Sign In
Upload
Manuals
Brands
HP Manuals
Switch
5120 EI Series
HP 5120 EI Series Manuals
Manuals and User Guides for HP 5120 EI Series. We have
5
HP 5120 EI Series manuals available for free PDF download: Configuration Manual, Lan Switching Configuration Manual, Installation Manual, Specification, Datasheet
HP 5120 EI Series Configuration Manual (304 pages)
Brand:
HP
| Category:
Switch
| Size: 2.56 MB
Table of Contents
Configuration Guide
1
Table of Contents
3
AAA Configuration
11
AAA Overview
11
Radius
12
Hwtacacs
17
Domain-Based User Management
19
RADIUS Server Feature of the Device
20
Protocols and Standards
21
RADIUS Attributes
21
AAA Configuration Considerations and Task List
24
Configuring AAA Schemes
26
Configuring Local Users
26
Configuring User Group Attributes
29
Configuring RADIUS Schemes
30
Configuring HWTACACS Schemes
40
Configuring AAA Methods for ISP Domains
46
Configuration Prerequisites
46
Creating an ISP Domain
46
Configuring ISP Domain Attributes
46
Configuring AAA Authentication Methods for an ISP Domain
47
Configuring AAA Authorization Methods for an ISP Domain
49
Configuring AAA Accounting Methods for an ISP Domain
50
Tearing down User Connections Forcibly
52
Configuring a Network Device as a RADIUS Server
52
RADIUS Server Functions Configuration Task List
52
Configuring a RADIUS User
52
Specifying a RADIUS Client
53
Displaying and Maintaining AAA
54
AAA Configuration Examples
54
AAA for Telnet Users by an HWTACACS Server
54
AAA for Telnet Users by Separate Servers
55
Authentication/Authorization for Ssh/Telnet Users by a RADIUS Server
57
AAA for 802.1X Users by a RADIUS Server
60
Level Switching Authentication for Telnet Users by an HWTACACS Server
66
RADIUS Authentication and Authorization for Telnet Users by a Network Device
69
Troubleshooting AAA
71
Troubleshooting RADIUS
71
Troubleshooting HWTACACS
72
802.1X Fundamentals
73
802.1X Architecture
73
Controlled/Uncontrolled Port and Pot Authorization Status
73
802.1X-Related Protocols
74
Packet Format
74
EAP over RADIUS
76
Initiating 802.1X Authentication
76
802.1X Client as the Initiator
76
Access Device as the Initiator
76
802.1X Authentication Procedures
77
A Comparison of EAP Relay and EAP Termination
77
EAP Relay
78
EAP Termination
79
802.1X Configuration
81
HP Implementation of 802.1X
81
Access Control Methods
81
Using 802.1X Authentication with Other Features
81
Configuring 802.1X
84
Configuration Prerequisites
84
802.1X Configuration Task List
84
Enabling 802.1X
85
Specifying EAP Relay or EAP Termination
85
Setting the Port Authorization State
86
Specifying an Access Control Method
87
Setting the Maximum Number of Concurrent 802.1X Users on a Port
87
Setting the Maximum Number of Authentication Request Attempts
88
Setting the 802.1X Authentication Timeout Timers
88
Configuring the Online User Handshake Function
88
Configuring the Authentication Trigger Function
89
Specifying a Mandatory Authentication Domain on a Port
90
Enabling the Quiet Timer
91
Enabling the Periodic Online User Re-Authentication Function
91
Configuring an 802.1X Guest VLAN
92
Configuring an Auth-Fail VLAN
93
Displaying and Maintaining 802.1X
94
802.1X Configuration Examples
94
802.1X Authentication Configuration Example
94
With Guest VLAN and VLAN Assignment Configuration Example
96
802.1X with ACL Assignment Configuration Example
99
EAD Fast Deployment Configuration
101
EAD Fast Deployment Overview
101
EAD Fast Deployment Implementation
101
Configuring EAD Fast Deployment
101
Configuration Prerequisites
101
Configuration Procedure
101
Displaying and Maintaining EAD Fast Deployment
102
EAD Fast Deployment Configuration Example
103
Troubleshooting EAD Fast Deployment
105
Web Browser Users Cannot be Correctly Redirected
105
MAC Authentication Configuration
106
MAC Authentication Overview
106
User Account Policies
106
Authentication Approaches
106
MAC Authentication Timers
107
Using MAC Authentication with Other Features
107
VLAN Assignment
107
ACL Assignment
107
Guest VLAN
107
MAC Authentication Configuration Task List
108
Basic Configuration for MAC Authentication
108
Configuration Prerequisites
108
Configuration Procedure
108
Specifying an Authentication Domain for MAC Authentication Users
109
Configuring a MAC Authentication Guest VLAN
110
Configuration Prerequisites
110
Configuration Procedure
110
Displaying and Maintaining MAC Authentication
111
MAC Authentication Configuration Examples
111
Local MAC Authentication Configuration Example
111
RADIUS-Based MAC Authentication Configuration Example
113
ACL Assignment Configuration Example
115
Portal Configuration
118
Portal Overview
118
Introduction to Portal
118
Extended Portal Functions
118
Portal System Components
118
Portal System Using the Local Portal Server
120
Portal Authentication Modes
121
Layer 2 Portal Authentication Process
121
Portal Configuration Task List
122
Configuration Prerequisites
123
Specifying the Local Portal Server for Layer 2 Portal Authentication
124
Configuring the Local Portal Server
124
Customizing Authentication Pages
124
Configuring the Local Portal Server
127
Enabling Layer 2 Portal Authentication
128
Controlling Access of Portal Users
129
Configuring a Portal-Free Rule
129
Setting the Maximum Number of Online Portal Users
129
Specifying an Authentication Domain for Portal Users
130
Adding a Web Proxy Server Port Number
130
Enabling Support for Portal User Moving
131
Specifying the Auth-Fail VLAN for Portal Authentication
132
Specifying the Auto Redirection URL for Authenticated Portal Users
132
Configuring Portal Detection Functions
133
Logging off Portal Users
133
Displaying and Maintaining Portal
133
Portal Configuration Examples
134
Configuring Layer 2 Portal Authentication
134
Configuration Procedures
135
Troubleshooting Portal
138
Inconsistent Keys on the Access Device and the Portal Server
138
Incorrect Server Port Number on the Access Device
138
Triple Authentication Configuration
140
Triple Authentication Overview
140
Triple Authentication Mechanism
140
Using Triple Authentication with Other Features
141
Configuring Triple Authentication
141
Triple Authentication Configuration Examples
142
Triple Authentication Basic Function Configuration Example
142
Triple Authentication Supporting VLAN Assignment and Auth-Fail VLAN Configuration Example
145
Port Security Configuration
150
Port Security Overview
150
Port Security Features
150
Port Security Modes
150
Support for Guest VLAN and Auth-Fail VLAN
153
Port Security Configuration Task List
153
Enabling Port Security
154
Configuration Prerequisites
154
Configuration Procedure
154
Setting the Maximum Number of Secure MAC Addresses
154
Setting the Port Security Mode
155
Configuration Prerequisites
155
Configuration Procedure
155
Configuring Port Security Features
156
Configuring NTK
156
Configuring Intrusion Protection
157
Configuring Port Security Traps
157
Configuring Secure MAC Addresses
158
Configuration Prerequisites
158
Configuration Procedure
158
Ignoring Authorization Information from the Server
159
Displaying and Maintaining Port Security
159
Port Security Configuration Examples
160
Configuring the Autolearn Mode
160
Configuring the Userloginwithoui Mode
162
Configuring the Macaddresselseuserloginsecure Mode
166
Troubleshooting Port Security
169
Cannot Set the Port Security Mode
169
Cannot Configure Secure MAC Addresses
170
Cannot Change Port Security Mode When a User Is Online
170
User Profile Configuration
171
User Profile Overview
171
User Profile Configuration Task List
171
Creating a User Profile
171
Configuration Prerequisites
171
Configuring a User Profile
172
Enabling a User Profile
172
Displaying and Maintaining User Profile
173
Password Control Configuration
174
Password Control Overview
174
Password Control Configuration Task List
176
Configuring Password Control
177
Enabling Password Control
177
Setting Global Password Control Parameters
177
Setting User Group Password Control Parameters
178
Setting Local User Password Control Parameters
179
Setting Super Password Control Parameters
180
Setting a Local User Password in Interactive Mode
180
Displaying and Maintaining Password Control
180
Password Control Configuration Example
181
HABP Configuration
184
HABP Overview
184
Configuring HABP
185
Configuring the HABP Server
185
Configuring an HABP Client
185
Displaying and Maintaining HABP
186
HABP Configuration Example
186
Network Requirements
186
Configuration Procedure
187
Public Key Configuration
189
Asymmetric Key Algorithm Overview
189
Basic Concepts
189
Key Algorithm Types
189
Asymmetric Key Algorithm Applications
189
Configuring the Local Asymmetric Key Pair
190
Creating an Asymmetric Key Pair
190
Displaying or Exporting the Local RSA or DSA Host Public Key
190
Destroying an Asymmetric Key Pair
191
Configuring a Peer Public Key
191
Displaying and Maintaining Public Keys
192
Public Key Configuration Examples
192
Configuring a Peer Public Key Manually
192
Importing a Peer Public Key from a Public Key File
194
PKI Configuration
197
PKI Overview
197
PKI Terms
197
PKI Architecture
198
PKI Applications
198
How Does PKI Work
199
PKI Configuration Task List
199
Configuring an Entity DN
200
Configuring a PKI Domain
201
Submitting a PKI Certificate Request
202
Submitting a Certificate Request in Auto Mode
203
Submitting a Certificate Request in Manual Mode
203
Retrieving a Certificate Manually
204
Configuring PKI Certificate Verification
205
Destroying a Local RSA Key Pair
206
Deleting a Certificate
206
Configuring an Access Control Policy
207
Displaying and Maintaining PKI
207
PKI Configuration Examples
208
Requesting a Certificate from a CA Running RSA Keon
208
Requesting a Certificate from a CA Running Windows 2003 Server
211
Configuring a Certificate Attribute-Based Access Control Policy
214
Troubleshooting PKI
216
Failed to Retrieve a CA Certificate
216
Failed to Request a Local Certificate
216
Failed to Retrieve Crls
217
SSH2.0 Configuration
218
SSH2.0 Overview
218
Introduction to SSH2.0
218
How Does SSH Work
218
Configuring the Device as an SSH Server
220
SSH Server Configuration Task List
220
Generating a DSA or RSA Key Pair
221
Enabling the SSH Server Function
221
Configuring the User Interfaces for SSH Clients
222
Configuring a Client Public Key
222
Configuring an SSH User
223
Setting the SSH Management Parameters
224
Configuring the Device as an SSH Client
225
SSH Client Configuration Task List
225
Specifying a Source IP Address/Interface for the SSH Client
225
Configuring Whether First-Time Authentication Is Supported
226
Establishing a Connection between the SSH Client and Server
227
Displaying and Maintaining SSH
227
SSH Server Configuration Examples
228
When Switch Acts as Server for Password Authentication
228
When Switch Acts as Server for Publickey Authentication
230
SSH Client Configuration Examples
235
When Switch Acts as Client for Password Authentication
235
When Switch Acts as Client for Publickey Authentication
238
SFTP Configuration
241
SFTP Overview
241
Configuring the Device as an SFTP Server
241
Configuration Prerequisites
241
Enabling the SFTP Server
241
Configuring the SFTP Connection Idle Timeout Period
241
Configuring the Device an SFTP Client
242
Specifying a Source IP Address or Interface for the SFTP Client
242
Establishing a Connection to the SFTP Server
242
Working with SFTP Directories
243
Working with SFTP Files
243
Displaying Help Information
244
Terminating the Connection to the Remote SFTP Server
244
SFTP Client Configuration Example
245
SFTP Server Configuration Example
248
SSL Configuration
251
SSL Overview
251
SSL Security Mechanism
251
SSL Protocol Stack
252
SSL Configuration Task List
252
Configuring an SSL Server Policy
252
Configuration Prerequisites
252
Configuration Procedure
253
SSL Server Policy Configuration Example
253
Configuring an SSL Client Policy
255
Configuration Prerequisites
255
Configuration Procedure
255
Displaying and Maintaining SSL
256
Troubleshooting SSL
256
SSL Handshake Failure
256
TCP Attack Protection Configuration
258
TCP Attack Protection Overview
258
Enabling the SYN Cookie Feature
258
Displaying and Maintaining TCP Attack Protection
258
IP Source Guard Configuration
259
IP Source Guard Overview
259
Introduction to IP Source Guard
259
IP Source Guard Binding
259
Configuring Ipv4 Source Guard Binding
261
Configuring a Static Ipv4 Source Guard Binding Entry
262
Configuring the Dynamic Ipv4 Source Guard Binding Function
262
Configuring Ipv6 Source Guard Binding
263
Configuring a Static Ipv6 Source Guard Binding Entry
263
Configuring the Dynamic Ipv6 Source Guard Binding Function
264
Displaying and Maintaining IP Source Guard
265
IP Source Guard Configuration Examples
266
Static Ipv4 Source Guard Binding Entry Configuration Example
266
Global Static Binding Excluded Port Configuration Example
267
Dynamic Ipv4 Source Guard Binding by DHCP Snooping Configuration Example
269
Dynamic Ipv4 Source Guard Binding by DHCP Relay Configuration Example
270
Static Ipv6 Source Guard Binding Entry Configuration Example
271
Dynamic Ipv6 Source Guard Binding by Dhcpv6 Snooping Configuration Example
272
Dynamic Ipv6 Source Guard Binding by ND Snooping Configuration Example
273
Troubleshooting IP Source Guard
274
Neither Static Binding Entries nor the Dynamic Binding Function Can be Configured
274
ARP Attack Protection Configuration
275
ARP Attack Protection Overview
275
ARP Attack Protection Configuration Task List
275
Configuring ARP Defense against IP Packet Attacks
276
Introduction
276
Configuring ARP Source Suppression
276
Enabling ARP Black Hole Routing
277
Displaying and Maintaining ARP Defense against IP Packet Attacks
277
Configuring ARP Packet Rate Limit
277
Introduction
277
Configuring Source MAC Address Based ARP Attack Detection
278
Introduction
278
Configuration Procedure
278
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
279
Configuring ARP Packet Source MAC Address Consistency Check
279
Introduction
279
Configuration Procedure
279
Configuring ARP Active Acknowledgement
280
Introduction
280
Configuration Procedure
280
Configuring ARP Detection
280
Security Entries/Oui MAC Addresses
281
Configuring ARP Detection Based on Specified Objects
282
Configuring ARP Restricted Forwarding
283
Displaying and Maintaining ARP Detection
283
ARP Detection Configuration Example I
283
ARP Detection Configuration Example II
285
ARP Restricted Forwarding Configuration Example
286
Configuring ARP Automatic Scanning and Fixed ARP
288
Introduction
288
Configuration Procedure
288
Configuring ARP Gateway Protection
289
Introduction
289
Configuration Procedure
289
ARP Gateway Protection Configuration Example
290
Configuring ARP Filtering
290
Introduction
290
Configuration Procedure
291
ARP Filtering Configuration Example
291
ND Attack Defense Configuration
293
Introduction to ND Attack Defense
293
Enabling Source MAC Consistency Check for ND Packets
294
Configuring the ND Detection Function
294
Introduction to ND Detection
294
Configuring ND Detection
295
Displaying and Maintaining ND Detection
295
ND Detection Configuration Example
296
Support and Other Resources
298
Contacting HP
298
Subscription Service
298
Related Information
298
Documents
298
Websites
298
Conventions
299
Index
301
Advertisement
HP 5120 EI Series Lan Switching Configuration Manual (235 pages)
Brand:
HP
| Category:
Network Router
| Size: 2.45 MB
Table of Contents
Configuration Guide
1
Table of Contents
3
Configuring Ethernet Interfaces
10
Ethernet Interface Naming Conventions
10
Configuring a Combo Interface
10
Configuration Prerequisites
10
Changing the Active Port of a Combo Interface
10
Configuring Basic Settings of an Ethernet Interface
11
Shutting down an Ethernet Interface
12
Setting Speed Options for Auto Negotiation on an Ethernet Interface
12
Configuring Flow Control on an Ethernet Interface
13
Configuring Link Change Suppression on an Ethernet Interface
14
Configuring Link-Down Event Suppression
15
Configuring Link-Up Event Suppression
15
Configuring Loopback Testing on an Ethernet Interface
15
Configuration Restrictions and Guidelines
16
Configuration Procedure
16
Configuring Jumbo Frame Support
16
Configuring a Port Group
17
Enabling Energy Saving Functions on an Ethernet Interface
17
Enabling Auto Power-Down
17
Configuring Storm Suppression
18
Setting the Statistics Polling Interval
19
Enabling Loopback Detection on an Ethernet Interface
19
Configuration Restrictions and Guidelines
20
Configuration Procedure
21
Setting the MDI Mode of an Ethernet Interface
21
Enabling Bridging on an Ethernet Interface
22
Testing the Cable Connection of an Ethernet Interface
23
Configuring Storm Control on an Ethernet Interface
23
Configuration Restrictions and Guidelines
24
Configuration Procedure
24
Displaying and Maintaining an Ethernet Interface
25
Configuring Loopback and Null Interfaces
26
Configuring a Loopback Interface
26
Introduction to the Loopback Interface
26
Configuration Procedure
26
Configuring a Null Interface
27
Introduction to the Null Interface
27
Configuration Procedure
27
Displaying and Maintaining Loopback and Null Interfaces
27
Bulk Configuring Interfaces
29
Configuration Guidelines
29
Configuration Procedure
29
Configuring the MAC Address Table
30
Overview
30
How a MAC Address Table Entry Is Created
30
Types of MAC Address Table Entries
31
MAC Address Table-Based Frame Forwarding
31
Configuring Static, Dynamic, and Blackhole MAC Address Table Entries
31
Configuring a Static or Dynamic MAC Address Table Entry in System View
32
Configuring a Static or Dynamic MAC Address Table Entry in Interface View
32
Configuring a Blackhole MAC Address Entry
32
Disabling MAC Address Learning
32
Disabling Global MAC Address Learning
33
Disabling MAC Address Learning on Ports
33
Configuring the Aging Timer for Dynamic MAC Address Entries
33
Disabling MAC Entry Aging Timer Refresh Based on Destination MAC Address
34
Application Example
34
Configuring the MAC Learning Limit on Ports
35
Enabling MAC Address Roaming
36
Enabling MAC Address Migration Log Notifying
37
Displaying and Maintaining MAC Address Tables
38
MAC Address Table Configuration Example
38
Network Requirements
38
Configuration Procedure
39
Configuring MAC Information
40
Overview
40
Introduction to MAC Information
40
How MAC Information Works
40
Enabling MAC Information Globally
40
Enabling MAC Information on an Interface
40
Configuring MAC Information Mode
41
Configuring the Interval for Sending Syslog or Trap Messages
41
Configuring the MAC Information Queue Length
41
MAC Information Configuration Example
42
Network Requirements
42
Configuration Procedure
42
Configuring Ethernet Link Aggregation
43
Overview
43
Basic Concepts
43
Operational Key
44
Aggregating Links in Static Mode
46
Aggregating Links in Dynamic Mode
47
Load-Sharing Criteria for Link Aggregation Groups
49
Configuration Restrictions and Guidelines
49
Ethernet Link Aggregation Configuration Task List
49
Configuring an Aggregation Group
50
Configuration Guidelines
50
Configuring a Static Aggregation Group
50
Configuring a Dynamic Aggregation Group
51
Configuring an Aggregate Interface
52
Configuring the Description of an Aggregate Interface
52
Enabling Link State Traps for an Aggregate Interface
52
Limiting the Number of Selected Ports for an Aggregation Group
53
Shutting down an Aggregate Interface
54
Restoring the Default Settings for an Aggregate Interface
54
Configuring Load Sharing for Link Aggregation Groups
55
Configuring Load-Sharing Criteria for Link Aggregation Groups
55
Enabling Local-First Load Sharing for Link Aggregation
56
Enabling Link-Aggregation Traffic Redirection
57
Displaying and Maintaining Ethernet Link Aggregation
58
Ethernet Link Aggregation Configuration Examples
59
Layer 2 Static Aggregation Configuration Example
59
Layer 2 Dynamic Aggregation Configuration Example
61
Configuring Port Isolation
64
Assigning a Port to the Isolation Group
64
Displaying and Maintaining the Isolation Group
64
Port Isolation Configuration Example
65
Configuring Spanning Tree Protocols
66
Stp
66
STP Protocol Packets
66
Basic Concepts in STP
67
Calculation Process of the STP Algorithm
68
Rstp
73
Pvst
73
Mstp
73
STP, RSTP, and PVST Limitations
73
MSTP Features
73
MSTP Basic Concepts
74
How MSTP Works
78
Implementation of MSTP on Devices
78
Protocols and Standards
78
Spanning Tree Configuration Task List
79
Configuration Restrictions and Guidelines
79
STP Configuration Task List
79
RSTP Configuration Task List
80
PVST Configuration Task List
81
MSTP Configuration Task List
82
Setting the Spanning Tree Mode
83
Configuring an MST Region
84
Configuration Restrictions and Guidelines
84
Configuration Procedure
84
Configuring the Root Bridge or a Secondary Root Bridge
85
Configuration Restrictions and Guidelines
85
Configuring the Current Device as the Root Bridge of a Specific Spanning Tree
85
Configuring the Current Device as a Secondary Root Bridge of a Specific Spanning Tree
86
Configuring the Device Priority
86
Configuring the Maximum Hops of an MST Region
86
Configuring the Network Diameter of a Switched Network
87
Configuring Spanning Tree Timers
87
Configuration Restrictions and Guidelines
88
Configuration Procedure
88
Configuring the Timeout Factor
89
Configuring the Maximum Port Rate
89
Configuring Edge Ports
90
Configuration Restrictions and Guidelines
90
Configuration Procedure
90
Configuring Path Costs of Ports
90
Specifying a Standard for the Device to Use When It Calculates the Default Path Cost
91
Configuring Path Costs of Ports
92
Configuration Example
93
Configuring the Port Priority
93
Configuring the Port Link Type
94
Configuration Restrictions and Guidelines
94
Configuration Procedure
94
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
94
Enabling Outputting Port State Transition Information
95
Enabling the Spanning Tree Feature
96
Configuration Restrictions and Guidelines
96
Enabling the Spanning Tree Feature (in STP/RSTP/MSTP Mode)
96
Enabling the Spanning Tree Feature (in PVST Mode)
96
Performing Mcheck
97
Performing Mcheck Globally
97
Performing Mcheck in Interface View
97
Configuring Digest Snooping
98
Configuration Restrictions and Guidelines
98
Configuration Procedure
98
Digest Snooping Configuration Example
99
Configuring no Agreement Check
100
Configuration Prerequisites
101
Configuration Procedure
101
No Agreement Check Configuration Example
102
Configuring TC Snooping
102
Configuration Restrictions and Guidelines
103
Configuration Procedure
103
Configuring Protection Functions
103
Configuration Prerequisites
103
Enabling BPDU Guard
103
Enabling Root Guard
104
Enabling Loop Guard
105
Enabling TC-BPDU Guard
106
Enabling BPDU Drop
106
Displaying and Maintaining the Spanning Tree
107
Spanning Tree Configuration Examples
107
MSTP Configuration Example
107
PVST Configuration Example
111
Configuring BPDU Tunneling
115
Overview
115
Background
115
BPDU Tunneling Implementation
116
Enabling BPDU Tunneling
117
Configuration Prerequisites
117
Configuration Restrictions and Guidelines
118
Configuration Procedure
118
Configuring Destination Multicast MAC Address for Bpdus
118
BPDU Tunneling Configuration Examples
119
BPDU Tunneling for STP Configuration Example
119
BPDU Tunneling for PVST Configuration Example
120
Configuring Vlans
122
Overview
122
VLAN Fundamentals
122
VLAN Types
123
Protocols and Standards
124
Configuring Basic VLAN Settings
124
Configuration Restrictions and Guidelines
124
Configuration Procedure
124
Configuring Basic Settings of a VLAN Interface
125
Configuration Procedure
125
VLAN Interface Configuration Example
125
Configuring Port-Based Vlans
127
Introduction to Port-Based VLAN
127
Assigning an Access Port to a VLAN
128
Assigning a Trunk Port to a VLAN
129
Assigning a Hybrid Port to a VLAN
130
Port-Based VLAN Configuration Example
131
Configuring MAC-Based Vlans
133
Introduction to MAC-Based VLAN
133
Configuration Restrictions and Guidelines
135
Configuration Procedure
135
MAC-Based VLAN Configuration Example
138
Configuring Protocol-Based Vlans
140
Introduction to Protocol-Based VLAN
140
Configuration Restrictions and Guidelines
140
Configuration Procedure
141
Protocol-Based VLAN Configuration Example
142
Configuring IP Subnet-Based Vlans
144
Configuration Procedure
144
IP Subnet-Based VLAN Configuration Example
145
Displaying and Maintaining VLAN
147
Configuring an Isolate-User-VLAN
149
Overview
149
Configuration Restrictions and Guidelines
150
Configuration Procedure
150
Displaying and Maintaining Isolate-User-VLAN
151
Isolate-User-VLAN Configuration Example
152
Network Requirements
152
Configuration Procedure
152
Verifying the Configuration
153
Configuring a Voice VLAN
155
Overview
155
Methods of Identifying IP Phones
155
OUI Addresses
155
Automatically Identifying IP Phones through LLDP
156
Configuring a Device to Advertise Voice VLAN Information to IP Phones
156
How a Device Advertises Voice VLAN Information
156
How a Device Obtains Voice VLAN Information
156
IP Phone Access Methods
157
Connecting the Host and the IP Phone in Series
157
Connecting the IP Phone to the Device Separately
157
Configuring a Voice VLAN on a Port
157
Voice VLAN Assignment Modes
157
Security Mode and Normal Mode of Voice Vlans
159
Configuration Prerequisites
160
Configuring Qos Priority Settings for Voice Traffic on an Interface
160
Configuring a Port to Operate in Automatic Voice VLAN Assignment Mode
161
Configuring a Port to Operate in Manual Voice VLAN Assignment Mode
162
Enabling LLDP to Automatically Discover IP Phones
163
Configuration Prerequisites
163
Configuration Procedure
164
Configuring LLDP to Advertise a Specific Voice VLAN
164
Configuration Guidelines
164
Configuration Procedure
165
Dynamically Advertising Server-Assigned Vlans through LLDP
166
Overview
166
Example for Using 802.1X to Authenticate IP Phones
166
Displaying and Maintaining Voice VLAN
166
Voice VLAN Configuration Examples
167
Automatic Voice VLAN Mode Configuration Example
167
Manual Voice VLAN Assignment Mode Configuration Example
169
Configuring GVRP
171
Overview
171
Garp
171
Gvrp
174
Protocols and Standards
174
GVRP Configuration Task List
174
Configuring GVRP Functions
175
Configuration Restrictions and Guidelines
175
Configuration Procedure
175
Configuring the GARP Timers
176
Displaying and Maintaining GVRP
177
GVRP Configuration Examples
177
GVRP Normal Registration Mode Configuration Example
177
GVRP Fixed Registration Mode Configuration Example
179
GVRP Forbidden Registration Mode Configuration Example
180
Configuring Qinq
183
Overview
183
Background and Benefits
183
How Qinq Works
183
Qinq Frame Structure
184
Implementations of Qinq
185
Modifying the TPID in a VLAN Tag
185
Protocols and Standards
186
Qinq Configuration Task List
186
Configuring Basic Qinq
187
Enabling Basic Qinq
187
Configuring VLAN Transparent Transmission
187
Configuring Selective Qinq
188
Configuring an Outer VLAN Tagging Policy
188
Configuring an Inner-Outer VLAN 802.1P Priority Mapping
189
Configuring the TPID Value in VLAN Tags
190
Qinq Configuration Examples
190
Basic Qinq Configuration Example
190
Selective Qinq Configuration Example
193
Configuring LLDP
196
Overview
196
Background
196
Basic Concepts
196
How LLDP Works
200
Protocols and Standards
201
LLDP Configuration Task List
201
Performing Basic LLDP Configuration
201
Enabling LLDP
201
Setting the LLDP Operating Mode
202
Setting the LLDP Re-Initialization Delay
202
Enabling LLDP Polling
202
Configuring the Advertisable Tlvs
203
Configuring the Management Address and Its Encoding Format
203
Setting Other LLDP Parameters
204
Setting an Encapsulation Format for Lldpdus
205
Configuring CDP Compatibility
205
Configuration Prerequisites
206
Configuration Procedure
206
Configuring LLDP Trapping
207
Displaying and Maintaining LLDP
208
LLDP Configuration Examples
208
Basic LLDP Configuration Example
208
Verify the Configuration
209
CDP-Compatible LLDP Configuration Example
211
Configuring MVRP
213
Overview
213
Introduction to MRP
213
MVRP Registration Modes
215
Protocols and Standards
216
MVRP Configuration Task List
216
Configuration Prerequisites
216
Enabling MVRP
216
Configuration Restrictions and Guidelines
216
Configuration Procedure
217
Configuring the MVRP Registration Mode
217
Configuring MRP Timers
218
Enabling GVRP Compatibility
219
Configuration Restrictions and Guidelines
219
Configuration Procedure
219
Displaying and Maintaining MVRP
219
Configuration Example for MVRP in Normal Registration Mode
220
Network Requirements
220
Configuration Procedure
221
Support and Other Resources
230
Contacting HP
230
Subscription Service
230
Related Information
230
Documents
230
Websites
230
Conventions
231
Index
233
HP 5120 EI Series Installation Manual (92 pages)
Brand:
HP
| Category:
Switch
| Size: 3.94 MB
Table of Contents
Table of Contents
3
Product Overview
6
5120-24G EI (2 Slots)/5120-24G EI TAA (2 Slots) Panel Views
7
5120-48G EI (2 Slots)/5120-48G EI TAA (2 Slots) Panel Views
8
5120-24G EI Panel Views
9
5120-48G EI Panel Views
10
5120-24G-Poe+ EI (2 Slots)/5120-24G-Poe+ EI TAA (2 Slots) Panel Views
11
5120-48G-Poe+ EI (2 Slots)/5120-48G-Poe+ EI TAA (2 Slots) Panel Views
12
5120-8G si Panel Views
13
5120-24G si Panel Views
14
5120-8G-Ppoe+ si Panel Views
15
5120-8G-Poe+ si Panel Views
15
5120-24G-Ppoe+ si Panel Views
16
5120-24G-Poe+ si Panel Views
17
Preparing for Installation
18
Safety Recommendations
18
Examining the Installation Site
18
Temperature/Humidity
18
Cleanness
19
Emi
19
Laser Safety
19
Installation Tools
20
Installing the Switch
21
Installing a 5120 EI Switch in a 19-Inch Rack
22
Mounting Brackets
22
Rack-Mounting by Using Only Front Mounting Brackets
23
Rack-Mounting by Using Front Mounting Brackets and a Rack Shelf
25
Rack-Mounting by Using Front and Rear Mounting Brackets
26
Installing a 5120 si Switch in a 19-Inch Rack
29
Mounting Brackets and Mounting Positions
30
Attaching the Mounting Brackets to the Switch Chassis
30
Rack-Mounting the Switch
33
Mounting the Switch on a Workbench
35
Mounting the Switch to a Wall
35
Introduction to Wall Anchor Kit
36
Installation Procedure
36
Mounting the Switch through Magnet Mounting
37
Introduction to Magnetic Mounting Kit
37
Installation Procedure
38
Grounding the Switch
39
Grounding the Switch with a Grounding Strip
39
Grounding the Switch with a Grounding Conductor Buried in the Earth Ground
41
Grounding the Switch by Using the AC Power Cord
42
Connecting the Power Cord
43
Connecting the AC Power Cord
43
Connecting the Switch to a +12 VDC Output RPS
44
Connecting the Switch to a -52 to -55 VDC Output RPS
45
Installing/Removing an Interface Card (Only for the 5120 EI Switches)
46
Installing an Interface Card
46
Removing an Interface Card
47
Installing/Removing a Dedicated CX4/SFP+ Cable
47
Verifying the Installation
48
Accessing the Switch for the First Time
49
Setting up the Configuration Environment
49
Connecting the Console Cable
49
Console Cable
49
Connection Procedure
49
Setting Terminal Parameters
50
Powering on the Switch
53
Verification before Power-On
53
Changing the Startup Mode
55
Setting up an IRF Fabric
58
IRF Fabric Setup Flowchart
58
Planning IRF Fabric Setup
59
Planning IRF Fabric Size and the Installation Site
59
Identifying the Master Switch and Planning IRF Member Ids
59
Planning IRF Topology and Connections
60
Identifying Physical IRF Ports on the Member Switches
61
Planning the Cabling Scheme
62
Configuring Basic IRF Settings
64
Connecting the Physical IRF Ports
65
Accessing the IRF Fabric to Verify the Configuration
65
Maintenance and Troubleshooting
66
Password Loss
66
Console Login Password Loss
66
Boot ROM Password Loss
66
Power Supply Failure
66
Fan Failure (Only for the 5120 EI Switches)
68
Configuration Terminal Problems
68
Appendix A Technical Specifications
69
Physical Specifications
69
Chassis Dimensions and Weights
69
Ports and Interface Card Slots
69
Environmental Specifications
70
Power Specifications
70
Power Input Types
70
AC Input Voltage Specifications
71
RPS DC Input Voltage Specifications and RPS Compatibility
71
Power Consumption Specifications for Non-Poe Switches
71
Power Consumption Specifications for Poe Switches
72
Cooling System
72
Appendix B Frus and Compatibility Matrixes
74
Interface Cards (Only for the 5120 EI Switches)
74
SFP/SFP+/XFP Transceiver Modules and SFP+/CX4 Cables (Only for the 5120 EI Switches)
74
GE SFP Transceiver Modules
75
SFP+ Cables
76
10-GE XFP Transceiver Modules
77
CX4 Cables
77
SFP Transceiver Modules and SFP Stacking Kit (Only for the 5120 si Switches)
78
Appendix C Ports and Leds
80
Ports
80
Console Port
80
10/100/1000Base-T Ethernet Port
80
SFP Port
80
Combo Interface (Only Available on the 5120 EI Switches)
81
Leds (for the 5120 EI Switches)
81
System Status LED
81
RPS Status LED
82
Port Mode LED
82
Seven-Segment LED
82
10/100/1000Base-T Ethernet Port LED
84
SFP Port LED
84
Interface Card Status LED
85
Leds (for the 5120 si Switches)
85
Power LED
85
RPS Status LED
86
Port Mode LED
86
10/100/1000Base-T Ethernet Port LED
86
1000Base-X SFP Port LED
88
Support and Other Resources
89
Contacting HP
89
Subscription Service
89
Related Information
89
Documents
89
Websites
89
Conventions
90
Index
92
Advertisement
HP 5120 EI Series Specification (51 pages)
Gigabit Ethernet switches
Brand:
HP
| Category:
Switch
| Size: 1.55 MB
Table of Contents
Key Features
3
Product Overview
3
Features and Benefits
3
Technical Specifications
21
HP 5120 EI Series Datasheet (17 pages)
Brand:
HP
| Category:
Switch
| Size: 0.45 MB
Table of Contents
Product Overview
1
Features and Benefits
2
Additional Information
6
Specifications
7
Physical Characteristics
10
Standards and Protocols
14
General Protocols
14
Network Management
14
Advertisement
Related Products
HP 5120 SI Series
HP 5120-48G EI TAA
HP 5120-24G
HP 5120-24G-PoE+ EI
HP 5120-48G-PoE+ EI
HP 5120-24G EI TAA
HP 5120-24G SI
HP 5120-16G SI
HP 5120-24G-PoE+ 370W SI
HP 5120-24G-PoE+ 170W SI
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL