reply from 2001 4 12 ms bytes 56 Sequence 5 hop
527. s Configure the PVID of the 3 Setting the PVID for a port access port 4 Configuring the access ports as untagged members of a VLAN a Selecting VLANs Specify the range of VLANs available for selection during related operations Configure a subset of all existing VLANs This step is required before you perform operations on the Detail Modify VLAN and Modify Port tabs b Modifying a VLAN By default an access port Contigure the access ports as untagged is an untagged member of members of the specified VLAN VLAN 1 Required An access port has only one untagged VLAN and the untagged VLAN is its PVID The three operations N A produce the same result and the latest operation takes effect Configure the untagged 5 Modifyi ts ee oe VLAN of the port Recommended configuration procedure tor assigning a trunk port to a VLAN Step Remarks Required 1 Creating VLANs Create one or multiple VLANs Optional Configure the link type of the port as trunk 2 Configuring the link type of a port To configure a hybrid port as a trunk port first configure it as an access port By default the link type of a port is access 137 Step Remarks Configure the PVID of the 3 Setting the PVID for a port trunk port Required 4 Configure the trunk port as an untagged A trunk port has only one member of the specified VLANs pce ae ano ve untagge is its a lesing TRS The three operations p
528. s 01 80 C2 00 00 03 or the broadcast MAC address If any intermediate device between the client and the authentication server does not support the multicast address you must use an 802 1X client for example the HP iNode 802 1X client that can send broadcast EAPOLStart packets Access device as the initiator The access device initiates authentication if a client cannot send EAPOL Start packets One example is the 802 1X client available with Windows XP The access device supports the following modes e Multicast trigger mode The access device multicasts Identity EAP Request packets periodically every 30 seconds by default to initiate 802 1 X authentication e Unicast trigger mode Upon receiving a frame with the source MAC address not in the MAC address table the access device sends an Identity EAP Request packet out of the receiving port to the unknown MAC address It retransmits the packet if no response has been received within a certain time interval 324 802 1X authentication procedures 802 1X provides the following methods for authentication e EAP relay e EAP termination You choose either mode depending on the support of the RADIUS server for EAP packets and EAP authentication methods e EAP relay mode EAP relay is defined in IEEE 802 1X In this mode the network device uses EAPOR packets to send authentication information to the RADIUS server as shown in Figure 304 Figure 304 EAP relay Client Baie RAD
529. s 173 MAC addressing port security secure MAC address contiguration 427 MAC authentication ACL assignment 405 411 Auth Fail VLAN 405 configuration 404 406 408 configuration global 406 configuration portspecific 408 local authentication 404 408 port security advanced control configuration 428 port security advanced mode configuration 433 port security basic control configuration 425 port security basic mode configuration 430 port security configuration 421 423 430 port security configuration global 424 port security modes 421 port security permitted OUls configuration 429 RADIUS based 404 timers 405 user account policies 404 using with other features 405 VLAN assignment 405 Management Information Base Use MIB managing port 69 75 Web device contiguration 64 67 Web device file management 67 Web device user 86 Web devices 52 Web services 314 315 mapping MSTP VLAN to instance mapping table 187 master port MST 187 match order ACL auto 450 ACL contig 450 max age timer STP 184 mechanism rate limit 474 member IGMP snooping member port 252 MLD snooping member port 266 member device logging from the master 42 518 membership report IGMP snooping 254 MLD snooping 268 message ARP configuration 242 ARP message format 242 ARP static contiguration 246 DHCP format 294 gratuitous ARP contiguration 246 gratuitous ARP packet learning 244 IP multicast IGMP snoopi
530. s The switch removes the port from the forwarding entry for the multicast group when the aging timer expires Protocols and standards RFC 4541 Considerations for Internet Group Management Protocol IGMP and Multicast Listener Discovery MLD Snooping Switches Recommended configuration procedure Step Remarks 1 Enabling IGMP Required snooping globally Disabled by default 255 Step Remarks Required Enable IGMP snooping in the VLAN and configure the IGMP snooping version and querier feature 2 Configuring IGMP By default IGMP snooping is disabled in a VLAN snooping ina VLAN When you enable IGMP snooping follow these guidelines e Enable IGMP snooping globally before you enable it for a VLAN e IGMP snooping for a VLAN takes effect only on the member ports in that VLAN Optional Configure the maximum number of multicast groups and fast leave processing on ad a port of the specified VLAN 3 Configuring IGMP snooping port functions e Before you enable IGMP snooping on a port enable multicast routing or IGMP snooping globally When you configure IGMP snooping port functions follow these guidelines e IGMP snooping enabled on a port takes effect only after IGMP snooping is enabled in the VLAN or IGMP is enabled on the VLAN interface 4 Displaying IGMP snooping multicast Optional forwarding entries Enabling IGMP snooping globally 1 From the navigation tree select Network gt IGMP
531. s mm 100M 10M 10M 100M gt EI gt gt 100M gt 10M f 50M 100M 10M 50M gt 100M 1 2 e The traffic enters a device from a high speed link and is forwarded over a low speed link e The packet flows enter a device from several incoming interfaces and are forwarded out of an outgoing interface whose rate is smaller than the total rate of these incoming interfaces When traffic arrives at the line speed a bottleneck is created at the outgoing interface causing congestion Besides bandwidth bottlenecks congestion can be caused by resource shortage in various forms such as insufficient processor time buffer and memory and by network resource exhaustion resulting from excessive arriving traffic in certain periods Impacts Congestion might bring these negative results e Increased delay and jitter during packet transmission e Decreased network throughput and resource use efficiency e Network resource memory in particular exhaustion and even system breakdown It is obvious that congestion hinders resource assignment for traffic and degrades service performance Congestion is unavoidable in switched networks and multi user application environments To improve the service performance of your network you must address the congestion issues Countermeasures A simple solution for congestion is to increase network bandwidth however it cannot solve all the problems that cause congestion because you cannot increase network bandwidth i
532. s entries 1 Select Network gt MAC from the navigation tree 2 Click the Setup tab to enter the page for setting the MAC address entry aging time Figure 171 Setting the aging time for MAC address entries MAC set mac address aging time No aging Aging Time 300 seconds 10 1000000 Default 300 Apply 3 Configure the aging time for MAC address entries as described in Table 53 4 Click Apply Table 53 Configuration items liem Description No aging Specity that the MAC address entry never ages out Aging time Set the aging time for the MAC address entry MAC address table contiguration example Network requirements Use the Web based NMS to configure the MAC address table of the device Add a static MAC address O00e0 fc35 de71 under GigabitEthernet 1 0 1 in VLAN 1 175 Creating a static MAC address entry 1 Select Network gt MAC from the navigation tree By default the MAC tab is displayed Click Add Configure a MAC address entry a Type MAC address 00e0 fc35 dce71 b Select static from the Type list c Select 1 from the VLAN list d Select GigabitEthernet1 0 1 from the Port list Click Apply Figure 172 Creating a static MAC address entry Setup Add MAC MAC 00e0 fc35 dc71 Example 0010 dc28 a4e9 Type static v VLAN 1 X Port GigabitEthernet1 0 1 v Items marked with an asterisk are required Apply Cancel 176 Configuring MSTP Overview Spanning tree protocols elim
533. s of different VLANs to communicate you must use a router or Layer 3 switch to perform layer 3 forwarding To achieve this you can use VLAN interfaces VLAN interfaces are virtual interfaces used for Layer 3 communication between different VLANs They do not exist as physical entities on devices For each VLAN you can create one VLAN interface You can assign the VLAN interface an IP address and specify it as the gateway of the VLAN to forward the traffic destined for an IP network segment different from that of the VLAN Creating a VLAN interface When you create a VLAN interface you can select to assign an IPv4 address and an IPv link local address to the VLAN interface in this step or in a separate step If you do not select to contigure an IP address you can create the VLAN interface and configure an IP address for the VLAN interface by modifying it To create a VLAN interface 1 From the navigation tree select Network gt VLAN Interface 2 Click Create to enter the page for creating a VLAN interface 150 di 4 Figure 146 Creating a VLAN interface SUMIM Ary Wo gity Remove input a WYLAN ID 4094 Configure Primary IPyd Address DHCP BOOTP Manual Pvt address Mask Length Configure IFP 6 Link Local Address Auto Manual P address s O Apply Cancel Configure the VLAN interface as described in Table 43 Click Apply Table 43 Configuration items ltem Description Inout a VLAN ID Enter th
534. s service such as 802 1X and SSH Servicetype If you do not specify any service type for a local user who uses local authentication the user cannot pass authentication and therefore cannot log in The service type of the guest administrator and security log administrator is Web 381 ltem Description Specify an expiration time for the local user in the HH MM SS YYYY MM DD format Expire time To authenticate a local user with the expiration time configured the access device checks whether the expiration time has passed If it has not passed the device permits the user to log in Specify the VLAN to be authorized to the local user after the user passes VLAN authentication This option takes effect on only LAN users Specify the ACL to be used by the access device to restrict the access of the local user ACL after the user passes authentication This option takes effect on only LAN users Specify the user profile for the local user User protile This option takes effect on only LAN users but it does not take effect on this software version Contiguring a user group 1 Select Authentication gt Users from the navigation tree 2 Click the User Group tab to display the existing user groups Figure 365 User group list Local User Group Mame Level VLAN AGL ser Profile IGRI OE Operation Accounts system Visitor YES EI i Add 3 Click Add The page for configuring a user group appears 382 4 5 Figu
535. s that are collected and monitored For Static It i i atic Item more information see Table 28 Set the name of the interface whose traffic statistics are Interface Name collected and monitored Sample Item 100 ltem Description Interval Set the sampling interval Set the sampling type e Absolute Absolute sampling to obtain the value of the variable when the sampling time is reached Sample Type e Delta Delta sampling to obtain the variation value of the variable during the sampling interval when the sampling time is reached Owner Set the owner of the alarm entry Alarm Select whether to create a default event The description of the default event is default event the action is log and trap and the owner is default owner Create Default Event If there is no event you can create the default event And when the value of the alarm variable is higher than the alarm rising threshold or lower than the alarm falling threshold the system adopts the default action log and trap Rising Threshold Set the alarm rising threshold Set the action that the system takes when the value of the alarm variable is higher than the alarm rising threshold Rising Event If you select the Create Default Event box this option is not configurable Falling Threshold Set the alarm falling threshold Set the action that the system takes when the value of the alarm variable is lower than the alarm falling threshold Fal
536. s the alarm variables that can be configured through the Web interface are MIB variables that defined in the history group or the statistics group configure the RMON Ethernet statistics function or the RMON history statistics function on the monitored Ethernet interface After you create a statistics entry on an interface the system collects various traffic statistics on the interface including network collisions CRC alignment errors undersize oversize packets broadcasts multicasts bytes received and packets received The statistics are cleared at a reboot IMPORTANT You can create only one statistics entry for one interface Required You can create up to 60 event entries for an event table An event entry defines event indexes and the actions the system takes including log the event send a trap to the NMS take no action and log the event and send a trap to the NMS IMPORTANT You cannot create an entry if the values of the specified alarm variable sampling interval sampling type rising threshold and falling threshold are identical to those of an existing entry in the system Required You can create up to 60 alarm entries for an alarm table With an alarm entry created the specified alarm event is triggered when an abnormity occurs The alarm event defines how to deal with the abnormity IMPORTANT You cannot create an entry if the values of the specified event description owners and actions are identi
537. select 1 from the Rising Event list enter 100 in the Falling Threshold field select 1 from the Falling Event list and click Apply 107 Figure 96 Configuring an alarm group Statistics History Event Log Add an Alarm Group Alarm Variable Static Item Number of Packet Discarding Events id Interface Name GigabitEthernet1 0 1 v Sample Item Interval 10 Seconds 5 65535 Sample Type Delta v Owner user Chars 1 127 Alarm E Create Default Event Rising Threshold 1000 0 2147483647 Rising Event 1 v Falling Threshold 100 0 2147483647 Falling Event 1 v e Before creating Alarm please create Statistic and Event at fisrt Items marked with an asterisk are required Apply Cancel Verifying the configuration Atter the above configuration when the alarm event is triggered you can display log information for event 1 on the Web interface 1 2 Select Device gt RMON from the navigation tree Click the Log tab The log page appears The log in this example indicates that event 1 generated one log which was triggered because the alarm value 22050 exceeded the rising threshold 1000 The sampling type is absolute Figure 97 Log information for event 1 Statistics History Alarm Event R Event Index Search Advanced Search Event Log faites lees nel las Description 2011 5 16 The 1 3 6 1 2 1 16 1 1 1 4 1 defined in alarmEntry 1 uprise 1000 16 3253 with alarm value 22050 Alarm sample ty
538. select a policy policy1 Direction Inbound v Please select port s Laz sof 2 23 Popp HHHH Select AIl Select None 496 Configuring PoE Only a device with a mark of PoE supports the PoE feature Overview IEEE 802 3af compliant power over Ethernet PoE enables a power sourcing equipment PSE to supply power to powered devices PDs through Ethernet intertaces over straight through twisted pair cables Examples of PDs include IP telephones wireless APs portable chargers card readers Web cameras and data collectors A PD can also use a different power source from the PSE at the same time for power redundancy As shown in Figure 488 a PoE system comprises the following elements e PoE power The entire PoE system is powered by the PoE power e PSE The PSE supplies power for PDs A PSE can examine the Ethernet cables connected to PoE interfaces search for PDs classify them and supply power to them When detecting that a PD is removed the PSE stops supplying power to the PD A PSE can be built in Endpoint or external Midspan A built in PSE is integrated into a switch or router and an external PSE is independent of a switch or router The HP PSEs are built in Only one PSE is available on the device so the entire device is considered as a PSE e PI An Ethernet interface with the PoE capability is called PoE interface A PoE interface can be an FE or GE interface e PD A PD receives power from the
539. server Figure 298 802 1X architecture Device Authentication server Client e Client A user terminal seeking access to the LAN It must have 802 1X software to authenticate to the network access device e Network access device Authenticates the client to control access to the LAN In a typical 802 1X environment the network access device uses an authentication server to perform authentication e Authentication server Provides authentication services for the network access device The authentication server authenticates 802 1X clients by using the data sent from the network access device and returns the authentication results to the network access device to make access decisions The authentication server is typically a RADIUS server In a small LAN you can also use the network access device as the authentication server Access control methods HP implements port based access control as defined in the 802 1 X protocol and extends the protocol to support MAC based access control e Port based access control Once an 802 1 X user passes authentication on a port any subsequent user can access the network through the port without authentication When the authenticated user logs off all other users are logged off 32 e MAC based access control Each user is separately authenticated on a port When a user logs off no other online users are affected Controlled uncontrolled port and port authorization status 802 1X
540. specified VLAN Contiguring MLD snooping When you configure MLD snooping port functions follow these port functions guidelines e Enable MLD snooping globally before you enable it on a port e MLD snooping enabled on a port takes effect only after MLD snooping is enabled for the VLAN Displaying MLD snooping multicast forwarding entries Optional Enabling MLD snooping globally 1 Select Network gt MLD snooping from the navigation tree 2 Click Enable for MLD snooping 3 Click Apply Figure 243 Enabling MLD snooping globally Advanced MLD Snooping Enable Disable Apply VLAN Configuration at VLAN ID Search Advanced Search VLAN ID es Version Querier In De e General Query Source Address Special Query Source Address Operation 1 Disabled 1 Disabled 125 FE80 2FF FFFF FEOO 1 FE80 2FF FFFF FEOO 1 100 Disabled 1 Disabled 125 FESO 2FF FFFF FEOO 1 FESOC2FFFFEFFEOO 1 200 Disabled 1 Disabled 125 FE80 2FF FFFF FEO0 1 FESO 2FF FFFF FEOU1 Es 300 Disabled 1 Disabled 125 FESO 2FF FFFF FEOO 1 FE amp O 2FF FFFF FEOD 1 is Show Entries Refresh Contiguring MLD snooping in a VLAN l Select Network gt MLD snooping from the navigation tree 270 2 Click the EF icon for the VLAN Figure 244 Configuring MLD snooping in a VLAN Advanced VLAN Configuration VLAN ID 1 MLD Snooping Enable Disable Version 2 1 2 Querier Enable Disable Query Interval Seconds 2 300 Default 125 Genera
541. spend the sending of packets The egress port is expected to stop sending any new packet when it receives the Pause frame In this way flow control helps to avoid dropping of packets Flow Control Flow control works only after it is enabled on both the ingress and egress ports Enable or disable auto power down on a port that is down By default auto power down is disabled on an Ethernet port that is down With auto power down enabled on an Ethernet port that stays in the down state for a certain period the following events occur Power Save e The device automatically stops supplying power to the port e The port enters the power save mode When the Ethernet port comes up the following events occur e The device automatically restores power supply to the port e The port resumes its normal state Set the MAC learning limit on the port Max MAC Count e User Defined Select this option to set the limit manually e No Limited Select this option to set no limit Enable or disable Energy Efficient Ethernet EEE on a link up port EEE With EEE enabled when a link up Ethernet port does not receive any packet for a certain period it automatically enters low power mode When a packet arrives later the device restores power supply to the port and the port resumes its normal state Set broadcast suppression on the port e ratio Sets the maximum percentage of broadcast traffic to the total bandwidth of an Ethernet port When you s
542. splayed as active routes on the pages 2 Ping Host C from Host A assuming both hosts run Windows XP C Documents and Settings Administrator gt ping 1 1 3 2 Pinging 1 1 3 2 wath 32 bytes of data Reply from 1 1 bytes 32 time lms TTL 128 Reply from 1 1 bytes 32 time lms TTL 128 Reply from 1 1 bytes 32 time lms TTL 128 Reply from 1 1 bytes 32 time lms TTL 128 Ping statistics for 1 1 3 2 Packets Sent 4 Received 4 Lost 0 0 loss Approximate round trip times in milli seconds Minimum Maximum lms 286 Average lms IPv6 static route configuration example Network requirements As shown in Figure 262 configure IPv6 static routes on Switch A Switch B and Switch C for any two hosts to communicate with each other Figure 262 Network diagram Host B 2 2 64 Vlan int400 Vlan int200 4 2 64 Vlan inta00 Vlan int200 Vlan int300 4 1 64 a Vlan int100 1 1 64 3 1 64 Host A 1 2 64 Switch A Switch C Host C 3 2 64 Configuration considerations On Switch A configure a default route with Switch B as the next hop On Switch B configure one static route with Switch A as the next hop and the other with Switch C as the next hop On Switch C configure a default route with Switch B as the next hop Configuration procedure 1 Configure a default route to Switch B on Switch A a Select Network gt IPv Routing from the navigation tree of Switch A b Click the
543. ss field Enter 00e0 fc01 0000 in the MAC Address field Select Advanced Options Enter 100 in the VLAN ID field Select GigabitEthernet1 0 1 from the Port list Click Apply a gt a mp ao Figure 225 Creating a static ARP entry Gratuitous ARP New Static ARP Entry IP Address 192 168 1 1 MAC Address 00e0 fc01 0000 Example 0010 dc28 a4e9 Z Advanced Options VLAN ID 100 1 4094 Port GigabitEthernet1 0 1 Items marked with an asterisk are required Apply Back 249 Configuring ARP attack protection Overview Although ARP is easy to implement it provides no security mechanism and is vulnerable to network attacks The ARP detection feature enables access devices to block ARP packets from unauthorized clients to prevent user spoofing and gateway spoofing attacks ARP detection provides user validity check and ARP packet validity check User validity check This feature does not check ARP packets received from ARP trusted ports but it checks ARP packets from ARP untrusted ports Upon receiving an ARP packet from an ARP untrusted interface this feature compares the sender IP and MAC addresses against the DHCP snooping entries and 802 1 X security entries If a match is found from those entries the ARP packet is considered valid and is forwarded If no match is found the ARP packet is considered invalid and is discarded ARP packet validity check This feature does not check ARP packets received
544. st group the host sends an MLD done message to the multicast router When the switch receives an MLD done message on a member port the switch first examines whether a forwarding entry matches the IPv group address in the message and if a match is found determines whether the forwarding entry contains the dynamic member port If no forwarding entry matches the IPv multicast group address or if the forwarding entry does not contain the port the switch directly discards the MLD done message If a forwarding entry matches the IPv6 multicast group address and contains the port the switch forwards the MLD done message to all router ports in the VLAN Because the switch does not know whether any other hosts attached to the port are still listening to that IPv6 multicast group address the switch does not immediately remove the port from the forwarding entry for that group Instead the switch resets the aging timer for that port After receiving the MLD done message the MLD querier resolves the IPv6 multicast group address in the message and sends an MLD multicast address specitic query to that IPv multicast group through the port that received the MLD done message After receiving the MLD multicast address specific query the switch forwards it through all its router ports in the VLAN and all member ports for that IPv6 multicast group The switch also performs one of the following actions for the port that received the MLD done message If the
545. static ports NOTE When IGMP snooping is enabled all ports that receive PIM hello messages or IGMP general queries with the source addresses other than 0 0 0 0 are considered dynamic router ports Aging timers for dynamic ports in IGMP snooping _ Message received before Action after the timer Timer Description the timer expires expires When a port receives an IGMP general query with the source address other than Dynamic ee ee IGMP general query with the The switch removes this router port AGE GE source address other than port from its router port aging timer 0 0 0 0 or PIM hello message list aging timer for the port When the timer expires the dynamic router port ages out 253 ie Message received before Action after the timer Timer Description the timer expires expires When a port dynamically Danie joins a multicast group the The switch removes this switch starts or resets an aging port from the IGMP se port timer for the port When the Penis piep snooping forwarding aging timer timer expires the dynamic table member port ages out NOTE In IGMP snooping only dynamic ports age out How IGMP snooping works The ports in this section are dynamic ports IGMP messages include general query IGMP report and leave message An IGMP snooping enabled switch performs differently depending on the message General query The IGMP querier periodically sends IGMP general queries to all hosts and
546. stsize The capacity of the token bucket or the maximum traffic size permitted in each burst It is usually set to the committed burst size CBS The set burst size must be greater than the maximum packet size One evaluation is performed on each arriving packet In each evaluation if the number of tokens in the bucket is enough the traffic conforms to the specification and the tokens for forwarding the packet are taken away If the number of tokens in the bucket is not enough it means that too many tokens have been used and the traffic is excessive Working mechanism of rate limit With rate limit configured on an interface all packets to be sent through the interface are firstly handled by the token bucket of rate limit If the token bucket has enough tokens packets can be forwarded Otherwise packets are put into QoS queues for congestion management In this way the traffic passing the physical interface is controlled Figure 461 Rate limit implementation Put tokens into the token Packets to be sent via bucket at the set rate this interface Packets sent gt Buffer queue With a token bucket used for traffic control when the token bucket has tokens the bursty packets can be transmitted When no tokens are available packets cannot be transmitted until new tokens are generated in the token bucket In this way the traffic rate is restricted to the rate for generating tokens the traffic rate is limited and
547. succession the RMON agent generates an alarm event only for the first crossing For example if the value of a sampled alarm variable crosses the rising threshold multiple times before it crosses the falling threshold only the first crossing triggers a rising alarm event as shown in Figure 79 Figure 79 Rising and falling alarm events Alarm variable value Rising threshold Falling threshold Time 94 RMON configuration task list Configuring the RMON statistics function The RMON statistics function can be implemented by either the Ethernet statistics group or the history group but the objects of the statistics are different as follows e Asstatistics object of the Ethernet statistics group is a variable defined in the Ethernet statistics table and the recorded content is a cumulative sum of the variable from the time the statistics entry is created to the current time Perform the tasks in Table 20 to configure RMON Ethernet statistics function A statistics object of the history group is the variable defined in the history record table and the recorded content is a cumulative sum of the variable in each period Perform the tasks in Table 21 to configure RMON history statistics function Table 20 RMON statistics group configuration task list Task Remarks Required You can create up to 100 statistics entries in a statistics table After you create a statistics entry on an interface the system collects various traf
548. t 5 V Enable Intrusion Protection Disable Port Temporarily E Enable Outbound Restriction Only MAC Known Unicasts Items marked with an asterisk are required Apply Cancel Verifying the configuration 1 Display the secure MAC address entries learned and manually configured on port GigabitEthernet 1 0 3 The maximum number of secure MAC is configured as 3 so up to 3 MAC addresses can be learned and added as secure MAC addresses as shown in Figure 421 431 Figure 421 Secure MAC address list Security Ports And Secure MAC Address List F Port Max tse of intrusion Protection Outbound Restriction Operation F GigabitEthernet1 0 3 3 Disable Port Temporarily A i Add Del Selected Secure MAC Address List k Port v Search Advanced Search a Port MAC VLAN ID Operation GigabitEthernet1 0 3 0000 0000 0001 100 i GigabitEthernet1 0 3 0000 0000 0002 100 i F GigabitEthernet1 0 3 001b 2188 86ff 100 i Add Del Selected 2 When the maximum number of MAC addresses is reached intrusion protection is triggered Select Device gt Port Management from the navigation tree and then select the Detail tab On the page click the target port GigabitEthernet 1 0 3 in this example to view details Figure 422 shows that the port state is inactive Figure 422 Displaying port state Summary letai Setup Select a Port Port State PVID 100 Flow Control Disabled E Link Type
549. t d Set the voice VLAN aging timer to 30 minutes e Click Apply Figure 156 Configuring the voice VLAN function globally Summar Fort Setup Ol Summary OW Add Ol Remove Dice vLAMN security sice YLail een Ure minutes 5 43200 Default 1440 tems marked with an asteriski are required Apply Cancel 4 Configure voice VLAN on GigabitEthernet 1 0 1 165 a Click the Port Setup tab b Select Auto in the Voice VLAN port mode list c Select Enable in the Voice VLAN port state list d Enter voice VLAN ID 2 e Select GigabitEthernet 1 0 1 on the chassis front panel f Click Apply Figure 157 Configuring voice VLAN on GigabitEthernet 1 0 1 summary setup OUI Summary DUI Add OUl Remove Voice VLAN port mode Voice VLAN port state Voice VLAN ID Items marked with an asterisk are required Sel ect ports Select All Select None Ports selected for voice VLAN Apply Cancel Add OUI addresses to the OUI list a Click the OUI Add tab b Enter OUI address 0011 2200 0000 c Select FFFF FFOO 0000 in the Mask list d Enter description string test e Click Apply Figure 158 Adding OUI addresses to the OUI list summary Setup Port Setup OUI Summary OUI Remove specify an OUI and click Apply to add it to the list There can be 6 entries at most OUI Address 0011 2200 0000 Example 0010 dc28 a4e9 Mask FFFF FF00 0000 Description test Chars 1 30 Apply Cancel tems marked
550. t 294 Option 295 See also Option Option 121 295 Option 150 295 Option 3 Option 003 295 Option 33 Option 033 295 Option 51 Option O51 295 Option 53 Option 053 295 Option 55 Option 055 295 Option 6 Option 006 295 Option 60 Option 060 295 Option 66 Option 066 295 Option 67 Option 067 295 Option 82 relay agent Option 082 relay agent 295 options 295 options common 295 overview 292 protocols and standards 296 relay agent configuration 297 298 303 snooping See DHCP snooping snooping configuration 306 308 311 snooping Option 82 support 308 snooping trusted port 306 306 snooping untrusted port 306 306 diagnostic tools 317 direction NMM port mirroring bidirectional 79 NMM port mirroring inbound 79 NMM port mirroring outbound 79 discarding MST discarding port state 188 displaying active route table IPv4 279 active route table IPv6 281 all operation parameters for a port 74 client s IP to MAC bindings 302 310 current system time 56 Ethernet link aggregation aggregate interface 209 Ethernet link aggregation LACP enabled port 211 global LLDP 234 IGMP snooping multicast forwarding entries 259 interface statistics 132 IP services ARP entry 244 LLDP for a port 229 LLDP information 236 MAC address table 174 MLD snooping multicast forwarding entries 273 MSTP information on port 197 NMM RMON running status 96 PoE 500 port operation parameters 3 RMON
551. t 1 0 1 GigabitEthernet 1 0 2 and GigabitEthernet 1 0 32 in the Select Ports area c Select Untagged for Select membership type d Enter 100 as the VLAN ID e Click Apply 262 3 Figure 236 Assigning ports to the VLAN Select VLAN Create Port Detail Detail Modify VLAN Sel ect Ports H ant Select All Select None E Not avaliable for selection Select membership type 5 Not A Member Tagged Link Type Enter VLAN IDs to which the portis to be assigned VLAN IDs 100 Example 1 3 5 10 Selected ports Enable IGMP snooping globally a From the navigation tree select Network gt IGMP snooping b Select Enable c Click Apply Figure 237 Enabling IGMP snooping globally Advanced IGMP Snooping Enable Disable Apply VLAN Configuration AR LAN ID search Advanced Search IGMP f Drop Livery meee Snooping eta Unknown EEN Interval Sec 1 Disabled 2 Disabled Disabled 60 0 0 0 0 100 Disabled 2 Disabled Disabled GO 0 0 0 0 Show Entries Enable IGMP snooping for VLAN 100 a Click the icon for VLAN 100 b Select Enable for IGMP snooping c Select 2 for Version d Click Apply 263 PID Apply Cancel General Query Source IF Special Query Source IF Operation Figure 238 Configuring IGMP snooping in VLAN 100 Advanced VLAN Configuration VLAN ID 100 IGMP Snooping Enable Disable Version 2 ma Querier Enable D
552. t DAWGoSE Lexx SO ISBibh1 pJ1YhT turn Tf2deNHITiBdcUOAeNIZRGEFER LOJeyyillqqhRrtzedHwh 9ihk yM9doxtwi Yl yF27 cTocdR x0dtst ECCOCeEO Wd AdgEwIDADABOAARDOTIEOEIKZCNAODEEBOADYTEAFIAETYGhtaHA gGEv1BELISE TaasO6sIkatsip3GE1ll3dex0s37 snel 1GUEPBYE fileOB7EGaGTT7UuTEODVLH EYY2wcTEVAThOlaeYOAMUsEn T0 L danW1DbtieGl46EGASINGERAFSSTANE BET WplcaFlueslz OzelyBs Hack 397 Retrieving and displaying a CRL 1 From the navigation tree select Authentication gt Certificate Management 2 Click the CRL tab Figure 379 CRL page Entity Domain Certificate Domain Mame Operation abcd Retrieve CRL View CEL 3 Click Retrieve CRL to retrieve the CRL of a domain 4 Click View CRL for the domain to display the contents of the CRL Figure 380 CRL information Entity Domain Certificate View CRL Details Certificate Revocation List Version 2 0x1 Signature Algorithm Issuer C cn D cl oU cl CN cl Last Update Oct 5 O7 34 16 Next Update NONE CRL extensions KSO0 v3 CEL Number CRL shealWithRssEncryption mr rm ZULU GMT X50373 Authority Key Identifier keyid BD5SD0565 E744AA13 EA4142E8 AABESAAS F 2zE6C1o No Revoked Certificates Signature Algorithm shalWithRSAEncryption CTEGF3E1 444190F4 O27 F9CFF CO4E235B 10028062 CSEBEA4D G356BR7D D2177A43 354781828E 29665C1D 315DB401 S3B9CBAG EBZAEDAA TADBFOF1 ZEFS41F3 ADGSCZED 24025849 EZ4E1AAC 14F09629 BF250C94 BACAEDIF TBRFSD609 o245569F
553. t Mo Change Multicast Na Change Unicast Suppression Suppression Suppression pps range 1 148810 for a 100 Mbps port 1 260000 for a GE port and 1 260000 for a 10GE port Kbps range 1 100000 for a 100 Mbps port 1 180000 for a GE port and 1 180000 for a 10GE port oodeooacgecad BUDD ODDO DEE HEHE H No Change 0 8192 No Change Select All Select None Unit Selected Ports 1 it may take some time if you apply the above settings to multiple ports Apply Cancel Assign GigabitEthernet 1 0 1 to VLAN 2 as an untagged member b Select Network gt VLAN from the navigation tree Click the Modify Port tab Select GigabitEthernet 1 0 1 from the chassis front panel Select the Untagged option Enter VLAN ID 2 Click Apply A configuration progress dialog box appears After the configuration process is complete click Close 169 Figure 164 Assigning GigabitEthernet 1 0 1 to VLAN 2 as an untagged member Select VLAN Create Port Detail Detail Modify VLAN Remove Select Ports z4 e 4 a4 Select All Select None C Not avaliable for selection Select membership type 8 Untagged Tagged NotAMember Link Type PVID Enter VLAN IDs to which the portis to be assigned VLAN IDs 2 Example 1 3 5 10 Selected ports Untagged Membership GENO Apply Cancel Configure voice VLAN on GigabitEthernet 1 0 1 a Select Network gt Voice VLAN from the navigation tree Click
554. t Uplink port Apply e Click Apply A configuration progress dialog box appears f After the configuration process is complete click Close Viewing information about the isolation group Click Summary 2 Display port isolation group 1 which contains ports GigabitEthernet 1 0 2 GigabitEthernet 1 0 3 and GigabitEthernet 1 0 4 Figure 438 Viewing information about port isolation group 1 Port Setup Isolate group ID Uplink port Isolated port GE 1 0 2 GE VO Isolated vor ll Port type Uplink worl 442 Configuring authorized IP The authorized IP function associates the HTTP or Telnet service with an ACL to filter the requests of clients Only the clients that pass the ACL filtering can access the device Contiguration procedure 1 From the navigation tree select Security gt Authorized IP 2 Click Setup to enter the authorized IP configuration page Figure 439 Authorized IP configuration page Summary Telnet Pd ACL NoChange vi IPvB ACL Wieb HTTP IPy4 ACL NoChange Rule ID Operation Description Time Range 3 Configure authorized IP as described in Table 133 4 Click Apply Table 133 Configuration items ltem Description Associate the Telnet service with an IPv4 ACL IPv4 ACL a To configure the IPv4 ACL to be selected select QoS gt ACL IPv4 elnet Associate the Telnet service with an IPv6 ACL IPv ACL To configure the IPv ACL to be selected select QoS gt ACL IPv6
555. t is not true with master ports A master port on MSTIs is a root port on the CIST Port states In MSTP a port can be in one of the following states e Forwarding The port learns MAC addresses and forwards user traffic e Learning The port learns MAC addresses but does not forward user traffic e Discarding The port does not learn MAC addresses or forwards user traffic A port can have different port states in different MSTls A port state is not exclusively associated with a port role Table 57 lists the port states supported by each port role A check mark v indicates that the 188 port state is available for the corresponding port role and a dash indicates that the port state is not available for the corresponding port role Table 57 Ports states supported by different port roles Port role Port state Root port master Designated Boundary Alternate port Backup port ort ort ort Forwarding v v ul Learning v v Discarding vV v y d d How MSTP works MSTP divides an entire Layer 2 network into multiple MST regions which are connected by a calculated CST Inside an MST region multiple spanning trees called MSTIs are calculated Among these MSTIs MSTI O is the CIST Similar to RSTP MSTP uses configuration BPDUs to calculate spanning trees An important difference is that an MSTP BPDU carries the MSTP configuration of the bridge from which the BPDU is sent CIST calculation The calculation of
556. target host Display SNMP view information Create modify and delete an SNMP view Display and clear the statistics information about an interface Function menu Description User level Visitor Configure Configure Monitor Configure Configure Configure Configure Configure Configure Monitor Configure Monitor Configure Monitor Configure Monitor Configure Monitor Configure Monitor Configure Configure Function menu Description User level Select VLAN Select a VLAN range Monitor Create Create VLANs Configure Port Detail Display the VLAN related details of a port Monitor Display the member port information about a VLAN Detail VLAN Monitor Modify VLAN Modify the description and member ports of a ne VLAN Modify Port Change the VLAN to which a port belongs Configure Remove Remove VLANS Configure TN Display information about VLAN interfaces by rd address type Cea Create VLAN interfaces and configure IP addresses Conf VLAN eate here onfigure Interface i Modify Modi y the IP addresses and status of VLAN EA interfaces Remove Remove VLAN interfaces Configure Sunay Display voice VLAN information globally or on a ES port Setup Configure the global voice VLAN Configure Net Port Setup Configure a voice VLAN on a port Configure work Voice VLAN Display the addresses of the OUls that can be Sey identitied by voice VLAN pronto Add the address of an OUI that can be identified
557. tatic route to Switch A and Switch C on Switch B a Select Network gt IPv4 Routing from the navigation tree of Switch B b Click the Create tab The page for configuring a static route appears c Enter 1 1 2 0 for Destination IP Address 24 for Mask and 1 1 4 1 for Next Hop d Click Apply 284 Figure 260 Configuring a static route summary Destination IF Address Wask Mext Hop Remove tems marked with an asteriski are required Apply Configured Static Route Information Destination IP Address Wask Protocal Preference J irterface Preference t 285 Detaurt 60 Next Hap Interface e Enter 1 1 3 0 for Destination IP Address enter 24 for Mask and enter 1 1 5 6 for Next Hop f Click Apply Configure a default route to Switch B on Switch C a b C 285 Select Network gt IPv4 Routing from the navigation tree of Switch C Click the Create tab Enter 0 0 0 0 for Destination IP Address O for Mask and 1 1 5 5 for Next Hop Click Apply Figure 261 Configuring a default route Remove Summary Preference 285 Default B0 J interface tems marked with an asteriski are required Apply Configured Static Route Information Destination IP Address Mask Protocol Preference Mext Hop Interface Veritying the contiguration 1 Display the routing table Enter the IPv4 route page of Switch A Switch B and Switch C to verify that the newly configured static routes are di
558. ted Configure a target host SNMP traps a Click Add on the Trap tab page The page for adding a target host of SNMP traps appears 130 b Select the IPv4 Domain option and type 1 1 1 2 in the following field type user in the Security Name field select v3 from the Security Model list and select Auth Priv from the Security Level list c Click Apply Figure 128 Adding a trap target host Setup Community Group ser MR Add Trap Target Host Destination IF Address IPy4 Damain PG 1 1 1 2 1 255Chars 3 Security Name user U BaChars UDF Fort 162 0 65535 Default 162 Security Model v4 w Security Level AuthPri w tems marked with an asterisk are required Apply Cancel Configuring the NMS The configuration on NMS must be consistent with that on the agent Otherwise you cannot perform corresponding operations To contigure the NMS Specify the SNMP version for the NMS as v3 Create an SNMP user userl Enable both authentication and privacy functions Use MD5 for authentication and DES56 for encryption ie Ma Set the authentication key to authkey and the privacy key to prikey For information about configuring the NMS see the NMS manual Verifying the configuration Atter the above configuration the NMS can establish an SNMP connection with the agent and query and reconfigure values of objects in the agent MIB Disable or enable an idle interface on the agent and you can see the interface stat
559. ted Neighbor Information Statistic Information Status Information 223 Setting LLDP parameters on ports The Web interface allows you to set LLDP parameters for a single port or for multiple ports in batch Setting LLDP parameters for a single port 1 From the navigation tree select Network gt LLDP By detault the Port Setup tab is displayed 2 Click the icon for the port On the page as shown in Figure 199 the LLDP settings of the port are displayed Figure 199 Modifying LLDP settings on a port Global Setup Global Summary Neighbor Summary Interface Name GE1 0 1 LLDP State Enable Basic Settings LLDP Operating Mode TxRx v Encapsulation Format ETHII CDP Operating Mode Disable v LLDP Polling Interval seconds 1 30 LLDP Trapping Disable v Base TLV Settings V Port Description System Capabilities W System Description V System Name W Management Address Number v Addtional TLV Settings Apply Cancel 3 Configure the LLDP parameters for the port as described in Table 75 Click Apply A progress dialog box appears 5 Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds Table 75 Configuration items ltem Descri ption Interface Name Displays the name of the port or ports you are configuring Displays the LLDP enabling status on the port you are configuring DLDP State This field is not available when you batch configure ports Set the L
560. ted decimal notation Enter the mask of the destination IP address Mask You can enter a mask length or a mask in dotted decimal notation Set a preference value for the static route The smaller the number the higher the preference Preference For example specifying the same preference for multiple static routes to the same destination enables load sharing on the routes Specifying different preferences enables route backup Next Hop Enter the next hop IP address in dotted decimal notation 280 ltem Description Select the output interface Interface You can select any available Layer 3 interface for example a virtual interface of the device If you select NULL O the destination IP address is unreachable Displaying the IPv active route table Select Network gt IPv Routing from the navigation tree to enter the page Figure 256 IPv6 active route table Create Remove Active Route Table Pretix Destination IP Address Length Protocol Preference Next Hop Interface 1 128 Direct 0 1 INLOopBackO Table 92 Field description Field Description Destination IP Address Destination IP address and prefix length of the IPv route Prefix Length Protocol Protocol that discovered the IPv6 route Preference value for the IPv6 route Preference The smaller the number the higher the preference Next Hop Next hop IP address of the IPv6 route Output interface of the IPv route Packets destined for the specifi
561. tely so the old root ports and designated ports that have not detected the topology change continue forwarding data along the old path If the new root ports and designated ports begin to forward data as soon as they are elected a temporary loop might occur STP timers STP calculation involves the following timers e Forward delay The delay time for device state transition A path failure can cause spanning tree recalculation to adapt the spanning tree structure to the change However the resulting new contiguration BPDU cannot propagate throughout the network immediately If the newly elected root ports and designated ports start to forward data immediately a temporary loop is likely to occur For this reason as a mechanism for state transition in STP the newly elected root ports or designated ports require twice the forward delay time betore they transit to the forwarding state which makes sure the new configuration BPDU has propagated throughout the network e Hellotime The time interval at which a device sends hello packets to the neighboring devices to make sure the paths are fault free e Max age A parameter used to determine whether a configuration BPDU held by the device has expired The device discards the BPDU if the max age is exceeded Introduction to RSTP Developed based on the 802 1 w standard of IEEE RSTP is an optimized version of STP It achieves rapid network convergence by allowing a newly elected root port
562. ter the page as shown in Figure 287 Figure 287 DHCP snooping user information DHCP Relay IP Address v Search Advanced Search IP Address MAC Address Type Interface Name VLAN Remaining Lease Time Sec Operation 10 55 80 103 001b 2188 86ff Dynamic GigabitEthernet1 0 24 1 691152 i Return Refresh Reset Table 101 describes the fields of DHCP snooping entries Table 101 Field description ltem Description IP Address Displays the IP address assigned by the DHCP server to the client MAC Address Displays the MAC address of the client 310 ltem Description Displays the client type e Dynamic The IP to MAC binding is generated dynamically ype e Static The IP to MAC binding is configured manually Static bindings are not supported Interface Name Displays the device interface to which the client is connected VLAN Displays the VLAN to which the device belongs Remaining Lease Time Displays the remaining lease time of the IP address DHCP snooping configuration example Network requirements As shown in Figure 288 a DHCP snooping device Switch B is connected to a DHCP server through GigabitEthernet 1 0 1 and to DHCP clients through GigabitEthernet 1 0 2 and GigabitEthernet 17073 e Enable DHCP snooping on Switch B and configure DHCP snooping to support Option 82 Configure the handling strategy for DHCP requests containing Option 82 as replace e Enable GigabitEthernet 1 0 1 to forward DHCP server respons
563. terface does not support contiguration of the detault preference If you specity the next hop address first and then contigure it as the IP address of a local interface such as a VLAN interface the static route does not take effect When you specify the output interface note the following o If the output interface is NULL O or a loopback interface no next hop address is required o If the output interface is a broadcast interface such as a VLAN interface you must specify the output interface and the next hop at the same time You can delete only IPv4 IPv6 static routes on the Remove tab 291 DHCP overview The Dynamic Host Configuration Protocol DHCP provides a framework to assign configuration information to network devices DHCP uses the client server model Figure 266 shows a typical DHCP application A DHCP client can obtain an IP address and other configuration parameters from a DHCP server on another subnet through a DHCP relay agent For more information about the DHCP relay agent see Configuring DHCP relay agent You can enable the DHCP client on an interface For more information about the DHCP client configuration see Configuring VLAN interface Figure 266 A typical DHCP application DHCP client DHCP client DHCP server E 2E DHCP client DHCP client DHCP address allocation Allocation mechanisms DHCP supports the following mechanisms for IP address allocation e Staticallocation T
564. ters configuration 40 STP algorithm calculation 179 STP designated bridge 178 STP designated port 178 STP path cost 179 STP root bridge 178 STP root port 178 VLAN type 134 Web common page features 16 Web device contiguration backup 64 Web device contiguration reset 66 Web device contiguration restoration 64 Web device contiguration save 65 Web device file displaying 67 Web device file download 67 Web device file removing 68 Web device file upload 68 Web device local user adding 86 Web device main boot file specitying 68 Web device privilege level switching 88 Web device super password setting 87 Web interface 7 Web interface HTTP login 6 network management 802 1X ACL assignment configuration 343 AAA configuration 352 359 ACL contiguration 450 489 ACL time range configuration 453 ARP configuration 242 ARP static contiguration 246 basic device settings contiguration 50 configuration wizard 34 DHCP overview 292 DHCP relay agent configuration 297 298 303 DHCP snooping configuration 306 308 311 displaying active route table IPv4 279 displaying active route table IPv6 281 Ethernet link aggregation and LACP configuration 205 213 flow interval 92 gratuitous ARP contiguration 246 IP routing configuration IPv4 278 IP routing configuration IPv6 278 LLDP basic concepts 217 LLDP configuration 217 236 loopback detection 447 447 loopback test 89
565. th the TC BPDU guard function you can prevent frequent flushing of forwarding address entries HP recommends not disabling this function Sets the maximum number of immediate forwarding address entry flushes the tc protection threshold device can perform within a certain period of time after receiving the first TC BPDU Contiguring MSTP on a port 1 From the navigation tree select Network gt MSTP 2 Click the Port Setup tab Figure 181 MSTP configuration on a port Region Global Port Summary STP No Change v Protection No Change v Note The new protection will replace the old one instance Advanced EPE QEIRA le Select All Select None Cancel 3 Configure MSTP for ports as described in Table 60 and then click Apply Table 60 Configuration items ltem Description STP Selects whether to enable STP on the port Sets the type of protection to be enabled on the port Protection e Not Set No protection is enabled on the port e Edged Port Root Protection Loop Protection For more information see Table 61 195 liem Description Sets the priority and path cost of the port in the current MSTI e Priority The priority of a port is an important factor in determining whether the port can be elected as the root port of a device If all other conditions are the same the Instance port with the highest priority will be elected as the root port On an MSTP enabled Instance ID device a port can hav
566. the CLI 1 Press Enter The Username prompt displays Login authentication Username 2 Enter your username at the Username prompt Username admin 3 Press Enter The Password prompt appears Password The login information is verified and the tollowing CLI menu appears HOP 1920 Switch gt If the password is invalid the following message appears and process restarts O Login failed CLI commands This section contains the following commands Task Display a list of CLI commands on the device Reboot the device and run the default configuration Configure VLAN interface 1 to obtain an IPv4 address through DHCP or manual configuration Configure VLAN interface 1 to obtain an IPv address through the autoconfiguration function or manual configuration Modify the login password Log out of the system Download the Boot ROM image or system software image file from the TFTP server and specify it as the startup configuration file Reboot the device and run the main configuration file View the summary information about the device Ping a specitied destination Tear down the current connection and quit the system Command initialize ipsetup dhcp ip address ip address mask mask length default gateway ip address ipsetup ipv auto address ipv address pretix length ipv6 address pretix length default gateway ipv address password quit upgrade ip
567. the class The device does not support this operator 478 Contiguring classification rules 1 Select QoS gt Classifier from the navigation tree 2 Click Setup to enter the page for setting a class Figure 464 Configuring classification rules summary Add Remove Please selectaclassifier Select a classifier Any DScP IP Precedence Classifier Inbound Interface 0 63 you can input 8 entries for example 3 5 7 0 7 you can input 8 entries for example 3 5 7 1 31 Chars RTF Port from to 2000 65535 Dotip Service 602 1p Customer 802 1p 0 7 you can input 6 entries for example 3 5 7 MAC Source MAC Destination MAC Format of MAC is H H H VLAN oe 1 4094 input a range such as 3 20 or upto 8 entries SENEE VLA like 3 5 7 1 4094 input a range such as 3 20 or up to 8 entries E Customer VLAN like 3 5 7 ACL E ACL IPv4 2000 4999 E ACL IPv6 2000 3999 Apply Rule Type Rule Value 3 Configure classification rules for a class as described in Table 152 4 Click Apply 479 Table 152 Configuration items ltem Description Define a rule to match customer VLAN IDs If multiple such rules are configured for a class the new configuration does not overwrite the previous one VLAN Customer VLAN You can configure only one VLAN ID at a time Otherwise the relevant QoS policy fails to be applied If the same VLAN ID is specified multiple times the system considers
568. the information of LACP enabled ports Setup Select portis from the table to view partner port details LACP Port Inactive Partner Partner Oper Unit Port State Priority State Reason Port Port State Key 07 1 t Not in group 3 0 2 Enable 7EB Not in group 3 View Details Partner Port Details Unit Port Partner ID Partner Port Priority Partner Oper Key 028000 0000 0000 0000 a2 768 Note The following numbers are used to indicate the reasons for being inactive 1 All active ports are already in use for this aggregator 2 All aggregation resources are already in use 3 The port is not configured properly 4 The ports partner is not configured properly Table 67 Field description Field Description Unit ID of a device in a stack Port Port where LACP is enabled LACP State State of LACP on the port Port Priority LACP priority of the port Aggregation state of the port If a port is Selected this field also displays the ID State of the aggregation group it belongs to Reason code indicating why a port is Unselected for receiving or sending user Inactive Reason data For more information about the reason codes see the bottom of the page shown in Figure 191 212 Field Description Partner Port ID of the peer port States of the peer port e A LACP is enabled e B LACP short timeout If B does not appear it indicates LACP long timeout e C The sending system considers the link is aggreg
569. the loghost Display and configure the buffer capacity and interval for refreshing system logs Back up the configuration file to be used at the next startup from the device to the host of the current user Upload the configuration file to be used at the next startup from the host of the current user to the device Save the current configuration to the configuration file to be used at the next startup Restore the factory default settings Manage files on the device such as displaying the file list downloading a file uploading a file and removing a file Display port information by features Display feature information by ports Create modify delete and enable disable a port and clear port statistics Display the configuration information about a port mirroring group Create a port mirroring group Remove a port mirroring group Configure ports for a mirroring group Display the brief information about FTP and Telnet users Configure a password for a lower level user to switch from the current access level to the management level Create an FTP or Telnet user Modify FTP or Telnet user information Remove an FTP or a Telnet user Function menu Description User level Monitor Management Configure Monitor Monitor Configure Configure Configure Management Management Configure Configure Management Monitor Monitor Configure Monitor Configure Configure Configure Mon
570. the navigation tree select Authentication gt Port Security 2 In the Port Security Configuration area configure global port security settings a Select Enable Port Security b Click Advanced c Specify the system to disable the port temporarily for 30 seconds d Select Intrusion from the Trap Switch area e Click Apply 430 Figure 419 Configuring port security Port Security Configuration Enable Port Security wFAdvanced Temporarily Disabling Port Time 30 seconds 20 300 Default 20 Traps Switch C MAC Learned 802 1 Auth Failure Cl 802 1 Logoff 802 1 Logon Intrusion C MAC Auth Failure Cl mMAC Auth Logot Cl MAC AUh Logon Apply Security Ports And Secure MAC Address List L Fort ba eas Intrusion Protection Outbound Restriction Operation Add Del Selected Secure MAC Address List Advanced Port Security Configuration F Ports Enabled With Advanced Features Permitted OUls for ports working in the mode of 802 18 MAC Based Or OUI Configuring the basic port security control In the Security Ports And Secure MAC Address List area click Add On the page that appears select GigabitEthernet1 0 3 Enter 3 as the maximum number of MAC addresses Select Enable Intrusion Protection and select Disable Port Temporarily from the list Click Apply Figure 420 Applying the port security feature nub WN Apply Port Security Control Port GigabitEthernet1 0 3 hd Max Number of MAC 3 1 1024 Defaul
571. the nearest higher multiple of the numbering step to the current highest rule ID starting with O 451 For example if the numbering step is 5 the default and there are five ACL rules numbered O 5 9 10 and 12 the newly defined rule is numbered 15 If the ACL does not contain any rule the first rule is numbered O Whenever the step changes the rules are renumbered starting from O For example if there are five rules numbered 5 10 13 15 and 20 changing the step from 5 to 2 causes the rules to be renumbered 0 2 4 6 and 8 Implementing time based ACL rules You can implement ACL rules based on the time of day by applying a time range to them A time based ACL rule takes effect only in any time periods specified by the time range The following basic types of time range are available e Periodic time range Recurs periodically on a day or days of the week e Absolute time range Represents only a period of time and does not recur IPv4 fragments filtering with ACLs Traditional packet filtering matches only first fragments of IPv4 packets and allows all subsequent non irst fragments to pass through Attackers can fabricate non tirst fragments to attack networks To improve network security ACL filters all packets by default including fragments and non fragmented packets Meanwhile to improve match efficiency you can modify ACL rules For example you can configure ACL rules to filter non first fragments only Cont
572. the packet and then sends the packet to the gateway A If the gateway has an ARP entry for Host B it forwards the packet to Host B directly If not the gateway broadcasts an ARP request in which the target IP address is the IP address of Host B 5 After the gateway gets the MAC address of Host B it sends the packet to Host B ARP table An ARP table stores dynamic and static ARP entries 243 Dynamic ARP entry ARP automatically creates and updates dynamic entries A dynamic ARP entry is removed when its aging timer expires or the output interface goes down In addition a dynamic ARP entry can be overwritten by a static ARP entry Static ARP entry A static ARP entry is manually configured and maintained It does not age out and cannot be overwritten by any dynamic ARP entry Static ARP entries protect communication between devices because attack packets cannot modify the P to MAC mapping in a static ARP entry Gratuitous ARP In a gratuitous ARP packet the sender IP address and the target IP address are the IP address of the sending device the sender MAC address is the MAC address of the sending device and the target MAC address is the broadcast address FEIT A device sends a gratuitous ARP packet for either of the following purposes e Determine whether its IP address is already used by another device If the IP address is already used the device is informed of the conflict by an ARP reply e Inform other devic
573. thentication for authentication timeouts or network connection problems The way that the network access device handles VLANs on the port differs by 802 1X access control mode e Ona port that performs port based access control 330 Authentication status VLAN manipulation A user fails 802 1X The device assigns the Auth Fail VLAN to the port as the PVID All 802 1X authentication users on this port can access only resources in the Auth Fail VLAN A user in the Auth Fail VLAN The Auth Fail VLAN is still the PVID on the port and all 802 1X users on tails 802 1X this port are in this VLAN re authentication e The device assigns the VLAN specified for the user to the port as the PVID and removes the port from the Auth Fail VLAN After the user logs off the user configured PVID restores A user passes 802 1X My e If the authentication server assigns no VLAN the initial PVID applies authentication The user and all subsequent 802 1X users are assigned to the vser configured PVID After the user logs off the PVID remains unchanged On a port that pertorms MAC based access control Authentication status VLAN manipulation A user fails 802 1X The device remaps the MAC address of the user to the Auth Fail VLAN authentication The user can access only resources in the Auth Fail VLAN A user in the Auth Fail VLAN fails 802 1X The user is still in the Auth Fail VLAN re authentication The device remaps the MAC a
574. thz Name Secondary Method PPP Auth Name secondary Method Portal Auth Name secondary Method Command Authz Name After the configuration process is complete click Close Configure AAA accounting method for the ISP domain a b C Click the Accounting tab Select the ISP domain test Select Default Accounting select the accounting method RADIUS and select the accounting scheme system from the Name list Click Apply 416 Figure 404 Configuring the accounting method for the ISP domain Domain Setup Authentication Authorization Accounting Configuration of AAA Select an ISP domain test E Accounting Optional Disable Default Accounting RADIUS Name system Secondary Method H LAN access Accounting Name Secondary Method Login Accounting Name Secondary Method PPP Accounting Name secondary Method Portal Accounting Name Secondary Method e After the configuration process is complete click Close Configuring an ACL 1 From the navigation tree select QoS gt ACL IPv4 2 Click the Add tab 3 Enter the ACL number 3000 and then click Apply Figure 405 Adding ACL 3000 summary Basic Setup Advanced Setup Link Layer Setup Remove ACL Number S000 2000 2999 for basic ACLS 3000 3999 for advanced ACLs Match Order 4000 4999 for Ethernet frame header ACLs Description Characters 0 1277 ACL Number Type Number of Rules Match Order Description 4 Click the Advanced Setup tab 5 Contigure the
575. tication 353 Step Remarks Optional 3 Configuring authorization eal ia ar P minors bid SEE domain pecity the authorization methods tor various types of users By default all types of users use local authorization Required 4 Configuring accounting methods brihe i daman Specify the accounting methods for various types of users By default all types of users use local accounting Configuring an ISP domain 1 Select Authentication gt AAA from the navigation tree The Domain Setup page appears Figure 335 Domain Setup page Authentication Authorization Accounting ISP Domain Please select the ISP domain Domain Name Default Domain 2 Create an ISP domain as described in Table 108 3 Click Apply Table 108 Configuration items ltem Description Enter the ISP domain name which is for identifying the domain Domain Name You can enter a new domain name to create a domain or specify an existing domain to change its status whether it is the default domain 354 ltem Description Specify whether to use the ISP domain as the default domain Options include e Enable Uses the domain as the default domain Default Domain e Disable Uses the domain as a non default domain There can only be one default domain at a time If you specify another domain as the default domain the original default domain becomes a non default domain Configuring authentication methods for the ISP do
576. tiguration file at the next startup If you reboot the device when file operations are being performed the system does not execute the command to ensure security Examples If the configuration does not change reboot the device lt Sysname gt reboot Start to check configuration with next startup configuration file please Wea od RR week DONE This command will reboot the device Continue Y N y Now rebooting please wait If the configuration changes reboot the device lt Sysname gt reboot Start to check configuration with next startup configuration file please We LE ps sek rw DONE This command will reboot the device Current configuration will be lost in next startup if you continue Continue Y N sy Now rebooting please wait summary Syntax summary Parameters None Description Use summary to view the summary of the device including the IP address of VLAN interface 1 and software version information Examples Display summary information about the device lt sysname gt summary 29 Select menu option Summary IP Method Manual IP address 192 168 0 233 Subnet mask 255 299425990 Default gateway IPv6 Method IPv6 link local address IPv6 subnet mask length IPv6 global address IPv6 subnet mask length IPv6 default gateway Current boot app is flash hp1920 24G bin Next main boot app is flash hp1920 24G bin Next backup boot app is flash test bin HP Comware Platform Software Comware So
577. time s Configuration BPDU transmission interval in seconds Max hops Maximum hops of the current MST region MSTP contiguration example Network requirements As shown in Figure 183 configure MSTP as follows All devices on the network are in the same MST region Packets of VLAN 10 VLAN 20 VLAN 30 and VLAN 40 are forwarded along MSTI 1 MSTI 2 MSTI 3 and MSTI O respectively Switch A and Switch B operate at the distribution layer Switch C and Switch D operate at the access layer VLAN 10 and VLAN 20 are terminated on the distribution layer devices and VLAN 30 is terminated on the access layer devices so the root bridges of MSTI 1 and MSTI 2 are Switch A and Switch B respectively and the root bridge of MSTI 3 is Switch C 199 Figure 183 Network diagram Switch A Switch B Permit all VLAN Permit VLAN 20 40 Permit VLAN 10 40 Permit Permit VLAN 10 40 VLAN 20 40 Permit VLAN 30 40 Switch C Switch D Permit next to a link in the figure is followed by the VLANs the packets of which are permitted to pass this link Configuration procedure Configuring Switch A 1 Configure an MST region a From the navigation tree select Network gt MSTP By default the Region tab is displayed b Click Modify Figure 184 The region tab Global Port Summary Port Setup Format Selector Region Name Revision Level 0 OOedtcOO3620 0 Modify Instance VLAN Mapped 0 1 io 4094 Set the region name t
578. tination port number and number of matched packets This function is not supported Source IP Address Select the Source IP Address box and enter a source IPv address and prefix length The IPv address must be in a format like X X X X An IPv address consists of eight Source Prefix 16 bit long fields each of which is expressed with two hexadecimal numbers and separated from its neighboring fields by colon Time Range Select the time range during which the rule takes effect Configuring a rule for an advanced IPv6 ACL 1 Select QoS gt ACL IPv6 from the navigation tree 2 Click the Advance Setup tab The rule configuration page for an advanced IPv6 ACL appears 463 Figure 452 Configuring a rule for an advanced IPv ACL Summary Add Hasic Setup Remove Select Access Control LisHACL SelectanACl Help Configure an Advanced ACL Rule ID 85834 fno ID is entered the system will specify one Operation check Fragment Check Logging IF Address Filter C Destination IF Address Po Destination Prefix Protocol ICMPye Type Mamed ICMPEyf Type owe Tye 0 285 leMPvBEedel 0 288 TOPIUDP Part Range of Portis 0 65535 Tire Range Cancel Fule ID Operation Description Time Fiat 3 Adda rule for an advanced IPv ACL as described in Table 144 A Click Add Table 144 Configuration items lem Description Select Access Control List ACL Select the advanced IPv6 ACL for which you want t
579. tion items ltem Descri ption Select an ISP domain Default AuthZ Name Secondary Method LAN access AuthZ Name Secondary Method Login AuthZ Name Secondary Method Select the ISP domain for which you want to specify authentication methods Configure the default authorization method and secondary authorization method for all types of users Options include HWTACACS HWTACACS authorization You must specify the HWTACACS scheme to be used Local Local authorization None This method trusts all users and assigns default rights to them RADIUS RADIUS authorization You must specify the RADIUS scheme to be used Not Set The device uses the default authorization setting which is local authorization Configure the authorization method and secondary authorization method for LAN access users Options include Local Local authorization None This method trusts all users and assigns default rights to them RADIUS RADIUS authorization You must specify the RADIUS scheme to be used Not Set The device uses the settings in the Default AuthZ area for LAN access users Configure the authorization method and secondary authorization method for login users Options include HWTACACS HWTACACS authorization You must specify the HWTACACS scheme to be used Local Local authorization None This method trusts all users and assigns default rights to them RADIUS RADIUS authorization You m
580. to option is selected the refresh interval is calculated by the relay agent according to the number of client entries Creating a DHCP server group 1 From the navigation tree select Network gt DHCP to enter the default DHCP Relay page shown in Figure 274 2 In the Server Group area click Add to enter the page shown in Figure 275 Figure 275 Create a server group DHCP Snooping Server Group ID 0 19 IP Address r tems marked with an asterlsk are required Apply Cancel 300 3 Configure the DHCP server group as shown in Table 95 A Click Apply Table 95 Configuration items ltem Descri ption Enter the ID of a DHCP server group Server Group ID You can create up to 20 DHCP server groups Enter the IP address of a server in the DHCP server group IP Address The server IP address cannot be on the same subnet as the IP address of the DHCP relay agent Otherwise the client cannot obtain an IP address Enabling the DHCP relay agent on an interface 1 From the navigation tree select Network gt DHCP to enter the default DHCP Relay page shown in Figure 274 2 In the Interface Config field click the icon of a specitic interface to enter the page shown in Figure 276 Figure 276 Configuring a DHCP relay agent interface DHCP Snooping Inierface Mame Vilan intemtace DHCP Relay Enable Disable Address Match eer Enable Disable Apply Cancel 3 Configure the DHCP relay agent on the i
581. to the operating mode If you configure the reinitialization delay a port must wait the specified amount of time to initialize LLDP atter the LLDP operating mode changes Working mechanism Transmitting LLDP frames An LLDP enabled port operating in TxRx mode or Tx mode sends LLDP frames to its directly connected devices both periodically and when the local configuration changes To prevent LLDP frames from overwhelming the network during times of frequent changes to local device information an interval is introduced between two successive LLDP frames This interval is shortened to 1 second in either of the following cases 221 e A new neighbor is discovered A new LLDP frame is received carrying device information new to the local device e The LLDP operating mode of the port changes from Disable or Rx to TxRx or Tx This is the fast sending mechanism of LLDP With this mechanism the specitied number of LLDP frames is sent successively at the 1 second interval The mechanism helps LLDP neighbors discover the local device as soon as possible Then the normal LLDP frame transmission interval resumes Receiving LLDP frames An LLDP enabled port operating in TxRx mode or Rx mode confirms the validity of TLVs carried in every received LLDP frame If the TLVs are valid the information is saved and an aging timer is set When the TTL value in the Time to Live TLV carried in the LLDP frame becomes zero the information ages out immediat
582. toeolliP S ICMP Type ICMP Message cme Twe ozs tom codef a 285 TOPRIUDP Part TCP Connection Established EE por LT Pesag gaiis NN G Range of Portis 0 65534 Precedence Filter DSCP Mot Check ka TOS Mot Check wt Precedence Mot Check w Time Range Add Rule ID Operation Description Time Rar 4 Add a class a Select QoS gt Classifier from the navigation tree b Click the Add tab 491 5 c Enter the class name class1 d Click Add Figure 480 Adding a class SUMMary Setup Remove Operation And h Add Classifier Name Operation Rule Count Define classification rules a Click the Setup tab b Select the class name class in the list c Select the ACL IPv4 box and select ACL 3000 in the following list 492 Figure 481 Defining dlassification rules Summary Add Setup Remove Please select a classifier class1 CJ Any DScP 0 63 you can input 8 entries for example 3 5 7 _ IP Precedence 0 7 you can input 8 entries for example 3 5 7 Classifier 1 31 Chars _ Inbound Interface h _ RTF Port from to 2000 65535 Dotip _ Service 802 1p _ Customer 802 1p 0 7 you can input 6 entries for example 3 5 7 MAC C Source MAC Cl Destination MAC Format of MAC is H H H VLAN ma 1 4094 input a range such as 3 20 or up to 6 entries _ Service VLAN like 3 5 7 1 4094 input a range such as 3
583. tree that connects all MST regions in a switched network If you regard each MST region as a device the CST is a spanning tree calculated by these devices through STP or RSTP The red lines in Figure 176 represent the CST An internal spanning tree IST is a spanning tree that runs in an MST region It is also called MSTI O a special MSTI to which all VLANs are mapped by default In Figure 176 the CIST has a section in each MST region and this section is the IST in the respective MST region The common and internal spanning tree CIST is a single spanning tree that connects all devices in a switched network It consists of the ISTs in all MST regions and the CST In Figure 176 the ISTs in all MST regions plus the inter region CST constitute the CIST of the entire network Regional root bridge The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the MSTI Based on the topology different spanning trees in an MST region might have different regional roots As shown in Figure 176 the regional root of MSTI 1 in region DO is device B and that of MSTI 2 is device C Common root bridge The common root bridge is the root bridge of the CIST In Figure 176 for example the common root bridge is a device in region AO Port roles A port can play different roles in different MSTIs As shown in Figure 177 an MST region has device A device B device C and device D Port 1 and port
584. tts step 100 Power Prority No change v Selected Ports Apply Cancel 3 Configure the PoE ports as described in Table 163 4 Click Apply Table 163 Configuration items ltem Description Select Port Select ports to be configured and they are displayed in the Selected Ports area Enable or disable PoE on the selected ports e The system does not supply power to or reserve power for the PD connected to a PoE port if the PoE port is not enabled with the PoE function e You can enable PoE for a PoE port if the PoE port does not result in PoE power Persele overload Otherwise you cannot enable PoE for the PoE port By default PoE is enabled on a PoE port IMPORTANT When the sum of the power consumption of all ports exceeds the maximum power of PSE the system considers the PSE as overloaded 498 ltem Description Set the maximum power for the PoE port The maximum PoE interface power is the maximum power that the PoE interface Power Max can provide to the connected PD If the PD requires more power than the maximum PoE interface power the PoE interface does not supply power to the PD By default the maximum power of a PoE port is 30 watts Set the power supply priority for a PoE port In descending order the power supply priority levels of a PoE port are critical high and low e When the PoE power is insufficient power is first supplied to PoE ports with a higher priority level e If the PoE pow
585. twork gt LLDP By default the Port Setup tab is displayed as shown in Figure 209 b Select port GigabitEthernet1 0 1 and GigabitEthernet1 0 2 c Click Modify Selected 236 The page shown in Figure 210 appears Figure 209 The port setup tab Port Setup Global Setup Global Summary Neighbor Summary R Port Name v Search Advanced Search F Port Name LLDP Status LLDP Work Mode Operation W GigabitEthernet1 0 1 Enabled TxRx A Enabled TxRx ES F GigabitEthernet1 0 3 Enabled TxRx A F GigabitEthernet1 0 4 Enabled TxRx A F GigabitEthernet1 0 5 Enabled TXRX A E GigabitEthernet1 0 6 Enabled TXRx A E GigabitEthernet1 0 7 Enabled TXRX A F GigabitEthernet1 0 8 Enabled TxRx A F GigabitEthernet1 0 9 Enabled TXRX A GigabitEthernet1 0 10 Enabled TxRx A F GigabitEthernet1 0 11 Enabled TxRx A F GigabitEthernet1 0 12 Enabled TxRx A F GigabitEthernet1 0 13 Enabled TxRx A T GigabitEthernet1 0 14 Enabled TXRX A F GigabitEthernet1 0 15 Enabled TXRX A 28 records 15 per page page 1 2 record 1 15 First Prev Next Last 1 GO Enable Disable Modify Selected Neighbor Information Statistic Information Status Information d Select Rx from the LLDP Operating Mode list Click Apply A progress dialog box appears Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds 237 Figure 210 Setting LLDP on multiple ports
586. uirements EE ET ER EE E A E E E E E ERSA 2 ON Ee 5 eN ER ER RE EE EE EE EI 6 Logging in to the Web SEE SI 6 Logging out of the Web interface eeeeeeeeeereeeseeeseeseeeeeeseeeseeeseesseeseceseceseeseeseeoseceseeeseeseeseroseceseeeseeseeceseeesreseeesereseeeseesseeseresee 7 Web interface TE ee 7 NAT es ley ME less eure EE ER g VAAR VEER e A AA AAAA AEAEE EAEE g Common items on the Web lolo EER A A ee Ee Ge Oe ee Ee ee 16 Configuring the switch at the Cl ee EE EE EE EE EE RE EE EER EE EE Ee ER ER EE EER Ee EE RR EE EE Ee ER ER EE EER Ee EER Ee EE RE Re EER Ee Ee neue ees 20 Getting Started With the CLlleeeeeeeeeeeeseeseeseeseeseeseeseeeeeeeeeseeseeseoseosseseessesseseoseoseosresseseeseesseeseeseoseesseesreseesresrosrosrosreseeseesseeeeene 20 Setting up the configuration TEE 20 Setting terminal parameters ie issu EE ni eee ico EE OR OR EE EN 21 Logging in to TEI EE ee 24 ol TREE ee ee NE EENE ere terre tere 24 Tali ile TO EEOC E CEE REO COCO eSe Cee reer cere rere rere rere rere rerereerreerreerreerreerreer reer rere rerrreerreerreerreerreerreerreeern 25 ipsetup EE EE EE EE EE EE EE EE EE EE eiewels 25 PET LEE EG 26 REELE EG 26 TREE EG 27 TREE EG 27 quit RE EE E E EE A A EEE 28 reboot eeeeeeeseeseeseeseeseeeereereseesresresroseoreseeeeeeseesresresrosrosresreseesresseereerresresresrsreseesreoreeeeesreseeeseeseeseesresresresresresresreseesseeseeeee 29 MEEL ET 99 TEE EG 30 upgrade ipv EE EE EE E EE EE 3 Configuration example for upgrading the
587. uitous ARP packet learning is enabled by default Enable the device to send gratuitous ARP packets upon receiving ARP Send gratuitous ARP packets when requests from another network segment receiving ARP requests from another l l network segment By default the device does not send gratuitous ARP packets upon receiving ARP requests from another network segment Static ARP configuration example Network Requirements As shown in Figure 221 hosts are connected to Switch A and Switch A is connected to Router B through GigabitEthernet 1 0 1 in VLAN 100 To ensure secure communications between Switch A and Router B configure a static ARP entry on Switch A for Router B 246 Figure 221 Network diagram Router B 192 168 1 1 24 00e0 fc01 0000 GE1 0 1 VLAN 100 Switch A Configuring Switch A 1 Create VLAN 100 a From the navigation tree select Network gt VLAN b Click the Add tab c Enter 100 in the VLAN ID field d Click Create Figure 222 Creating VLAN 100 Select VLAN Port Detail Detail bodite VLAN Modity Part Remove Create VLAN IDs Example 3 6 10 Create ID Description 1 VLAN 0001 Modify VLAN description Mote you can do this later on the Modify VLAN page Modify the description of the selected VLAN ID Description tt Chars 2 Add GigabitEthernet 1 0 1 to VLAN 100 a Click the Modify Port tab b In the Select Ports area select interface GigabitEthernet 1 0 1 247
588. up tab select GigabitEthernet1 0 1 b Click Enable Figure 32 Configuring a stack port on Switch A Topology Summary Device Summary Global Settings Private Net IP 192 168 1 1 Mask 255 255 255 0 Build Stack Enable v Apply Port Settings R Port Name Search Advanced Search E Port Name Por Status J GigabitEthernet1 0 1 not stack port GigabitEthernet1 0 2 not stack port F GigabitEthernet1 0 3 not stack port GigabitEthernet1 0 4 not stack port F GigabitEthernet1 0 5 not stack port 28 records 5 vY per page page 1 6 record 1 5 First Next Last 1 GO Disable On Switch B configure GigabitEthernet 1 0 2 connected to Switch A GigabitEthernet 1 0 1 connected to Switch C and GigabitEthernet 1 0 3 connected to Switch D as stack ports a Select Stack from the navigation tree of Switch B b In the Port Settings area on the Setup tab select GigabitEfhernet1 0 1 GigabitEthernet1 0 2 and GigabitEthernet1 0 3 c Click Enable 44 Figure 33 Configuring stack ports on Switch B Topology Summary Device Summary Global Settings Private Net IP Mask Build Stack Disable v Apply Por Settings R Port Name v Search Advanced Search Port Name Port Status GigabitEthernet1 0 1 not stack port GigabitEthernet1 0 2 not stack port GigabitEthernet1 0 3 not stack port GigabitEthernet1 0 4 not stack port F GigabitEthernet1 0 5 not stack port 28 records 5 v per pag
589. uperior BP2 will act as the designated port and the configuration BPDU on this port will be replaced with the calculated configuration BPDU which will be sent out periodically Port CP1 receives the configuration BPDU of Device A 10 O O AP2 Device C finds that the received configuration BPDU is superior to the configuration BPDU of the local port 2 0 2 CP1 and it updates the configuration BPDU of CP 1 Port CP2 receives the configuration BPDU of port BP2 of Device B 1 O 1 BP2 before the configuration BPDU is updated Device C finds that the received configuration BPDU is superior to the configuration BPDU of the local port 2 0 2 CP2 and it updates the configuration BPDU of CP2 182 AP1 0 O O AP1 AP2 0 O O AP2 BP1 0 O O APT BP2 1 O 1 BP2 Root port BP1 10 O O AP1 Designated port BP2 0 5 1 BP2 CP1 0 O O AP2 CP2 1 0 1 BP2 Configuration BPDU on Device Comparison process ports after comparison After comparison e The configuration BPDU of CP1 is elected as the optimum configuration BPDU so CP1 is identified as the root port the e poo port CPT 0 0 contiguration BPDUs of which will not be changed O AP2 ai e Device C compares the calculated designated port e Designated port CP2 configuration BPDU 0 10 2 CP2 with the configuration 0 10 2 CP2 BPDU of CP2 and CP2 becomes the designated port and the configuration BPDU of this port will b
590. uration items ltem Description Please select a policy Select an existing policy in the list Classitier Name Select an existing classifier in the list Behavior Name Select an existing behavior in the list Applying a policy to a port 1 Select QoS gt Port Policy from the navigation tree 2 Click Setup to enter the page for applying a policy to a port 484 Figure 470 Applying a policy to a port Summary Remove Please select a policy Select a policy v Direction Inbound v Please select port s Select AIl Select None 3 Apply a policy to a port as described in Table 158 4 Click Apply Table 158 Configuration items ltem Description Please select a policy Select an existing policy in the list Set the direction in which the policy is to be applied Direction e Inbound Applies the policy to the incoming packets of the specified ports e Outbound Applies the policy to the outgoing packets of the specified ports Please select port s Select one port to which the QoS policy is to be applied on the chassis front panel Configuring queue scheduling on a port 1 Select QoS gt Queue from the navigation tree 2 Click Setup to enter the queue scheduling configuration page Figure 471 Configuring queue scheduling Summary WRR Setup WRR Enable v Queue No Change v Group SP Weight 1 Please select port s Select All Select None Cancel 3 Configure queue scheduling on a port as describ
591. urrent user level to the management level Configure a super password as described in Table 19 87 A Click Apply Table 19 Configuration items ltem Description Select the operation type Create Remove e Create Configure or change the super password e Remove Remove the current super password Password Set the password for non management level users to switch to the management level Confirm Password Enter the same password again Select the password encryption type e Reversible Uses a reversible encryption algorithm The ciphertext password can be Password decrypted to get the plaintext password Encryption e Irreversible Uses an irreversible encryption algorithm The ciphertext password cannot be decrypted to get the plaintext password Switching to the management level A non management level user can switch to the management level after providing the correct super password The level switching operation does not change the access level setting for the user When the user logs in to the Web interface again the access level of the user is still the level set for the user To switch to the management level 1 Select Device gt Users from the navigation tree 2 Click the Switch To Management tab 3 Enter the correct super password 4 Click Login Figure 74 Switching to the management level Summary super Password Create Modify Remove Please enter the super password to switch from the cu
592. ust specify the RADIUS scheme to be used Not Set The device uses the settings in the Default AuthZ area for login users Configuring accounting methods for the ISP domain 1 Select Authentication gt AAA from the navigation tree 2 Click the Accounting tab 357 Figure 338 Accounting method configuration page Domain Setup Authentication Authorization Accounting Configuration of AAA Select an ISP domain Accounting Optional Default Accounting LAN access Accounting Login Accounting PPP Accounting Portal Accounting system Disable Local Name Secondary Method Name Secondary Method Name Secondary Method Name Secondary Method Name Secondary Method 3 Select the ISP domain and specify accounting methods for the ISP domain as described in Table 111 4 Click Apply Table 111 Configuration items ltem Descri ption Select an ISP domain Accounting Optional Default Accounting Name Secondary Method LAN access Accounting Name Secondary Method Select the ISP domain for which you want to specify authentication methods Specify whether to enable the accounting optional feature The feature enables a user who would otherwise be disconnected to use network resources even if there is no accounting server available or communication with the current accounting server fails If accounting for the user fails the device no longer sends real time accounting updates for the user
593. v server address source filename bootrom runtime reboot summary ping ipv host quit 24 initialize Syntax initialize Parameters None Description Use initialize to delete the configuration file to be used at the next startup and reboot the device with the default contiguration being used during reboot Use the command with caution because this command deletes the contiguration file to be used at the next startup and restores the factory default settings Examples Delete the configuration file to be used at the next startup and reboot the device with the default configuration being used during reboot lt Sysname gt initialize The startup configuration file will be deleted and the system will be rebooted Continue Y N y Please wait Ipsetup Syntax ipsetup 1 dhcp ip address ip address mask mask length default gateway ip address Parameters dhcp Specifies the interface to obtain an IPv4 address through DHCP ip address ip address Specifies an IPv4 address for VLAN interface 1 in dotted decimal notation mask Subnet mask in dotted decimal notation mask length Subnet mask length the number of consecutive ones in the mask in the range of O to 32 default gateway ip address Specifies the IPv4 address of the default gateway With this argument and keyword combination configured the command not only assigns an IPv4 address to the interface but also specities a default route for
594. val 245 security ARP attack protection configuration 250 traceroute 31 IP routing configuration IPv4 278 contiguration IPv6 278 displaying active route table IPv4 279 displaying active route table IPv6 281 routing table 278 static route 2 8 static route creation IPv4 280 static route creation IPv6 281 static routing configuration IPv4 283 static routing configuration IPv 287 static routing default route 279 IP services configuring client s IP to MAC bindings 302 configuring DHCP relay agent advanced parameters 299 configuring DHCP snooping functions on interface 309 creating DHCP server group 300 DHCP address allocation 292 DHCP overview 292 DHCP relay agent configuration 297 298 303 DHCP snooping configuration 311 DHCP snooping Option 82 support 308 DHCP snooping trusted port 306 displaying client s IP to MAC bindings 302 310 enabling DHCP 299 enabling DHCP relay agent on interface 301 ip validity check ARP 250 P to MAC DHCP snooping configuration 306 308 IPvd ACL configuration IPv4 454 active route table 279 static route creation 280 static routing contiguration 283 IPv ACL configuration IPv6 461 active route table 281 static route creation 281 static routing configuration 287 IPv multicast configuring MLD snooping 274 displaying MLD snooping multicast forwarding entries 2 3 enabling MLD snooping globally 270 enab
595. voice devices are in use In broadband communities data traffic and voice traffic are usually transmitted in the network at the same time Usually voice traffic needs higher priority than data traffic to reduce the transmission delay and packet loss ratio A voice VLAN is configured for voice traffic After assigning the ports that connect to voice devices to a voice VLAN the system automatically modities quality of service QoS parameters for voice traftic to improve the transmission priority of voice traffic and ensure voice quality NOTE Common voice devices include IP phones and integrated access devices ADs Only IP phones are used in the voice VLAN contiguration examples in this document OUI addresses A device determines whether an incoming packet is a voice packet by checking its source MAC address If the source MAC address of a received packet matches an organizationally unique identifier OUI in the voice device OUI list referred to as the OUI list in this document maintained by the switch the packet is regarded as a voice packet You can add OUI addresses to the OUI list maintained by the device or use the default OUI list shown in Table 45 for voice traffic identification Table 45 The default OUI list Number OUI Address Vendor 1 0003 6b00 0000 Cisco phone 2 00e0 7500 0000 Polycom phone An OUI address is usually the first 24 bits of a MAC address in binary format It is a globally unique identitier assigned to
596. warding entries related to that port from the IGMP snooping forwarding table The receiver hosts attached to that port can join multicast groups again before the number of multicast groups on the port reaches the limit Enable or disable fastleave processing on the port When a port that is enabled with the IGMP snooping fastleave processing feature receives an IGMP leave message the switch immediately removes that port from the forwarding entry for the multicast group specitied in the message When the switch receives IGMP group specific queries for that multicast group it does not forward them to that port You can enable IGMP snooping fast leave processing on ports to save bandwidth and resources Displaying IGMP snooping multicast forwarding entries From the navigation tree select Network gt IGMP snooping Click Show Entries to display information about IGMP snooping multicast forwarding entries Figure 232 Displaying entry information Show Entries BLA ID mv Search Advanced Search VLAN ID SOURCE Group Operation 100 0 0 0 0 224 1 1 1 N To display detailed information about an entry click the Ss icon for the entry 259 Figure 233 Displaying detailed information about the entry Advanced Entry Details VLAN ID 100 Source Address 0 0 0 0 Group Address 224 1 1 1 Router Port s GigabitEthernett 01 Member Port s GigabitEthemett 0 3 Back Table 85 Field description Field Description VLAN
597. with an asterisk are required OUl Address Mask Description 0003 6b00 0000 fif f00 0000 Cisco phone O0e0 7500 0000 TT TOO DODO Polycom phone 166 Verifying the configuration 1 When the preceding configurations are completed the OUI Summary tab is displayed by default as shown in Figure 159 You can view the information about the newly added OUI address Figure 159 Displaying the current OUI list of the device Summary Setup Fort Setup OUl Add OU Remove OUl Address Mask Description 0003 6b00 0000 fiff fO0 0000 Cisco phone 0011 2200 0000 fif fO0 0000 test O0e0 7500 0000 T TOO DOODO Polycom phone 2 Click the Summary tab where you can view the current voice VLAN information Figure 160 Displaying voice VLAN information Setup Port Setup OUI Summary DUI Add OUl Remove Voice VLAN security Enabled Voice VLAN aging time 30 minutes Maximum af voice VLANs 1 Current number of voice VLANs 1 Ports enabled for voice VLAN Port Name Voice VLAN ID Mode GigabitEthernet1 0 1 2 Auto Contiguring a voice VLAN on a port in manual voice VLAN assignment mode Network requirements As shown in Figure 161 e Configure VLAN 2 as a voice VLAN that carries only voice traffic e The IP phone connected to hybrid port GigabitEthernet 1 0 1 sends untagged voice traffic e GigabitEtfhernet 1 0 1 operates in manual voice VLAN assignment mode and allows voice packets whose source MAC addresses match the OUI addresses spe
598. words 10 Framed Routing 54 unassigned 11 Filter ID 55 Event Timestamp 12 Framed MTU 56 59 unassigned 13 Framed Compression 60 CHAP Challenge 14 Login IP Host 61 NAS Port Type 15 Login Service 62 Port Limit 16 Login TCP Port 63 Login LAT Port 17 unassigned 64 Tunnel Type 18 Reply_Message 65 Tunnel Medium Type 19 Callback Number 66 Tunnel ClientEndpoint 20 Callback ID 67 Tunnel Server Endpoint 21 unassigned 68 Acct Tunnel Connection 22 Framed Route 69 Tunnel Password 366 No Attribute No Attribute 23 Framed IPX Network 70 ARAP Password 24 State 7 ARAP Features 25 Class 72 ARAP Zone Access 26 Vendor Specific 73 ARAP Security 27 Session Timeout 74 ARAP Security Data 28 ldle Timeout 75 Password Retry 29 Termination Action 76 Prompt 30 Called Station ld 77 ConnectInfo 31 Calling Station Id 78 Configuration Token 32 NAS ldentifier 79 EAP Message 33 Proxy State 80 Message Authenticator 34 Login LAT Service 81 Tunnel Private Group id 35 Login LAT Node 82 Tunnel Assignment id 36 Login LAT Group 83 Tunnel Preference 37 Framed AppleTalk Link 84 ARAP Challenge Response 38 Framed AppleTalk Network 85 Acct Interim Interval 39 Framed AppleTalk Zone 86 Acct Tunnel Packets Lost 40 Acct Status Type 87 NAS Port ld 41 Acct Delay Time 88 Framed Pool 42 Acct Input Octets 89 unassigned 43 Acct Output Octets 90 Tunnel Client Auth id 44 Acct Session ld 91 Tunnel Server Auth id NOTE This table lists the att
599. works without QoS JUArAN EE EE EE EE EE ee 466 QoS requirements of new applications ee EE 466 Congestion causes impacts and countermeasures ssrsssssessssssessssesssssecssssecssnssessssecssssecssascesanscssaneeessnees 467 ad Fea each OOS eae EE EE ee tee aes 468 TR ET TE EE 468 EET ternett tesseetersneeesseet terrenet 469 Gueue scheduling esse 471 TERTE nese nese esse eeeee esse nese nese eeeeeseeeseea nese eeeeeeeeens A473 TEE TEE terrent tesseettesnenrsseetttessetteesseeteesseereeseen 474 Introduction to priority mapping dT 475 Configuration guidelines RR EO 476 Recommended QoS configuration procedures EE EE EE naan 476 Adding ER ee A78 Contiguring classification rules ee EE EE EE OE EE OE EER EER Oe EER ORE EER EER OE EE EO EER EER Re EER EE EE Re RE EE Re EE ee EE eens 479 Adding a traffic behayiop ereeerreeerreesreeerererrsecsereesereesercsereesereeserceseecserceserceserceseroserceserceseresereesrcesercesercesereeseeeserereeseeceeeee 480 Configuring traffic mirroring and traffic redirecting for a traffic behavior sees er ER ER ER EE EE ER ER ER ER ER ER Ee ee ee eng 481 Configuring other actions for a traffic behavior Ese Ee Ee EE EE See ee ee EE ee ee EER ee ARE EE ee Ee ee dee Ee 48 Adding d policy ee ee 483 Configuring classifier behavior associations for the policy eeeeeeeeereeeeeeeeeetrrrrrereeeeetsrrrrsssesereresnsnnnnnseeeeeeesan 484 Applying a policy O A ds EE EE Ee A84 Configuring queue scheduling ETE EE EE EE EE Ee A85 Configu
600. y assigns a link local address to the VLAN interface Manual according to the link local address prefix FE80 64 and the link layer address of the VLAN interface e Manual Configures an IPv link local address for the VLAN interface manually Select Up or Down from the Admin Status list to bring up or shut down the selected VLAN interface When the VLAN interface fails shut down and then enable the VLAN interface which might restore the VLAN intertace By default a VLAN interface is down if all Ethernet ports in the VLAN are down ll Otherwise the VLAN interface is up l atus Modify When you set the admin status follow these guidelines ee e The current VLAN interface state in the Modify IPv4 Address and Modify IPv ress Address frames changes as the VLAN interface state is modified in the Admin Status list e The state of each port in the VLAN is independent of the VLAN interface state Assign an Pv6 site local address or global unicast address to the VLAN interface Add IPv Enter an IPv6 address in the field and select a prefix length in the list next to it Unicast The prefix of the IPv address you entered cannot be FE80 10 the prefix of the Address link local address The prefix of the IPv site local address you enter must be FECO 10 Select the box to generate IPv6 site local addresses or global unicast addresses in the 64 bit Extended Unique Identifier EUI 64 format If the EUI 64 box is not spe
Download Pdf Manuals
Related Search
Related Contents
Manuel de l`utilisateur TDS 210 et TDS 220 Ford E-Series and F-Series Products Dynamic 300 – 380 - 450 electronic electronic Class A Sistemas de Control de Temperatura SA121, SA122 取扱説明書 - M ARES um PDO 5580 - Applied Motion Postes de sécurité microbiologique de classe II SeroCPה - IgG - Savyon Diagnostics - Mobiletech Blog Copyright © All rights reserved.
Failed to retrieve file