HP V1910 User Manual

HP V1910 User Manual

V1910 switch series
Hide thumbs Also See for V1910:
Table of Contents

Advertisement

HP V1910 Switch Series

User Guide

*5998-2238*
Part number: 5998-2238
Document version: 2
1

Advertisement

Table of Contents
loading

Summary of Contents for HP V1910

  • Page 1: User Guide

    HP V1910 Switch Series User Guide *5998-2238* Part number: 5998-2238 Document version: 2...
  • Page 2 The HP V1910 Switch Series User Guide describes the software features for the HP 1910 switches and guides you through the software configuration procedures. It also provides configuration examples to help you apply software features to different network scenarios. This documentation set is intended for: Network planners ...
  • Page 3: Table Of Contents

    Contents Overview ······································································································································································ 1   Configuration through the web interface ··················································································································· 2   Web-based network management operating environment ····························································································· 2   Logging in to the web interface ·········································································································································· 2   Default login information ·············································································································································· 2   Example ·········································································································································································· 3   Logging out of the web interface ·······································································································································...
  • Page 4 Summary ····································································································································································· 43   Displaying device summary ············································································································································· 43   Displaying system information ··································································································································· 43   Displaying device information ··································································································································· 44   Device basic information configuration ···················································································································· 46   Configuring device basic information ···························································································································· 46   Configuring system name ·········································································································································· 46  ...
  • Page 5 User management ······················································································································································ 82   Overview ··········································································································································································· 82   Managing users ································································································································································ 82   Adding a local user ···················································································································································· 82   Setting the super password ········································································································································ 83   Switching to the management level ·························································································································· 84   Loopback test configuration ······································································································································ 85  ...
  • Page 6 Configuring SNMP trap function ····························································································································· 125   SNMP configuration example ······································································································································· 127   Interface statistics ···················································································································································· 133   Overview ········································································································································································· 133   Displaying interface statistics ········································································································································· 133   VLAN configuration ················································································································································ 135   Introduction to VLAN ················································································································································ 135   VLAN fundamentals ·················································································································································· 135  ...
  • Page 7 MSTP basic concepts ················································································································································ 185   How MSTP works ······················································································································································ 189   Implementation of MSTP on devices ······················································································································· 189   Protocols and standards ··········································································································································· 190   Configuring MSTP ··························································································································································· 190   Configuration task list ··············································································································································· 190   Configuring an MST region ····································································································································· 190  ...
  • Page 8 Enabling IGMP snooping globally ·························································································································· 255   Configuring IGMP snooping in a VLAN ················································································································ 256   Configuring IGMP snooping port functions ··········································································································· 257   Display IGMP snooping multicast entry information ····························································································· 258   IGMP snooping configuration example························································································································ 259   Routing configuration ·············································································································································· 266  ...
  • Page 9 EAP relay ··································································································································································· 325   EAP termination ························································································································································· 327   802.1X configuration ············································································································································· 328   HP implementation of 802.1X ······································································································································· 328   Access control methods ············································································································································ 328   Using 802.1X authentication with other features ·································································································· 328   Configuring 802.1X ······················································································································································· 329  ...
  • Page 10 Domain-based user management ···························································································································· 352   Configuring AAA ···························································································································································· 352   Configuration prerequisites······································································································································ 352   Configuration task list ··············································································································································· 352   Configuring an ISP domain ····································································································································· 353   Configuring authentication methods for the ISP domain ······················································································ 354   Configuring authorization methods for the ISP domain ························································································ 355  ...
  • Page 11 Authorized IP configuration ···································································································································· 406   Overview ········································································································································································· 406   Configuring authorized IP ·············································································································································· 406   Authorized IP configuration example ··························································································································· 407   Authorized IP configuration example ····················································································································· 407   ACL configuration ··················································································································································· 410   ACL overview ·································································································································································· 410   Introduction to IPv4 ACL ···········································································································································...
  • Page 12 Displaying information about PSE and PoE ports·································································································· 462   PoE configuration example ············································································································································ 462   Support and other resources ·································································································································· 465   Contacting HP ································································································································································· 465   Related information ························································································································································· 465   Conventions ····································································································································································· 465   Subscription service ························································································································································ 466  ...
  • Page 13: Overview

    Overview The HP V1910 Switch Series can be configured through the command line interface (CLI), web interface, and SNMP/MIB. These configuration methods are suitable for different application scenarios.  The web interface supports all V1910 Switch Series configurations.  The CLI provides some configuration commands to facilitate your operation. To perform other...
  • Page 14: Configuration Through The Web Interface

    Configuration through the web interface Web-based network management operating environment HP provides the web-based network management function to facilitate the operations and maintenance on HP’s network devices. Through this function, the administrator can visually manage and maintain network devices through the web-based configuration interfaces.
  • Page 15: Example

    Table 2 A DHCP server exists in the subnet where the device resides If a DHCP server exists in the subnet where the device resides, the device will dynamically obtain its default IP address through the DHCP server. You can log in to the device through the console port, and execute the summary command to view the information of its default IP address.
  • Page 16: Logging Out Of The Web Interface

    CAUTION: The PC where you configure the device is not necessarily a web-based network management terminal.  A web-based network management terminal is a PC used to log in to the web interface and is required to be reachable to the device. After logging in to the web interface, you can select Device ...
  • Page 17: Web User Level

    CAUTION: The web network management functions not supported by the device are not displayed in the navigation tree. Web user level Web user levels, from low to high, are visitor, monitor, configure, and management. A user with a higher level has all the operating rights of a user with a lower level. ...
  • Page 18 Function menu Description User level Software Allows you to configure to upload upgrade file Management Upgrade from local host, and upgrade the system software. Device Reboot Allows you to configure to reboot the device. Management Maintenan Electronic Label Displays the electronic label of the device. Monitor Diagnostic Generates diagnostic information file, and allows...
  • Page 19 Function menu Description User level Allows you to modify FTP or Telnet user Modify Management information. Remove Allows you to remove an FTP or a Telnet user. Management Switch To Allows you to switch the current user level to the Visitor Management management level.
  • Page 20 Function menu Description User level Displays the status of the SNMP trap function and Monitor information about target hosts. Trap Allows you to enable or disable the SNMP trap Configure function, or create, modify and delete a target host. Displays SNMP view information. Monitor View Allows you to create, modify and delete an SNMP...
  • Page 21 Function menu Description User level Allows you to modify MST regions. Configure Global Allows you to set global MSTP parameters. Configure Port Summary Displays the MSTP information of ports. Monitor Port Setup Allows you to set MSTP parameters on ports. Configure Displays information about link aggregation Summary...
  • Page 22 Function menu Description User level Allows you to enable/disable DHCP, configure advanced DHCP relay agent settings, configure a Configure DHCP server group, and enable/disable the DHCP relay agent on an interface. Displays the status, trusted and untrusted ports and Monitor DHCP client information of DHCP snooping.
  • Page 23 Function menu Description User level Allows you to specify accounting methods for an Management ISP domain. Displays and allows you to configure RADIUS RADIUS Server Management server information. RADIUS Displays and allows you to configure RADIUS RADIUS Setup Management parameters. Displays configuration information about local Monitor users.
  • Page 24 Function menu Description User level Link Setup Allows you to create a rule for a link layer ACL. Configure Remove Allows you to delete an IPv4 ACL or its rules. Configure Summary Displays the queue information of a port. Monitor Queue Setup Allows you to configure a queue on a port.
  • Page 25: Part Number

    Introduction to the common items on the web pages Buttons and icons Commonly used buttons and icons Button and icon Function Used to apply the configuration on the current page. Used to cancel the configuration on the current page, and return to the corresponding list page or the Device Info page.
  • Page 26 Content display by pages Search function On some list pages, the web interface provides basic and advanced search functions. You can use the search function to display those entries matching certain search criteria.  Basic search function—Select a search item from the drop-down list as shown in a, input the keyword, and click the Query button to display the entries that match the criteria.
  • Page 27: Configuration Guidelines

    Sort display (based on MAC address in the ascending order) Configuration guidelines The web console supports Microsoft Internet Explorer 6.0 SP2 and higher.  The web console does not support the Back, Next, Refresh buttons provided by the browser. Using ...
  • Page 28: Configuration At The Cli

    Configuration at the CLI NOTE: The HP V1910 Switch Series can be configured through the CLI, web interface, and SNMP/MIB,  among which the web interface supports all V1910 Switch Series configurations. These configuration methods are suitable for different application scenarios. As a supplementary to the web interface, the CLI provides some configuration commands to facilitate your operation, which are described in this chapter.
  • Page 29: Setting Terminal Parameters

    Network diagram for configuration environment setup CAUTION: Verify the mark on the console port to ensure that you are connecting to the correct port. NOTE: The serial port on a PC does not support hot swapping. When you connect a PC to a powered-on switch, connect the DB-9 connector of the console cable to the PC before connecting the RJ-45 connector to the switch.
  • Page 30 Connection description of the HyperTerminal Table 6 Select the serial port to be used from the Connect using drop-down list, and click OK. Set the serial port used by the HyperTerminal connection Table 7 Set Bits per second to 38400, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, and click OK.
  • Page 31 Set the serial port parameters Table 8 Select File  Properties in the HyperTerminal window. HyperTerminal window...
  • Page 32: Logging In To The Cli

    Enter your username at the Username prompt. Username:admin Table 12 Press Enter. The Password prompt display Password: The login information is verified, and displays the following CLI menu: <HP V1910 Switch> If the password is invalid, the following message appears and process restarts. % Login failed!
  • Page 33: Cli Commands

    CLI commands This Command section contains the following commands: To do… Use the command… Display a list of CLI commands on the device Reboot the device and run the default configuration initialize ipsetup { dhcp | ip address ip-address { mask Specify VLAN-interface 1 to obtain an IP address through | mask-length } [ default-gateway DHCP or manual configuration...
  • Page 34: Password

    Parameters dhcp: Specifies the interface to obtain an IP address through DHCP. ip-address ip-address: Specifies an IP address for VLAN-interface 1 in dotted decimal notation. mask: Subnet mask in dotted decimal notation. mask-length: Subnet mask length, the number of consecutive ones in the mask, in the range of 0 to 32. default-gateway ip-address: Specifies the IP address of the default gateway or the IP address of the outbound interface.
  • Page 35: Ping

    ping Syntax ping host Parameters host: Destination IP address (in dotted decimal notation), URL, or host name (a string of 1 to 20 characters). Description Use the ping command to ping a specified destination. You can enter Ctrl+C to terminate a ping operation. Examples # Ping IP address 1.1.2.2.
  • Page 36: Reboot

    * no decompiling or reverse-engineering shall be allowed. ****************************************************************************** User interface aux0 is available. Please press ENTER. reboot Syntax reboot Parameters None Description Use the reboot command to reboot the device and run the main configuration file. Use this command with caution because reboot results in service interruption. If the main configuration file is corrupted or does not exist, the device cannot be rebooted with the reboot command.
  • Page 37: Upgrade

    Next backup boot app is: NULL HP Comware Platform Software Comware Software, Version 5.20 Alpha 1108, Copyright (c) 2004-2011 Hewlett-Packard Development Company, L.P. HP V1910-24G-PoE (365W) Switch uptime is 0 week, 0 day, 6 hours, 28 minutes HP V1910-24G-PoE (365W) Switch 128M bytes DRAM...
  • Page 38: Configuration Example For Upgrading The System Software Image At The Cli

    CLI Network requirements As shown in a, a V1910 switch is connected to the PC through the console cable, and connected to the gateway through GigabitEthernet 1/0/1. The IP address of the gateway is 192.168.1.1/24, and the TFTP server where the system software image (SwitchV1910.bin) is located is 192.168.10.1/24.
  • Page 39 # Configure the IP address of VLAN-interface 1 of the switch as 192.168.1.2/24, and specify the default gateway as 192.168.1.1. <Switch> ipsetup ip-address 192.168.1.2 24 default-gateway 192.168.1.1 # Download the software package file SwitchV1910.bin from the TFTP server to the switch, and upgrade the system software image in the package.
  • Page 40: Configuration Wizard

    Configuration wizard Overview The configuration wizard guides you through the basic service setup, including the system name, system location, contact information, and management IP address (IP address of the VLAN interface). Basic service setup Entering the configuration wizard homepage From the navigation tree, select Wizard to enter the configuration wizard homepage, as shown in a. Configuration wizard homepage Configuring system parameters In the wizard homepage, click Next to enter the system parameter configuration page, as shown in a.
  • Page 41: Configuring Management Ip Address

    System parameter configuration page System parameter configuration items Item Description Specify the system name. The system name appears at the top of the navigation tree. Sysname You can also set the system name in the System Name page you enter by selecting Device ...
  • Page 42 A management IP address is the IP address of a VLAN interface, which can be used to access the device. You can also set configure a VLAN interface and its IP address in the page you enter by selecting Network ...
  • Page 43: Finishing Configuration Wizard

    Item Description DHCP. BOOTP  BOOTP: Specifies the VLAN interface to obtain an IPv4 address through BOOTP.  Manual: Allows you to specify an IPv4 address and a mask length. Manual IMPORTANT: Support for IPv4 obtaining methods depends on the device model. IPv4 Specify an IPv4 address and the mask length for the VLAN interface.
  • Page 44: Irf Stack Management

    IRF stack management The HP V1910 IRF stack management feature enables you to configure and monitor a stack of connected HP V1910 switches by logging in to one switch in the stack, as shown in a. IMPORTANT: The HP V1910 IRF stack management feature does not provide the functions of HP Intelligent Resilient Framework (IRF) technology.
  • Page 45: Configuring Global Parameters Of A Stack

    Task Remarks Required Configuring stack Configure the ports of the master switch that connect to member ports switches as stack ports. By default, a port is not a stack port. Required Configuring member Configuring stack Configure a port of a member switch that connects to the master switch switches of a ports or another member switch as a stack port.
  • Page 46 Setup Configuration items of global parameters Item Description Configure a private IP address pool for the stack. The master switch of a stack must be configured with a private IP address pool to Private Net IP ensure that it can automatically allocate an available IP address to a member switch when the device joints the stack.
  • Page 47: Configuring Stack Ports

    Item Description Enable the switch to establish a stack. After you enable the switch to establish a stack, the switch becomes the master switch of the stack and automatically adds the switches connected to its stack ports to the stack. Build Stack IMPORTANT: You can delete a stack only on the master switch of the stack.
  • Page 48: Displaying Device Summary Of A Stack

    Displaying device summary of a stack Select IRF from the navigation tree and click the Device Summary tab to enter the page shown in a. On this page, you can view interfaces and power socket layout on the panel of each stack member by clicking the tab of the corresponding member switch.
  • Page 49 Create a stack, where Switch A is the master switch, Switch B, Switch C, and Switch D are stack  members. An administrator can log in to Switch B, Switch C and Switch D through Switch A to perform remote configurations. Network diagram for stack management Switch A (Master switch)
  • Page 50 Configure global parameters for the stack on Switch A Type 192.168.1.1 in the text box of Private Net IP.  Type 255.255.255.0 in the text box of Mask.   Select Enable from the Build Stack drop-down list.  Click Apply. Now, switch A becomes the master switch.
  • Page 51 # Configure a stack port on Switch A. On the page of the Setup tab, perform the following configurations, as shown in c.  Configure a stack port on Switch A In the Port Settings area, select the check box before GigabitEthernet1/0/1. ...
  • Page 52 # On Switch B, configure local ports GigabitEthernet 1/0/2 connecting with switch A, GigabitEthernet 1/0/1 connecting with Switch C, and GigabitEthernet 1/0/3 connecting with Switch D as stack ports.  Select IRF from the navigation tree of Switch B to enter the page of the Setup tab. Configure stack ports on Switch B In the Port Settings area, select the check boxes before GigabitEthernet1/0/1, GigabitEthernet1/0/2, ...
  • Page 53 Now, switch B becomes a member switch. # On Switch C, configure local port GigabitEthernet 1/0/1 connecting with Switch B as a stack port. Select IRF from the navigation tree of Switch C to enter the page of the Setup tabe. ...
  • Page 54: Configuration Guidelines

    Now, Switch C becomes a member switch. # On Switch D, configure local port GigabitEthernet 1/0/1 connecting with Switch B as a stack port. Select IRF from the navigation tree of Switch D to enter the page of the Setup tab. ...
  • Page 55: Summary

    Summary The device summary module helps you understand the system information, port information, power information, and fan information on the device. The system information includes the basic system information, system resources state, and recent system operation logs. Displaying device summary Displaying system information After you log in to the web interface, the System Information tab appears by default, as shown in a.
  • Page 56: Displaying Device Information

    Basic system information The INFO area on the right of the page displays the basic system information such as device name, product information, device location, contact information, serial number, software version, hardware version, Boot ROM version, and running time. The running time displays how long the device is up since the last boot. You can configure the device location and contact information on the Setup page you enter by selecting Device ...
  • Page 57 Device information  If you select a certain time period from the Refresh Period drop-down list, the system refreshes the information at the specified interval. If you select Manual from the Refresh Period drop-down list, the system refreshes the information only ...
  • Page 58: Device Basic Information Configuration

    Device basic information configuration The device basic information feature provides the following functions: Set the system name of the device. The configured system name is displayed on the top of the  navigation bar.  Set the idle timeout period for logged-in users. The system logs an idle user off the web for security purpose after the configured period.
  • Page 59 Configure idle timeout period Idle timeout period configuration item Item Description Idle timeout Set the idle timeout period for logged-in users.
  • Page 60: System Time Configuration

    System time configuration The system time module allows you to display and set the device system time on the web interface. The device supports setting system time through manual configuration and automatic synchronization of NTP server time. An administrator can keep time synchronized among all the devices within a network by changing the system clock on each device, however, this is a huge amount of workload and cannot guarantee the clock precision.
  • Page 61: System Time Configuration Example

    System time configuration items Item Description Select to manually configure the system time, including the setting Manual of Year, Month, Day, Hour, Minute, and Second. Set the source interface for an NTP message. If you do not want the IP address of a certain interface on the local device to become the destination address of response messages, Source Interface you can specify the source interface for NTP messages, so that the...
  • Page 62 Configuration procedure Table 20 Configure Device A # Configure the local clock as the reference clock, with the stratum of 2. Enable NTP authentication, set the key ID to 24, and specify the created authentication key aNiceKey as a trusted key. (Configuration omitted.) Table 21 Configure Switch B # Configure Device A as the NTP server of Switch B.
  • Page 63: Configuration Guidelines

    Configuration guidelines When configuring system time, note the following guidelines: A device can act as a server to synchronize the clock of other devices only after its clock has been  synchronized. If the clock of a server has a stratum level higher than or equal to that of a client’s clock, the client does not synchronize its clock to the server’s.
  • Page 64: Log Management Configuration

    Log management configuration System logs contain a large amount of network and device information, including running status and configuration changes. System logs are an important way for administrators to know network and device status. With system log information, administrators can take corresponding actions against network problems and security problems.
  • Page 65: Displaying Syslog

    Set system logs related parameters Syslog configuration items Item Description Buffer Capacity Set the number of logs that can be stored in the log buffer. Set the refresh period on the log information displayed on the web interface. You can select manual refresh or automatic refresh: ...
  • Page 66 Display syslog Syslog display items Item Description Time/Date Displays the time/date when system logs are generated. Source Displays the module that generates system logs. Displays the severity level of system logs. For more information about severity levels, Level see 3. Digest Displays the brief description of system logs.
  • Page 67: Setting Loghost

    Setting loghost Select Device  Syslog from the navigation tree, and click the Loghost tab to enter the loghost configuration page, as shown in a. Set loghost Loghost configuration item Item Description IP address of the loghost.  Loghost IP You can specify up to four loghosts.
  • Page 68: Configuration Management

    Configuration management Back up configuration Configuration backup provides the following functions: Open and view the configuration file (.cfg file or .xml file) for the next startup  Back up the configuration file (.cfg file or .xml file) for the next startup to the host of the current user ...
  • Page 69: Save Configuration

    Configuration restore page When you click the upper Browse button in this figure, the file upload dialog box appears. Select the  .cfg file to be uploaded, and then click OK. When you click the lower Browse button in this figure, the file upload dialog box appears. Select the ...
  • Page 70: Initialize

    Initialize This operation restores the system to factory defaults, deletes the current configuration file, and reboots the device. Select Device  Configuration from the navigation tree, and then click the Initialize tab to enter the initialize confirmation page as shown in a. Initialize confirmation dialog box Click the Restore Factory-Default Settings button to restore the system to factory defaults.
  • Page 71: Device Maintenance

    Device maintenance Software upgrade A system software image file is used to boot the device. Software upgrade allows you to obtain a target system software image file from the local host and set the file as the startup configuration file. In addition, you can select whether to reboot the device to bring the upgraded system software image file into effect.
  • Page 72: Device Reboot

    Item Description Specifies the type of the startup configuration file:  File Type Main  Backup Specifies whether to overwrite the file with the same name. If a file with same name If you do not select the option, when a file with the same name exists, a dialog box already exists, overwrite appears, telling you that the file already exists and you cannot continue the it without prompt.
  • Page 73: Electronic Label

    Electronic label Electronic label allows you to view information about the device electronic label, which is also known as the permanent configuration data or archive information. The information is written into the storage medium of a device or a card during the debugging and testing processes, and includes the card name, product bar code, MAC address, debugging and testing date(s), manufacture name, and so on.
  • Page 74 The diagnostic information file is created Click Click to Download, and the File Download dialog box appears. You can select to open this file or save this file to the local host. NOTE: The generation of the diagnostic file takes some time. During this process, do not perform any ...
  • Page 75: File Management

    File management The device saves files such as host software and configuration file into the storage device, and provides the file management function for users to manage those files conveniently and effectively. File management function provides the following operations: Displaying file list ...
  • Page 76: Downloading A File

    Browse. Click Apply to upload the file to the specified storage device. CAUTION: Uploading a file takes some time. HP recommends you not to perform any operation on the web interface during the upgrading procedure. Removing a file Select Device ...
  • Page 77: Port Management Configuration

    Port management configuration You can use the port management feature to set and view the operation parameters of a Layer 2 Ethernet port, including but not limited to its state, rate, duplex mode, link type, PVID, MDI mode, flow control settings, MAC learning limit, and storm suppression ratios.
  • Page 78 Port configuration items Item Description Enable or disable the port. Sometimes, after you modify the operation Port State parameters of a port, you need to disable and then enable the port to have the modifications take effect. Set the transmission rate of the port. Available options include: ...
  • Page 79 Therefore, you should configure the MDI mode depending on the cable types.  HP does not recommend you to use the auto mode. The other two modes are used only when the device cannot determine the cable type. ...
  • Page 80 Item Description Set broadcast suppression on the port. You can suppress broadcast traffic by percentage or by PPS as follows:  ratio: Sets the maximum percentage of broadcast traffic to the total bandwidth of an Ethernet port. When this option is selected, you need to input a percentage in the box below.
  • Page 81: Viewing The Operation Parameters Of A Port

    Item Description Port or ports that you have selected from the chassis front panel and the aggregate interface list below, for which you have set operation parameters. IMPORTANT: Selected Ports  Only in the presence of link aggregations groups, Aggregation ports will be displayed under the chassis front panel.
  • Page 82: Port Management Configuration Example

    Details Port management configuration example Network requirements As shown in a: Server A, Server B, and Server C are connected to GigabitEthernet 1/0/1, GigabitEthernet 1/0/2,  and GigabitEthernet 1/0/3 or the switch respectively. The rates of the network adapters of these servers are all 1000 Mbps.
  • Page 83 Configuration procedure # Set the rate of GigabitEthernet 1/0/4 to 1000 Mbps.  Select Device  Port Management from the navigation tree, click the Setup tab to enter the page shown in a, and make the following configurations: Configure the rate of GigabitEthernet 1/0/4 ...
  • Page 84 Batch configure port rate # Display the rate settings of ports. Click the Summary tab.  Select the Speed option to display the rate information of all ports on the lower part of the page, as  shown in c.
  • Page 85 Display the rate settings of ports...
  • Page 86: Port Mirroring Configuration

    Port mirroring configuration Introduction to port mirroring Port mirroring is the process of copying the packets passing through a port (called a mirroring port) to another port (called the monitor port) connected with a monitoring device for packet analysis. You can mirror inbound, outbound, or bidirectional traffic on a port as needed. Implementing port mirroring Port mirroring is implemented through local port mirroring groups.
  • Page 87: Configuring Local Port Mirroring

    Configuring local port mirroring Configuration task list Configuring local port mirroring To configure local port mirroring, you must create a local mirroring group and then specify the mirroring ports and monitor port for the group. Local port mirroring configuration task list Task Remarks Required...
  • Page 88: Configuring Ports For A Mirroring Group

    Create a mirroring group Configuration items of creating a mirroring group Item Description Mirroring Group ID ID of the mirroring group to be created Specify the type of the mirroring group to be created: Type  Local: Creates a local mirroring group. Return to Local port mirroring configuration task list.
  • Page 89 The Modify Port tab Configuration items of configuring ports for a mirroring group Item Description ID of the mirroring group to be configured Mirroring Group ID The available groups were created previously. Configure ports for a local mirroring group: Set the type of ...
  • Page 90: Configuration Examples

    Configuration examples Local port mirroring configuration example Network requirements Department 1 accesses Switch C through GigabitEthernet 1/0/1.  Department 2 accesses Switch C through GigabitEthernet 1/0/2.  Server is connected to GigabitEthernet 1/0/3 of Switch C.  Configure port mirroring to monitor the bidirectional traffic of Department 1 and Department 2 on the server.
  • Page 91 Create a local mirroring group Type in mirroring group ID 1.  Select Local in the Type drop-down list.  Click Apply.  # Configure the mirroring ports. Click Modify Port to enter the page for configuring the mirroring group ports, as shown in b.
  • Page 92 Configure the mirroring ports  Select 1 – Local in the Mirroring Group ID drop-down list.  Select Mirror Port in the Port Type drop-down list.  Select both in the Stream Orientation drop-down list. Select GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 on the chassis front panel. ...
  • Page 93: Configuration Guidelines

    Click Modify Port to enter the page for configuring the mirroring group ports, as shown in d. Configure the monitor port Select 1 – Local in the Mirroring Group ID drop-down list.  Select Monitor Port in the Port Type drop-down list. ...
  • Page 94: User Management

    User management Overview The switch provides the following user management functions: Add local user accounts for FTP and Telnet users, and specify the password, access level, and service  types for each user.  Set the super password for non-management level users to switch to the management level. ...
  • Page 95: Setting The Super Password

    Item Description Select an access level for the user. Users of different levels can perform different operations. User levels, in order from low to high, are visitor, monitor, configure, and management.  Visitor: Users of this level can only perform ping and traceroute operations. They can neither access data on the switch nor configure the switch.
  • Page 96: Switching To The Management Level

    Super password configuration items Item Description Select the operation type. Options include: Create/Remove  Create: Configure or modify the super password.  Remove: Remove the current super password. Password Set the password for non-management level users to switch to the management level. Input the same password again.
  • Page 97: Loopback Test Configuration

    Loopback test configuration Overview You can check whether an Ethernet port works normally by performing the Ethernet port loopback test, during which the port cannot forward data packets normally. Ethernet port loopback test can be an internal loopback test or an external loopback test. In an internal loopback test, self loop is established in the switching chip to check whether there is a ...
  • Page 98: Configuration Guidelines

    After selecting a testing type, you need to select a port on which you want to perform the loopback test from the chassis front panel. After that, click Test to start the loopback test, and you can see the test result in the Result box, as shown in Loopback test result Configuration guidelines Note the following when performing a loopback test:...
  • Page 99: Vct

    Overview NOTE: The fiber interface of a SFP port does not support this feature. A link in the up state goes down and then up automatically if you perform this operation on one of the Ethernet interfaces forming the link. You can use the Virtual Cable Test (VCT) function to check the status of the cable connected to an Ethernet port on the device.
  • Page 100 Description on the cable test result Item Description Status and length of the cable. The status of a cable can be normal, abnormal, abnormal(open), abnormal(short), or failure.  When a cable is normal, the cable length displayed is the total length of the cable. Cable status ...
  • Page 101: Flow Interval Configuration

    Flow interval configuration Overview With the flow interval module, you can view the number of packets and bytes sent/received by a port over the specified interval. Monitoring port traffic statistics Setting the traffic statistics generating interval Select Device  Flow interval from the navigation bar, and click the Interval Configuration tab to enter the page shown in a.
  • Page 102 Port traffic statistics...
  • Page 103: Storm Constrain Configuration

    Storm constrain configuration Overview The storm constrain function limits traffic of a port within a predefined upper threshold to suppress packet storms in an Ethernet. With this function enabled on a port, the system detects the amount of broadcast traffic, multicast traffic, and unicast traffic reaching the port periodically. When a type of traffic exceeds the threshold for it, the function, as configured, blocks or shuts down the port, and optionally, sends trap messages and logs.
  • Page 104: Configuring Storm Constrain

    The Storm Constrain tab NOTE: The traffic statistics generating interval set here is the interval used by the storm constrain function for measuring traffic against the traffic thresholds. It is different from the interval set in the flow interval module, which is used for measuring the average traffic sending and receiving rates over a specific interval.
  • Page 105 Add storm constrain settings for ports Port storm constrain configuration items Item Remarks Specify the action to be performed when a type of traffic exceeds the corresponding upper threshold. Available options include:  None—Performs no action.  Block—Blocks the traffic of this type on a port when the type of traffic exceeds the upper threshold.
  • Page 106 Item Remarks Select or clear the option to enable or disable the system to send trap messages both Trap when an upper threshold is crossed and when the corresponding lower threshold is crossed after that. Select or clear the option to enable or disable the system to output logs both when an upper threshold is crossed and when the corresponding lower threshold is crossed after that.
  • Page 107: Rmon Configuration

    MIB information alarm, event, history, and statistics, in most cases. The HP device adopts the second way and includes the RMON agent function. With the RMON agent function, the management device can obtain the traffic flow among the managed devices on each connected network segments and obtain information about error statistics and performance statistics for network management.
  • Page 108: Rmon Groups

    Among the RMON groups defined by RMON specifications (RFC 2819), the device uses the statistics group, history group, event group, and alarm group supported by the public MIB. In addition, HP defines and implements a private alarm group, which enhances the functions of the alarm group. This section describes the five kinds of groups.
  • Page 109: Configuring Rmon

    Rising and falling alarm events Event group The event group defines event indexes and controls the generation and notifications of the events triggered by the alarms defined in the alarm group and the private alarm group. The events can be handled in one of the following ways: Log—Logging event related information (the occurred events, contents of the event, and so on) in the ...
  • Page 110 RMON statistics group configuration task list Task Remarks Required You can create up to 100 statistics entries for a statistics table. After a statistics entry is created on an interface, the system collects statistics on various traffic information on the interface. It provides statistics about network Configuring a statistics collisions, CRC alignment errors, undersize/oversize packets, broadcasts, entry...
  • Page 111: Configuring A Statistics Entry

    RMON alarm configuration task list Task Remarks Optional You can create up to 60 event entries for an event table. An event entry defines event indexes and the actions the system will take, including log the event, send a trap to the NMS, take no action, and log the event and send Configuring an event a trap to the NMS.
  • Page 112: Configuring A History Entry

    Statistics entry Add a statistics entry Statistics entry configuration items Item Description Select the name of the interface on which the statistics entry is created. Interface Name Only one statistics entry can be created on one interface. Owner Set the owner of the statistics entry. Return to RMON statistics group configuration task list.
  • Page 113: Configuring An Event Entry

    History entry Add a history entry History entry configuration items Item Description Interface Name Select the name of the interface on which the history entry is created. Set the capacity of the history record list corresponding to this history entry, namely, the maximum number of records that can be saved in the history record list.
  • Page 114: Configuring An Alarm Entry

    Event entry Add an event entry Event entry configuration items Item Description Description Set the description for the event. Owner Set the owner of the entry. Set the actions that the system will take when the event is triggered:  Log—The system will log the event.
  • Page 115 Alarm entry Add an alarm entry Alarm entry configuration items Item Description Set the traffic statistics that will be collected and monitored. For more information, Statics Item see 2. Alarm variable Set the name of the interface whose traffic statistics will be collected and Interface Name monitored.
  • Page 116: Displaying Rmon Statistics Information

    Item Description Interval Set the sampling interval. Set the sampling type, including: Sample  Absolute—Absolute sampling, namely, to obtain the value of the variable Item when the sampling time is reached. Sample Type  Delta—Delta sampling, namely, to obtain the variation value of the variable during the sampling interval when the sampling time is reached.
  • Page 117 RMON statistics information Fields of RMON statistics Item Description Total number of octets received by the interface, Number of Received Bytes corresponding to the MIB node etherStatsOctets. Total number of packets received by the interface, Number of Received Packets corresponding to the MIB node etherStatsPkts. Total number of broadcast packets received by the Number of Received Broadcasting Packets interface, corresponding to the MIB node...
  • Page 118: Displaying Rmon History Sampling Information

    Item Description Total number of packets with CRC errors received on the Number of Received Packets With CRC Check interface, corresponding to the MIB node Failed etherStatsCRCAlignErrors. Total number of undersize packets (shorter than 64 octets) Number of Received Packets Smaller Than 64 received by the interface, corresponding to the MIB node Bytes etherStatsUndersizePkts.
  • Page 119 RMON history sampling information Fields of RMON history sampling information Item Description Number of the entry in the system buffer Statistics are numbered chronologically when they are saved to the system buffer. Time Time at which the information is saved Dropped packets during the sampling period, corresponding to the MIB node DropEvents etherHistoryDropEvents.
  • Page 120: Displaying Rmon Event Logs

    Displaying RMON event logs Select Device  RMON from the navigation tree and click the Log tab to enter the page, as shown in a, which displays log information for all event entries. Return to Display RMON running status. RMON configuration example Network requirements As shown in a, Agent is connected to a remote NMS across the Internet.
  • Page 121 Add a statistics entry  Select GigabitEthernet1/0/1 from the Interface Name drop-down box.  Type user1-rmon in the text box of Owner. Click Apply.  # Display RMON statistics for interface Ethernet 1/0/1. Click the icon corresponding to GigabitEthernet 1/0/1. ...
  • Page 122 Display RMON statistics # Create an event to start logging after the event is triggered. Click the Event tab, click Add. ...
  • Page 123 Configure an event group  Type 1-rmon in the text box of Owner.  Select the check box before Log.  Click Apply. The page goes to the page displaying the event entry, and you can see that the entry index of the new ...
  • Page 124 Configure an alarm group Select Number of Received Bytes from the Statics Item drop-down box.  Select GigabitEthernet1/0/1 from the Interface Name drop-down box.  Type 10 in the text box of Interval.   Select Delta from the Simple Type drop-down box. ...
  • Page 125: Energy Saving Configuration

    Energy saving configuration Overview Energy saving allows you to configure a port to work at the lowest transmission speed, disable PoE, or go down during a specified time range on certain days of a week. The port resumes working normally when the effective time period ends.
  • Page 126 Item Description Set the port to transmit data at the lowest speed. IMPORTANT: Lowest Speed If you configure the lowest speed limit on a port that does not support 10 Mbps, the configuration cannot take effect. Shut down the port. IMPORTANT: Shutdown An energy saving policy can have all the three energy saving schemes configured, of...
  • Page 127: Snmp Configuration

    SNMP configuration The Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a management station to access and operate the devices on a network, regardless of their vendors, physical characteristics and interconnect technologies. SNMP enables network administrators to read and set the variables on managed devices to monitor their operating and health state, diagnose network problems, and collect statistics for management purposes.
  • Page 128: Snmp Protocol Version

    SNMP protocol version SNMP agents support three SNMP protocol versions: SNMPv1, SNMPv2c, and SNMPv3. SNMPv1 uses community names for authentication. A community name performs a similar role as a  password to regulate access from the NMS to the agent. If the community name provided by the NMS is different from the community name set on the agent, the SNMP connection cannot be established and the NMS fails to access the agent.
  • Page 129: Enabling Snmp

    Task Remarks Optional Allows you to configure that the agent can send SNMP traps to the Configuring SNMP trap NMS, and configure information about the target host of the SNMP traps. By default, an agent is allowed to send SNMP traps to the NMS. Configuring SNMPv3 Perform the tasks in to configure SNMPv3:...
  • Page 130 Set up Configuration items for enabling SNMP Item Description SNMP Specify to enable or disable SNMP. Configure the local engine ID. The validity of a user after it is created depends on the engine ID of the SNMP Local Engine ID agent.
  • Page 131: Configuring An Snmp View

    Item Description Set a character string to describe the contact information for system maintenance. Contact If the device is faulty, the maintainer can contact the manufacture factory according to the contact information of the device. Location Set a character string to describe the physical location of the device. SNMP Version Set the SNMP version run by the system Return to...
  • Page 132 Create an SNMP view (2) Table 25 Configure the parameters of a rule and click Add to add the rule into the list box at the lower part of the page. Table 26 Configure all rules and click Apply to create an SNMP view. Note that the view will not be created if you click Cancel.
  • Page 133: Configuring An Snmp Community

    Add rules to an SNMP view NOTE: You can also click the icon corresponding to the specified view on the page as shown in a, and then you can enter the page to modify the view. Return to SNMPv1 or SNMPv2c configuration task list SNMPv3 configuration task list.
  • Page 134: Configuring An Snmp Group

    Configuration items for configuring an SNMP community Item Description Community Name Set the SNMP community name. Configure SNMP NMS access right  Read only—The NMS can perform read-only operations to the MIB objects when Access Right it uses this community name to access the agent, ...
  • Page 135: Configuring An Snmp User

    Create an SNMP group Configuration items for creating an SNMP group Item Description Group Name Set the SNMP group name. Select the security level for the SNMP group. The available security levels are:  NoAuth/NoPriv—No authentication no privacy.  Auth/NoPriv—Authentication without privacy. Security Level ...
  • Page 136 SNMP user Create an SNMP user Configuration items for creating an SNMP user Item Description User Name Set the SNMP user name. Select the security level for the SNMP group. The following are the available security levels:  NoAuth/NoPriv—No authentication no privacy. Security Level ...
  • Page 137: Configuring Snmp Trap Function

    Item Description Select an SNMP group to which the user belongs.  When the security level is NoAuth/NoPriv, you can select an SNMP group with no authentication no privacy.  When the security level is Auth/NoPriv, you can select an Group Name SNMP group with no authentication no privacy or authentication without privacy.
  • Page 138: Configuration Items For Adding Target Host

    Traps configuration Add a target host of SNMP traps Configuration items for adding a target host Item Description Set the destination IP address. Destination IP Address Select the IP address type: IPv4 or IPv6, and then type the corresponding IP address in the text box according to the IP address type.
  • Page 139: Snmp Configuration Example

    Item Description Set UDP port number. IMPORTANT: The default port number is 162, which is the SNMP-specified port used for UDP Port receiving traps on the NMS. Generally (such as using iMC or MIB Browser as the NMS), you can use the default port number. To change this parameter to another value, you need to make sure that the configuration is the same with that on the NMS.
  • Page 140 Enable SNMP Select the Enable radio box.  Select the v3 radio box.  Click Apply.  # Configure an SNMP view.  Click the View tab and then click Add to enter the page as shown in c. Create an SNMP view (1) ...
  • Page 141 Create an SNMP view (2) Select the Included radio box.  Type the MIB subtree OID interfaces.  Click Add.  Click Apply. A configuration progress dialog box appears, as shown in e.  Configuration progress dialog box  After the configuration process is complete, click Close. # Configure an SNMP group.
  • Page 142 Create an SNMP group Type group1 in the text box of Group Name.  Select view1 from the Read View drop-down box.  Select view1 from the Write View drop-down box.  Click Apply.  # Configure an SNMP user ...
  • Page 143 Click Apply.  # Enable the agent to send SNMP traps. Click the Trap tab and enter the page as shown in h.  Enable the agent to send SNMP traps Select the Enable SNMP Trap check-box.  Click Apply. ...
  • Page 144 CAUTION: The configuration on NMS must be consistent with that on the agent. Otherwise, you cannot perform corresponding operations. SNMPv3 adopts a security mechanism of authentication and privacy. You must configure the username and security level. According to the configured security level, you must also configure the related authentication mode, authentication password, privacy mode, privacy password, and so on.
  • Page 145: Interface Statistics

    Interface statistics Overview The interface statistics module displays statistics information about the packets received and sent through interfaces. Displaying interface statistics Select Device  Interface Statistics from the navigation tree to enter the interface statistics display page, as shown in a. Interface statistics display page Details about the interface statistics Field...
  • Page 146 Field Description OutUcastPkts Number of unicast packets sent through the interface. OutNUcastPkts Number of non-unicast packets sent through the interface. OutDiscards Number of valid packets discarded in the outbound direction. OutErrors Number of invalid packets sent through the interface.
  • Page 147: Vlan Configuration

    VLAN configuration Introduction to VLAN Ethernet is a network technology based on the Carrier Sense Multiple Access/Collision Detect (CSMA/CD) mechanism. As the medium is shared, collisions and excessive broadcasts are common on Ethernet networks. To address the issue, virtual LAN (VLAN) was introduced to break a LAN down into separate VLANs.
  • Page 148: Vlan Types

    In the header of a traditional Ethernet data frame, the field after the destination MAC address and the source MAC address is the Type field indicating the upper layer protocol type, as shown in a. Traditional Ethernet frame format DA&SA Type Data IEEE 802.1Q inserts a four-byte VLAN tag after the DA&SA field, as shown in b.
  • Page 149: Introduction To Port-Based Vlan

    Introduction to port-based VLAN Port-based VLANs group VLAN members by port. A port forwards traffic for a VLAN only after it is assigned to the VLAN. Port link type You can configure the link type of a port as access, trunk, or hybrid. The link types use the following VLAN tag handling methods: An access port belongs to only one VLAN and sends traffic untagged.
  • Page 150: Configuring A Vlan

    Configuring a VLAN Configuration task list Use either of the following approaches or the combination of them to configure a VLAN, as shown in VLAN configuration task list (approach I) Task Remarks Required Creating VLANs Create one or multiple VLANs. Required Selecting VLANs Configure a subset of all existing VLANs.
  • Page 151: Selecting Vlans

    The Create tab Configuration items of creating VLANs Item Description VLAN IDs IDs of the VLANs to be created. Select the ID of the VLAN whose description string is to be modified. Modify the description Click the ID of the VLAN to be modified in the list in the middle of the page. of the Set the description string of the selected VLAN.
  • Page 152: Modifying A Vlan

    The Select VLAN tab Configuration items of selecting VLANs Item Description Select one of the two options: Display all VLANs  Display all VLANs—Display all configured VLANs.  Display a subnet of all configured VLANs—Type the VLAN Display a subnet of all configured VLANs IDs you want to display.
  • Page 153 The Modify VLAN tab Configuration items of modifying a VLAN Item Description Select the VLAN to be modified. Please select a VLAN to Select a VLAN in the drop-down list. The VLANs available for selection are modify created first and then selected on the page for selecting VLANs. Modify the description string of the selected VLAN.
  • Page 154: Modifying Ports

    Modifying ports Select Network  VLAN from the navigation tree and click the Modify Port tab to enter the page shown in The Modify Port tab Configuration items of modifying ports Item Description Select the ports to be modified. Click one or more ports you want to modify on the chassis front panel. Select Ports If aggregate interfaces are configured on the device, the page displays a list of aggregate interfaces below the chassis front panel, and you can select...
  • Page 155: Vlan Configuration Example

    Item Description Set the IDs of the VLANs that the selected ports are to be assigned to or removed VLAN IDs from. This item is available when the Untagged, Tagged, or Not A Member option is selected in the Select membership type area. Set the link type of the selected ports, which can be access, hybrid, or trunk.
  • Page 156 Configure GigabitEthernet 1/0/1 as a trunk port and its PVID as 100 Select Trunk in the Link Type drop-down list.  Select the PVID option, and type 100 in the text box.  Select GigabitEthernet 1/0/1 on the chassis front device panel. ...
  • Page 157 Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100 Type VLAN IDs 2, 6-50, 100.  Click Create.  # Assign GigabitEthernet 1/0/1 to VLAN 100 as an untagged member. Click Select VLAN to enter the page for selecting VLANs, as shown in d.
  • Page 158 Set a VLAN range Select the Display a subnet of all configured VLANs option and type 1-100 in the text box.  Click Select.  Click Modify VLAN to enter the page for modifying the ports in a VLAN, as shown in e.
  • Page 159 Assign GigabitEthernet 1/0/1 to VLAN 100 as an untagged member  Select 100 – VLAN 0100 in the Please select a VLAN to modify drop-down list.  Select the Untagged option in the Select membership type area.  Select GigabitEthernet 1/0/1 on the chassis front device panel. ...
  • Page 160: Configuration Guidelines

    Click Modify Port to enter the page for modifying the VLANs to which a port belongs, as shown in g. Assign GigabitEthernet 1/0/1 to VLAN 2 and VLANs 6 through 50 as a tagged member  Select GigabitEthernet 1/0/1 on the chassis front device panel. ...
  • Page 161: Vlan Interface Configuration

    VLAN interface configuration NOTE: For more information about VLANs, see the chapter “VLAN configuration.” For hosts of different VLANs to communicate, you must use a router or Layer 3 switch to perform layer 3 forwarding. To achieve this, VLAN interfaces are used. VLAN interfaces are virtual interfaces used for Layer 3 communication between different VLANs.
  • Page 162: Modifying A Vlan Interface

    The Create tab Configuration items of creating a VLAN interface Item Description Input the ID of the VLAN interface to be created. Before creating a VLAN Input a VLAN ID: interface, make sure that the corresponding VLAN exists. DHCP Configure the way in which the VLAN interface obtains an IPv4 address. Allow the VLAN interface to automatically obtain an IP address by selecting BOOTP the DHCP or BOOTP option, or manually assign the VLAN interface an IP...
  • Page 163 Select Network  VLAN Interface from the navigation tree and click the Modify tab to enter the page shown in a. The Modify tab Configuration items of modifying a VLAN interface Item Description Select the VLAN interface to be configured. Select VLAN Interface The VLAN interfaces available for selection in the drop-down list are those created on the page for creating VLAN interfaces.
  • Page 164 Item Description Select Up or Down in the Admin Status drop-down list to bring up or shut down the selected VLAN interface. To restore a failed VLAN interface, you can shut down and then bring up the VLAN interface. By default, a VLAN interface is down if all Ethernet ports in the VLAN are down, Admin Status and is up if one or more Ethernet ports in the VLAN are up.
  • Page 165: Voice Vlan Configuration

    Voice VLAN configuration A voice VLAN is configured especially for voice traffic. After assigning the ports connecting to voice devices to a voice VLAN, the system automatically configures quality of service (QoS) parameters for voice traffic, improving the transmission priority of voice traffic and ensuring voice quality. OUI addresses A device determines whether a received packet is a voice packet by checking its source MAC address.
  • Page 166 a port from the voice VLAN if no packet is received from the port during the aging time. Assigning ports to and removing ports from a voice VLAN are automatically performed.  In manual mode, you need to manually assign an IP phone accessing port to a voice VLAN. Then, the system matches the source MAC addresses carried in the packets against the device’s OUI addresses.
  • Page 167: Security Mode And Normal Mode Of Voice Vlans

    In a safe network, you can configure the voice VLANs to operate in normal mode, reducing the consumption of system resources due to source MAC addresses checking. HP does not recommend you transmit both voice traffic and non-voice traffic in a voice VLAN. If you have to, ensure that the voice VLAN security mode is disabled.
  • Page 168 Configuring voice VLAN on a port in automatic voice VLAN assignment mode Perform the tasks described in to configure the voice VLAN function on a port working in automatic voice VLAN assignment mode. Voice VLAN configuration task list for a port in automatic voice VLAN assignment mode Task Remarks Optional...
  • Page 169: Configuring Voice Vlan Globally

    Task Remarks Optional You can configure up to 16 OUI addresses. Adding OUI addresses to the OUI list By default, the system is configured with seven OUI addresses, as shown in 1. Configuring voice VLAN globally Select Network  Voice VLAN from the navigation tree, and click the Setup tab to enter the page shown in Configure voice VLAN Global voice VLAN configuration items Item...
  • Page 170 Configure voice VLAN on a port Configuration items of configuring voice VLAN for a port Item Description Set the voice VLAN assignment mode of a port:  Voice VLAN port mode Auto—Indicates the automatic voice VLAN assignment mode.  Manual—Indicates the manual voice VLAN assignment mode. Select Enable or Disable in the drop-down list to enable or disable the Voice VLAN port state voice VLAN function on the port.
  • Page 171: Adding Oui Addresses To The Oui List

    Adding OUI addresses to the OUI list Select Network  Voice VLAN from the navigation tree and click the OUI Add tab to enter the page shown in a. Add OUI addresses to the OUI list OUI list configuration items Item Description OUI Address...
  • Page 172: Voice Vlan Configuration Examples

    Voice VLAN configuration examples Configuring voice VLAN on a port in automatic voice VLAN assignment mode Network requirements As shown in a, Configure VLAN 2 as the voice VLAN allowing only voice traffic to pass through.  The IP phone connected to hybrid port GigabitEthernet 1/0/1 sends untagged voice traffic. ...
  • Page 173 Create VLAN 2 Type VLAN ID 2.  Click Create.  # Configure GigabitEthernet 1/0/1 as a hybrid port.  Select Device  Port Management from the navigation tree, and click the Setup tab to enter the page shown in b.
  • Page 174 Configure GigabitEthernet 1/0/1 as a hybrid port Select Hybrid from the Link Type drop-down list.  Select GigabitEthernet 1/0/1 from the chassis front panel.  Click Apply.  # Configure the voice VLAN function globally.  Select Network  Voice VLAN from the navigation tree and click the Setup tab to enter the page shown in c.
  • Page 175 Configure the voice VLAN function globally  Select Enable in the Voice VLAN security drop-down list. You can skip this step, because the voice VLAN security mode is enabled by default. Set the voice VLAN aging timer to 30 minutes. ...
  • Page 176 Add OUI addresses to the OUI list  Type OUI address 0011-2200-0000.  Select FFFF-FF00-0000 in the Mask drop-down list. Type description string test.  Click Apply.  Verify the configuration When the configurations are completed, the OUI Summary tab is displayed by default, as shown in a. ...
  • Page 177: Configuring A Voice Vlan On A Port In Manual Voice Vlan Assignment Mode

    Current voice VLAN information Configuring a voice VLAN on a port in manual voice VLAN assignment mode Network requirements As shown in a, Configure VLAN 2 as a voice VLAN that carries only voice traffic.  The IP phone connected to hybrid port GigabitEthernet 1/0/1 sends untagged voice traffic. ...
  • Page 178 Configuration procedure # Create VLAN 2.  Select Network  VLAN from the navigation tree, and click the Create tab to enter the page shown in Create VLAN 2 Type VLAN ID 2.  Click Create.  # Configure GigabitEthernet 1/0/1 as a hybrid port and configure its PVID as VLAN 2. Select Device ...
  • Page 179 Configure GigabitEthernet 1/0/1 as a hybrid port Select Hybrid from the Link Type drop-down list.  Select the PVID option and type 2 in the text box.  Select GigabitEthernet 1/0/1 from the chassis front panel.  Click Apply.  # Assign GigabitEthernet 1/0/1 to VLAN 2 as an untagged member.
  • Page 180 Assign GigabitEthernet 1/0/1 to VLAN 2 as an untagged member  Select GigabitEthernet 1/0/1 from the chassis front panel.  Select the Untagged option.  Type VLAN ID 2.  Click Apply. A configuration progress dialog box appears, as shown in d. Configuration progress dialog box After the configuration process is complete, click Close.
  • Page 181 Select Network  Voice VLAN from the navigation tree, and click the Port Setup tab to enter the page  shown in e. Configure voice VLAN on GigabitEthernet 1/0/1 Select Manual in the Voice VLAN port mode drop-down list.  Select Enable in the Voice VLAN port state drop-down list.
  • Page 182 Add OUI addresses to the OUI list  Type OUI address 0011-2200-0000.  Select FFFF-FF00-0000 from the Mask drop-down list.  Type description string test.  Click Apply. Verify the configuration When the configurations are completed, the OUI Summary tab is displayed by default, as shown in a. ...
  • Page 183: Configuration Guidelines

    Current voice VLAN information Configuration guidelines When configuring the voice VLAN function, follow these guidelines: To remove a VLAN functioning as a voice VLAN, disable its voice VLAN function first.  In automatic voice VLAN assignment mode, a hybrid port can process only tagged voice traffic. ...
  • Page 184: Mac Address Configuration

    MAC address configuration NOTE: The MAC address table can contain only Layer 2 Ethernet ports. This manual covers only the management of static and dynamic MAC address entries, not multicast MAC address entries. An Ethernet device uses a MAC address table for forwarding frames through unicast instead of broadcast. This table describes from which port a MAC address (or host) can be reached.
  • Page 185: Configuring Mac Addresses

    MAC address table of the device Configuring MAC addresses You can configure and display MAC address entries and set the MAC address entry aging time. Configuring a MAC address entry Select Network  MAC from the navigation tree. The system automatically displays the MAC tab, which shows all the MAC address entries on the device, as shown in a.
  • Page 186 The MAC tab Click Add in the bottom to enter the page as shown in b. Create a MAC address entry...
  • Page 187: Setting The Aging Time Of Mac Address Entries

    Configuration items of creating a MAC address entry Item Description Set the MAC address to be added. Set the type of the MAC address entry:  Static—Static MAC address entries that never age out.  Dynamic—Dynamic MAC address entries that will age out. ...
  • Page 188: Mac Address Configuration Example

    MAC address configuration example Network requirements Use the web-based NMS to configure the MAC address table of the device. It is required to add a static MAC address 00e0-fc35-dc71 under GigabitEthernet 1/0/1 in VLAN 1. Configuration procedure # Create a static MAC address entry. Select Network ...
  • Page 189: Mstp Configuration

    MSTP configuration As a Layer 2 management protocol, the Spanning Tree Protocol (STP) eliminates Layer 2 loops by selectively blocking redundant links in a network, and also allows for link redundancy. Recent versions of STP include Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP).
  • Page 190: How Stp Works

    Designated bridge and designated port Description of designated bridges and designated ports Classification Designated bridge Designated port A device directly connected with the local The port through which the designated For a device device and responsible for forwarding bridge forwards BPDUs to this device BPDUs to the local device The port through which the designated The device responsible for forwarding...
  • Page 191 Root path cost: The cost of the path to the root bridge.  Designated bridge ID: Comprises the priority and MAC address of the designated bridge.  Designated port ID: Comprises the port priority and global port number.  Message age: age of the configuration BPDU while it propagates in the network. ...
  • Page 192 NOTE: The following are the principles of configuration BPDU comparison: The configuration BPDU with the lowest root bridge ID has the highest priority. If the configuration BPDUs have the same root bridge ID, their root path costs are compared. Assume that the root path cost in a configuration BPDU plus the path cost of a receiving port is S.
  • Page 193 Network diagram for the STP algorithm As shown in a, the priority values of Device A, Device B, and Device C are 0, 1, and 2, and the path costs of links among the three devices are 5, 10 and 4 respectively. Initial state of each device ...
  • Page 194 Configuration BPDU on Device Comparison process ports after comparison  Port BP1 receives the configuration BPDU of Device A {0, 0, 0, AP1}. Device B finds that the received configuration BPDU is superior to the configuration BPDU of the local port {1, 0, 1, BP1}, and updates the configuration BPDU of BP1.
  • Page 195 Configuration BPDU on Device Comparison process ports after comparison After comparison:  Because the root path cost of CP2 (9) (root path cost of the BPDU (5) plus path cost corresponding to CP2 (4)) is smaller than the root path cost of CP1 (10) (root path cost of the BPDU (0) + path cost corresponding to CP2 (10)), the BPDU of CP2 is Blocked port CP2: elected as the optimum BPDU, and CP2 is elected as the root...
  • Page 196: Rstp

    If a path becomes faulty, the root port on this will no longer receives new configuration BPDUs and the  old configuration BPDUs will be discarded due to timeout. The device generates a configuration BPDU with itself as the root and sends out the BPDUs and TCN BPDUs. This triggers a new spanning tree calculation process to establish a new path to restore the network connectivity.
  • Page 197: Mstp

    MSTP STP and RSTP limitations STP does not support rapid state transition of ports. A newly elected port must wait twice the forward delay time before transiting to the forwarding state, even if it connects to a point-to-point link or is an edge port. Although RSTP supports rapid network convergence, it has the same drawback as STP—All bridges within a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN, and the packets of all VLANs are forwarded along the same spanning tree.
  • Page 198 Basic concepts in MSTP MST region A multiple spanning tree region (MST region) consists of multiple devices in a switched network and the network segments among them. All these devices have the following characteristics: MSTP-enabled  Same region name  Same VLAN-to-MSTI mapping configuration ...
  • Page 199 MSTI 1, VLAN 2 to MSTI 2, and the rest to CIST. MSTP achieves load balancing by means of the VLAN-to-MSTI mapping table. An internal spanning tree (IST) is a spanning tree that runs in an MST region. It is also called MSTI 0, a special MSTI to which all VLANs are mapped by default.
  • Page 200 Designated port: Forwards data to the downstream network segment or device.  Master port: A port on the shortest path from the local MST region to the common root bridge,  connecting the MST region to the common root bridge. If the region is seen as a node, the master port is the root port of the region on the CST.
  • Page 201: How Mstp Works

    A port state is not exclusively associated with a port role. lists the port states supported by each port role, where “√” indicates that the port supports the state and “—” indicates that the port does not support the state. Ports states supported by different port roles Port role (right) Root...
  • Page 202: Protocols And Standards

    Loop guard  TC-BPDU (a message that notifies the device of topology changes) guard  Protocols and standards IEEE 802.1d, Media Access Control (MAC) Bridges  IEEE 802.1w, Part 3: Media Access Control (MAC) Bridges—Amendment 2: Rapid Reconfiguration  IEEE 802.1s, Virtual Bridged Local Area Networks—Amendment 3: Multiple Spanning Trees ...
  • Page 203 MST region Click Modify to enter the page shown in b. Configure an MST region Configuration items of configuring an MST region Item Description MST region name. Region Name The MST region name is the bridge MAC address of the device by default.
  • Page 204: Configuring Mstp Globally

    Configuring MSTP globally Select Network  MSTP from the navigation tree, and click the Global tab to enter the page shown in a. Configure MSTP globally Configuration items of MSTP global configuration Item Description Globally enable or disable STP. Enable STP Globally Other MSTP configurations take effect only after you globally enable STP.
  • Page 205 Otherwise, the network ensure that the paths are fault-free. topology will not be stable. HP Timer recommends you set the network diameter and then have Set the maximum length of time a...
  • Page 206: Configuring Mstp On A Port

    With the TC-BPDU guard function, you can prevent frequent flushing of forwarding address entries. IMPORTANT: HP does not recommend you to disable this function. Set the maximum number of immediate forwarding address entry flushes the device TC Protection Threshold can perform within a certain period of time after receiving the first TC-BPDU.
  • Page 207 Transmit Limit The larger the transmit limit is, the more network resources will be occupied. HP recommends you to use the default value. Set whether or not the port migrates to the MSTP mode. In a switched network, if a port on an MSTP (or RSTP) device connects to a device running STP, this port will automatically migrate to the STP-compatible mode.
  • Page 208: Displaying Mstp Information Of A Port

    BPDUs. You can set these ports as edge ports to achieve Edged Port fast transition for these ports. HP recommends you to enable the BPDU guard function in conjunction with the edged port function to avoid network topology changes when the edge ports receive configuration BPDUs.
  • Page 209 The Port Summary tab Select a port (GigabitEthernet 1/0/16 for example) on the chassis front panel. If aggregate interfaces are configured on the device, the page displays a list of aggregate interfaces below the chassis front panel, and you can select aggregate interfaces from this list. The lower part of the page displays the MSTP information of the port in MSTI 0 (when STP is enabled globally) or the STP status and statistics (when STP is disabled globally), the MSTI to which the port belongs, and the path cost and priority of the port in the MSTI.
  • Page 210 Field Description Path cost of the port. The field in the bracket indicates the standard used for port path cost calculation, which can be Legacy, dot1d-1998, or dot1t. Port Cost(Legacy)  Config indicates the configured value.  Active indicates the actual value. Designated bridge ID and port ID of the port.
  • Page 211: Mstp Configuration Example

    Field Description Max age(s) Maximum age of a configuration BPDU. Forward delay(s) Port state transition delay, in seconds. Hello time(s) Configuration BPDU transmission interval, in seconds. Max hops Maximum hops of the current MST region. Return to MSTP configuration task list.
  • Page 212 The Region tab Click Modify to enter the page shown in c.  Configure an MST region Type the region name example.  Set the revision level to 0.  Select the Manual option.  Select 1 in the Instance ID drop-down list. ...
  • Page 213 Select Network  MSTP from the navigation tree, and click the Global tab to enter the page shown in  Configure MSTP globally (on Switch A)  Select Enable in the Enable STP Globally drop-down list. Select MSTP in the Mode drop-down list. ...
  • Page 214 Select Network  MSTP from the navigation tree, and click the Global tab to enter the page for  configuring MSTP globally. See d.  Select Enable in the Enable STP Globally drop-down list.  Select MSTP in the Mode drop-down list. Select the Instance option.
  • Page 215: Configuration Guidelines

    Configure MSTP globally (on Switch D) Select Enable in the Enable STP Globally drop-down list.  Select MSTP in the Mode drop-down list.  Click Apply.  Configuration guidelines When configuring MSTP, follow these guidelines:  Two devices belong to the same MST region only if they are interconnected through physical links, and share the same region name, the same MSTP revision level, and the same VLAN-to-MSTI mappings.
  • Page 216 If the device is not enabled with BPDU guard, when a boundary port receives a BPDU from another  port, it converts into a non-boundary port. To restore its port role as a boundary port, you need to restart the port. Configure ports that are directly connected to terminals as boundary ports and enable BPDU guard for ...
  • Page 217: Link Aggregation And Lacp Configuration

    Link aggregation and LACP configuration Ethernet link aggregation, or simply link aggregation, combines multiple physical Ethernet ports into one logical link, called an aggregate link. Link aggregation delivers the following benefits:  Increases bandwidth beyond the limits of any single link. In an aggregate link, traffic is distributed across the member ports.
  • Page 218: Link Aggregation Modes

    LACP is automatically enabled on interfaces in a dynamic aggregation group. For information about dynamic aggregation groups, see “Dynamic aggregation mode”. An LACP-enabled interface sends LACPDUs to notify the remote system (the partner) of its system LACP priority, system MAC address, LACP port priority, port number, and operational key.
  • Page 219 aggregation priority, duplex, and speed in the following order (with the one at the top selected as the reference port): ○ Lowest aggregation priority value ○ Full duplex/high speed ○ Full duplex/low speed ○ Half duplex/high speed ○ Half duplex/low speed Consider the ports in up state with the same port attributes and class-two configurations as the ...
  • Page 220: Load Sharing Mode Of An Aggregation Group

    Load sharing mode of an aggregation group Every link aggregation group created on HP V1910 Switch Series operates in load sharing mode all the time, even when it contains only one member port.
  • Page 221: Creating A Link Aggregation Group

    Dynamic aggregation group configuration task list Task Remarks Required Create a dynamic aggregate interface and configure member ports for the dynamic aggregation group Creating a link aggregation group automatically created by the system when you create the aggregate interface. LACP is enabled automatically on all the member ports.
  • Page 222 Create a link aggregation group Configuration items of creating a link aggregation group Item Description Assign an ID to the link aggregation group to be created. Enter Link Aggregation Interface ID You can view the result in the Summary list box at the bottom of the page.
  • Page 223: Displaying Information Of An Aggregate Interface

    Displaying information of an aggregate interface Select Network  Link Aggregation from the navigation tree. The Summary tab is displayed by default, as shown in a. Display information of an aggregate interface Fields on the Summary tab Field Description Type and ID of the aggregate interface. Aggregation interface Bridge-Aggregation indicates a Layer 2 aggregate interface.
  • Page 224: Displaying Information Of Lacp-Enabled Ports

    The Setup tab After finishing each configuration item, click the right Apply button to submit the configuration. describes the configuration items. LACP priority configuration items Item Description Select LACP enabled port(s) parameters Set a port LACP priority. Select the ports where the port LACP priority you set will apply on the chassis front panel.
  • Page 225: Displaying Information Of Lacp-Enabled Ports

    Display information about LACP-enabled ports The upper part of the page displays a list of all LACP-enabled ports on the device and information about them. To view information about the partner port of a LACP-enabled port, select it in the port list, and then click View Details.
  • Page 226: Link Aggregation And Lacp Configuration Example

    Field/button Description Active state of the port. If a port is selected, its state is active and the ID of the State aggregation group it belongs to will be displayed. Reason code indicating why a port is inactive (that is, unselected) for Inactive Reason receiving/transmitting user data.
  • Page 227 Network diagram for static link aggregation configuration Configuration procedure You can create a static or dynamic link aggregation group to achieve load balancing. Table 54 Approach 1: Create a static link aggregation group # Create static link aggregation group 1. Select Network ...
  • Page 228 Select the Static (LACP Disabled) option as the aggregate interface type.  Select GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 on the chassis  front panel.  Click Apply. Approach 2: Create a dynamic link aggregation group Table 55 # Create dynamic link aggregation group 1. Select Network ...
  • Page 229: Configuration Guidelines

    Configuration guidelines Follow these guidelines when configuring a link aggregation group: In an aggregation group, the port to be a selected port must be the same as the reference port in port  attributes, and class-two configurations. To keep these configurations consistent, you should configure the port manually.
  • Page 230: Lldp Configuration

    LLDP configuration Background In a heterogeneous network, it is important that different types of network devices from different vendors can discover one other and exchange configuration for interoperability and management sake. To ensure compatibility, a standard configuration exchange platform was created. The IETF drafted the Link Layer Discovery Protocol (LLDP) in IEEE 802.1AB.
  • Page 231 Field Description Frame check sequence, a 32-bit CRC value used to determine the validity of the received Ethernet frame. Table 57 SNAP-encapsulated LLDPDU format SNAP-encapsulated LLDPDU format Fields in a SNAP encapsulated LLDPDU Field Description The MAC address to which the LLDPDU is advertised. It is fixed to Destination MAC address 0x0180-C200-000E, a multicast MAC address.
  • Page 232 PVID of the sending port. Port And Protocol VLAN ID Port and protocol VLAN IDs. VLAN Name A specific VLAN name on the port. Protocol Identity Protocols supported on the port. NOTE: HP V1910 Switch Series can receive but cannot send protocol identity TLVs.
  • Page 233 Table 60 IEEE 802.3 organizationally specific TLVs IEEE 802.3 organizationally specific TLVs Type Description Contains the rate and duplex capabilities of the sending port, support MAC/PHY Configuration/Status for auto negotiation, enabling status of auto negotiation, and the current rate and duplex mode. Power Via MDI Contains Power supply capability of the port.
  • Page 234: How Lldp Works

    Management address The management address of a device is used by the network management system to identify and manage the device for topology maintenance and network management. The management address is encapsulated in the management address TLV. How LLDP works Operating modes of LLDP LLDP can operate in one of the following modes: TxRx mode.
  • Page 235: Protocols And Standards

    With CDP compatibility enabled, your device can receive and recognize CDP packets from a Cisco IP phone and respond with CDP packets, which carry the voice VLAN configuration TLVs. The voice traffic is confined in the configured voice VLAN, and differentiated from other types of traffic. CDP-compatible LLDP operates in one of the following modes: TxRx: CDP packets can be transmitted and received.
  • Page 236: Enabling Lldp On Ports

    Task Remarks Optional Displaying global LLDP information You can display the local global LLDP information and statistics. Displaying LLDP Optional information received from You can display the LLDP information received from LLDP neighbors. LLDP neighbors NOTE: LLDP-related configurations made in Ethernet interface view takes effect only on the current port, and those made in port group view takes effect on all ports in the current port group.
  • Page 237: Configuring Lldp Settings On Ports

    The Port Setup tab Return to LLDP configuration task list. Configuring LLDP settings on ports Select Network  LLDP from the navigation tree to enter the Port Setup tab, as shown in a. You can configure LLDP settings on ports individually or in batch.
  • Page 238 To configure LLDP settings on individual ports, click the icon for the port you are configuring. On  the page displayed as shown in a, you can modify or view the LLDP settings of the port. The page for modifying LLDP settings on a port ...
  • Page 239 The page for modifying LLDP settings on ports in batch Port LLDP configuration items Item Description Interface Name Displays the name of the port or ports you are configuring. Displays the LLDP enabling status on the port you are configuring. LLDP State This field is not available when you batch-configure ports.
  • Page 240 Item Description Set the CDP compatibility of LLDP:  Disable—Neither sends nor receives CDPDUs.  TxRx—Sends and receives CDPDUs. CDP Operating Mode IMPORTANT: To enable LLDP to be compatible with CDP on the port, you must enable CDP compatibility on the Global Setup tab and set the CDP operating mode on the port to TxRx.
  • Page 241: Configuring Global Lldp Setup

    Item Description Select to include the link aggregation TLV in transmitted Link Aggregation LLDPDUs. MAC/PHY Select to include the MAC/PHY configuration/status TLV in DOT3 TLV Configuration/Status transmitted LLDPDUs. Setting Select to include the maximum frame size TLV in transmitted Maximum Frame Size LLDPDUs.
  • Page 242 The Global Setup tab Global LLDP setup configuration items Item Description LLDP Enable Select from the drop-down list to enable or disable global LLDP. Select from the drop-down list to enable or disable CDP compatibility of LLDP. IMPORTANT:  To enable LLDP to be compatible with CDP on a port, you must set the CDP work mode (or the CDP operating mode) on the port to TxRx in addition to enabling CDP Compatibility CDP compatibility on the Global Setup tab.
  • Page 243: Displaying Lldp Information For A Port

    Item Description Set the minimum interval for sending traps. With the LLDP trapping function enabled on a port, traps are sent out the port to Trap Interval advertise the topology changes detected over the trap interval to neighbors. By tuning this interval, you can prevent excessive traps from being sent when topology is instable.
  • Page 244 The Local Information tab Local information of an LLDP-enabled port Field Description Port ID type:  Interface alias  Port component  MAC address Port ID subtype  Network address  Interface name  Agent circuit ID  Locally assigned, namely, the local configuration The power over Ethernet port class: ...
  • Page 245 Field Description The type of PSE power source advertised by the local device:  PoE PSE power source Primary  Backup Available options include:  Unknown—The PSE priority of the port is unknown.  Port PSE priority Critical—The priority level 1. ...
  • Page 246 Field Description Port ID type:  Interface alias  Port component  MAC address Port ID type  Network address  Interface name  Agent circuit ID  Locally assigned—Local configuration. Port ID The port ID value. The primary network function of the system: ...
  • Page 247 Field Description Available options include:  Unknown  Voice  Voice signaling  Guest voice Media policy type  Guest voice signaling  Soft phone voice  Videoconferencing  Streaming video  Video signaling Unknown Policy Indicates whether or not the media policy type is unknown. VLAN tagged Indicates whether or not packets of the media VLAN are tagged.
  • Page 248: Displaying Global Lldp Information

    The Statistic Information tab The Status Information tab Return to LLDP configuration task list. Displaying global LLDP information Select Network  LLDP from the navigation tree, and click the Global Summary tab to display global local LLDP information and statistics, as shown in a.
  • Page 249 The Global Summary tab Global LLDP information Field Description Chassis ID The local chassis ID depending on the chassis type defined. The primary network function advertised by the local device: System capabilities  Bridge supported  Router The enabled network function advertised by the local device: System capabilities ...
  • Page 250: Displaying Lldp Information Received From Lldp Neighbors

    Field Description The device class advertised by the local device:  Connectivity device—An intermediate device that provide network connectivity.  Class I—A generic endpoint device. All endpoints that require the discovery service of LLDP belong to this category.  Class II—A media endpoint device. The class II endpoint devices support the Device class media stream capabilities in addition to the capabilities of generic endpoint devices.
  • Page 251 Enable LLDP on the ports of Switch A and Switch B to monitor the link between Switch A and Switch B and the link between Switch A and the MED device on the NMS. Network diagram for basic LLDP configuration Configuration procedure Table 61 Configure Switch A...
  • Page 252 The Port Setup tab...
  • Page 253 The page for setting LLDP on multiple ports Select Rx from the LLDP Operating Mode drop-down list.  Click Apply.  # Enable global LLDP.  Click the Global Setup tab, as shown in d.
  • Page 254 The Global Setup tab Select Enable from the LLDP Enable drop-down list.  Click Apply.  Table 62 Configure Switch B # Enable LLDP on port GigabitEthernet 1/0/1. (Optional. By default, LLDP is enabled on Ethernet ports.) # Set the LLDP operating mode to Tx on GigabitEthernet 1/0/1. Select Network ...
  • Page 255 The page for configuring LLDP on the selected port Select Tx from the LLDP Operating Mode drop-down list.   Click Apply. # Enable global LLDP and configure the global LLDP setup as needed (see d). Click the Global Setup tab. ...
  • Page 256: Cdp-Compatible Lldp Configuration Example

    The Status Information tab # Tear down the link between Switch A and Switch B. # Display the status information of port GigabitEthernet 1/0/2 on Switch A.  Click Refresh. The updated status information of port GigabitEthernet 1/0/2 shows that no neighbor device is connected to the port, as shown in b.
  • Page 257 Network diagram for CDP-compatible LLDP configuration Configuration procedure # Create VLAN 2.  Select Network  VLAN from the navigation bar and click the Create tab to enter the page shown in The page for creating VLANs Type 2 in the VLAN IDs field. ...
  • Page 258 The page for configuring ports Select Trunk in the Link Type drop-down list.  Select port GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 on the chassis front panel.  Click Apply.  # Configure the voice VLAN function on the two ports. Select Network ...
  • Page 259 The page for configuring the voice VLAN function on ports Select Auto in the Voice VLAN port mode drop-down list.  Select Enable in the Voice VLAN port state drop-down list.  Type 2 in the Voice VLAN ID field. ...
  • Page 260 The Port Setup tab...
  • Page 261 The page for modifying LLDP settings on ports Select TxRx from the LLDP Operating Mode drop-down list.  Select TxRx from the CDP Operating Mode drop-down list.  Click Apply.  # Enable global LLDP and CDP compatibility of LLDP. Click the Global Setup tab, as shown in f.
  • Page 262: Configuration Guidelines

    The Global Setup tab Select Enable from the LLDP Enable drop-down list.  Select Enable from the CDP Compatibility drop-down list.  Click Apply.  Configuration verification # Display information about LLDP neighbors on Switch A. Display information about LLDP neighbors on Switch A after completing the configuration. You can see that Switch A has discovered the Cisco IP phones attached to ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 and obtained their device information.
  • Page 263: Igmp Snooping Configuration

    IGMP snooping configuration Overview Internet Group Management Protocol (IGMP) snooping is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups. Principle of IGMP snooping By analyzing received IGMP messages, a Layer 2 device running IGMP snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings.
  • Page 264: Work Mechanism Of Igmp Snooping

    IGMP snooping related ports Receiver Router A Switch A GE1/0/1 GE1/0/2 Host A GE1/0/3 Host B Receiver GE1/0/1 Source GE1/0/2 Host C Switch B Router port Member port Multicast packets Host D IGMP snooping related ports include: Router port: A router port is a port on an Ethernet switch that leads the switch towards the Layer 3 ...
  • Page 265 After receiving an IGMP general query, the switch forwards it through all ports in the VLAN except the receiving port and performs the following to the receiving port:  The switch resets the aging timer for the receiving port if the port is in the router port list. ...
  • Page 266: Igmp Snooping Querier

    After receiving the IGMP leave group message from a host, the IGMP querier resolves from the message the address of the multicast group that the host just left and sends an IGMP group-specific query to that multicast group through the port that received the leave group message. After hearing the IGMP group-specific query, the switch forwards it through all its router ports in the VLAN and all member ports for that multicast group, and performs the following to the port before the member port aging timer of the port expires (in case it is a dynamic member port):...
  • Page 267: Enabling Igmp Snooping Globally

    Task Remarks Required Enable IGMP snooping in the VLAN and configure the IGMP snooping version and querier feature. By default, IGMP snooping is disabled in a VLAN. Configuring IGMP snooping IMPORTANT: in a VLAN  IGMP snooping must be enabled globally before it can be enabled in a VLAN.
  • Page 268: Configuring Igmp Snooping In A Vlan

    IGMP snooping configuration items Item Description IGMP snooping Globally enable or disable IGMP snooping. Return to Configuration task list. Configuring IGMP snooping in a VLAN Select Network  IGMP Snooping in the navigation tree to enter the basic configuration page shown in a. Click the icon corresponding to the VLAN to enter the page you can configure IGMP snooping in the VLAN, as shown in a.
  • Page 269: Configuring Igmp Snooping Port Functions

    Query interval Configure the IGMP query interval. General Query Source Specify the source IP address of general queries. HP recommends you to configure a non-all-zero IP address as the source IP address of IGMP queries. Special Query Source Specify the source IP address of group-specific queries. HP recommends you to...
  • Page 270: Display Igmp Snooping Multicast Entry Information

    Configuration items for advanced IGMP snooping features Item Description Select the port on which advanced IGMP snooping features are to be configured. The port can be an Ethernet port or Layer-2 aggregate port. After a port is selected, advanced features configured on this port are displayed at the lower part of this page.
  • Page 271: Igmp Snooping Configuration Example

    Display entry information Information about an IGMP snooping multicast entry Description of IGMP snooping multicast entries Item Description VLAN ID ID of the VLAN to which the entry belongs Source Address Multicast source address, where 0.0.0.0 indicates all multicast sources. Group Address Multicast group address Router Port(s)
  • Page 272 Network diagram for IGMP snooping configuration Configuration procedure Table 65 Configure IP addresses Configure the IP address for each interface as per a. The detailed configuration steps are omitted. Table 66 Configure Router A Enable IP multicast routing, enable PIM-DM on each interface, and enable IGMP on Ethernet 1/1. The detailed configuration steps are omitted.
  • Page 273 Create VLAN 100 Type the VLAN ID 100.  Click Apply to complete the operation.  Click the Modify Port tab to enter the configuration page shown in c. ...
  • Page 274 Add a port to the VLAN  Select GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 in the Select Ports field. Select the Untagged radio button for Select membership type.  Type the VLAN ID 100.  Click Apply to complete the operation. ...
  • Page 275 Enable IGMP snooping globally Select Enable and click Apply to globally enable IGMP snooping.  # In VLAN 100, enable IGMP snooping and the function of dropping unknown multicast data. Click the icon corresponding to VLAN 100 to enter its configuration page and perform the ...
  • Page 276 Click Apply to complete the operation.  # Enable the fast leave function for GigabitEthernet 1/0/3. Click the Advanced tab.  Configure IGMP snooping on GigabitEthernet 1/0/3 Select GigabitEthernet 1/0/3 from the Port drop-down list.  Type the VLAN ID 100. ...
  • Page 277 Details about an IGMP snooping multicast entry As shown above, GigabitEthernet 1/0/3 of Switch A is listening to multicast streams destined for multicast group 224.1.1.1.
  • Page 278: Routing Configuration

    Routing configuration NOTE: router The term in this document refers to a switch supporting routing function. Upon receiving a packet, a router determines the optimal route based on the destination address and forwards the packet to the next router in the path. When the packet reaches the last router, it then forwards the packet to the destination host.
  • Page 279: Default Route

    Default route A default route is used to forward packets that match no entry in the routing table. Without a default route, the packet is discarded. An IPv4 static default route has both its destination IP address and mask being 0.0.0.0. Configuring IPv4 routing Displaying the IPv4 active route table Select Network ...
  • Page 280: Creating An Ipv4 Static Route

    Creating an IPv4 static route Select Network  IPv4 Routing from the navigation tree and click the Create tab to enter the IPv4 static route configuration page, as shown in a. Create an IPv4 static route IPv4 static route configuration items Item Description Destination IP Address...
  • Page 281: Static Route Configuration Example

    Item Description Select the output interface. Interface You can select any available interface, for example, a virtual interface, of the device. If you select NULL 0, the destination IP address is unreachable. Static route configuration example Network requirements The IP addresses of devices are shown in a. Configure IPv4 static routes on Switch A, Switch B, and Switch C so that any two hosts can communicate with each other.
  • Page 282 Configure a default route # Configure a static route to Switch A and Switch C respectively on Switch B.  Select Network  IPv4 Routing from the navigation tree of Switch B, and then click the Create tab to enter the page shown in c. Type 1.1.2.0 for Destination IP Address.
  • Page 283 Configure a static route # Configure a default route to Switch B on Switch C.  Select Network  IPv4 Routing from the navigation tree of Switch C, and then click the Create tab to enter the page as shown in d. Type 0.0.0.0 for Destination IP Address.
  • Page 284 Configure a default route Configuration verification # Display the active route table. Enter the IPv4 route page of Switch A, Switch B, and Switch C respectively to verify that the newly configured static routes are displayed in the active route table. # Ping Host B from Host A (assuming both hosts run Windows XP).
  • Page 285: Precautions

    Precautions When configuring a static route, note the following: Table 73 If you do not specify the preference when configuring a static route, the default preference will be used. Reconfiguration of the default preference applies only to newly created static routes. The web interface does not support configuration of the default preference.
  • Page 286: Dhcp Overview

    DHCP overview NOTE: After the DHCP client is enabled on an interface, the interface can dynamically obtain an IP address and other configuration parameters from the DHCP server. This facilitates configuration and centralized management. For more information about the DHCP client configuration, see the chapter “VLAN interface configuration”.
  • Page 287: Dynamic Ip Address Allocation Process

    Manual allocation: The network administrator assigns an IP address to a client like a WWW server,  and DHCP conveys the assigned address to the client.  Automatic allocation: DHCP assigns a permanent IP address to a client.  Dynamic allocation: DHCP assigns an IP address to a client for a limited period of time, which is called a lease.
  • Page 288: Dhcp Message Format

    When the half lease duration elapses, the DHCP client sends to the DHCP server a DHCP-REQUEST unicast to extend the lease duration. Upon availability of the IP address, the DHCP server returns a DHCP-ACK unicast confirming that the client’s lease duration has been extended, or a DHCP-NAK unicast denying the request.
  • Page 289: Dhcp Options

    file: Bootfile name and path information, defined by the server to the client.  options: Optional parameters field that is variable in length, which includes the message type, lease,  domain name server IP address, and WINS IP address. DHCP options DHCP options overview The DHCP message adopts the same format as the Bootstrap Protocol (BOOTP) message for compatibility, but differs from it in the option field, which identifies new features for DHCP.
  • Page 290: Protocols And Standards

    Option 82 is the relay agent option in the option field of the DHCP message. It records the location information of the DHCP client. When a DHCP relay agent or DHCP snooping device receives a client’s request, it adds Option 82 to the request message before forwarding the message to the server. The administrator can locate the DHCP client to further implement security control and accounting.
  • Page 291: Dhcp Relay Agent Configuration

    DHCP relay agent configuration Introduction to DHCP relay agent Application environment Since DHCP clients request IP addresses via broadcast messages, the DHCP server and clients must be on the same subnet. Therefore, a DHCP server must be available on each subnet, which is not practical. DHCP relay agent solves the problem.
  • Page 292: Dhcp Relay Agent Configuration Task List

    DHCP relay agent work process As shown in b, the DHCP relay agent works as follows: Table 81 After receiving a DHCP-DISCOVER or DHCP-REQUEST broadcast message from a DHCP client, the DHCP relay agent fills the giaddr field of the message with its IP address and forwards the message to the designated DHCP server in unicast mode.
  • Page 293: Enabling Dhcp And Configuring Advanced Parameters For The Dhcp Relay Agent

    Task Remarks Optional Create a static IP-to-MAC binding, and view static and dynamic bindings. The DHCP relay agent can dynamically record clients’ IP-to-MAC Configuring and displaying clients' bindings after clients get IP addresses. It also supports static bindings, IP-to-MAC bindings that is, you can manually configure IP-to-MAC bindings on the DHCP relay agent, so that users can access external network using fixed IP addresses.
  • Page 294: Creating A Dhcp Server Group

    DHCP service and advanced DHCP relay agent configuration items Item Description DHCP Service Enable or disable global DHCP. Enable or disable unauthorized DHCP server detection. There are unauthorized DHCP servers on networks, which reply DHCP clients with wrong IP addresses. With this feature enabled, upon receiving a DHCP request, the DHCP relay agent will Unauthorized Server record the IP address of any DHCP server that assigned an IP address to the DHCP...
  • Page 295: Enabling The Dhcp Relay Agent On An Interface

    DHCP server group configuration items Item Description Type the ID of a DHCP server group. Server Group ID You can create up to 20 DHCP server groups. Type the IP address of a server in the DHCP server group. IP Address The server IP address cannot be on the same subnet as the IP address of the DHCP relay agent;...
  • Page 296: Configuring And Displaying Clients' Ip-To-Mac Bindings

    Configuring and displaying clients' IP-to-MAC bindings Select Network  DHCP from the navigation tree to enter the default DHCP Relay page shown in a. In the User Information field, click the User Information button to view static and dynamic bindings, as shown in a.
  • Page 297: Dhcp Relay Agent Configuration Example

    DHCP relay agent configuration example Network requirements As shown in a, VLAN-interface 1 on the DHCP relay agent (Switch A) connects to the network where DHCP clients reside. The IP address of VLAN-interface 1 is 10.10.1.1/24 and the IP address of VLAN-interface 2 is 10.1.1.1/24.
  • Page 298 Enable DHCP Click on the Enable radio button next to DHCP Service.  Click Apply.  # Configure a DHCP server group. In the Server Group field, click Add and then perform the following operations, as shown in c.  Add a DHCP server group Type 1 for Server Group ID.
  • Page 299 Click Apply.  # Enable the DHCP relay agent on VLAN-interface 1. In the Interface Config field, click the icon of VLAN-interface 1, and then perform the following  operations, as shown in d. Enable the DHCP relay agent on an interface and correlate it with a server group ...
  • Page 300: Dhcp Snooping Configuration

    DHCP client and relay agent or between the DHCP client and server. HP recommends you not to to enable the DHCP client, BOOTP client, and DHCP snooping on the same device. Otherwise, DHCP snooping entries may fail to be generated, or the BOOTP client/DHCP client may fail to obtain an IP address.
  • Page 301: Application Environment Of Trusted Ports

    Application environment of trusted ports Configuring a trusted port connected to a DHCP server Configure trusted and untrusted ports As shown in a, a DHCP snooping device’s port that is connected to an authorized DHCP server should be configured as a trusted port to forward reply messages from the DHCP server, so that the DHCP client can obtain an IP address from the authorized DHCP server.
  • Page 302: Dhcp Snooping Support For Option 82

    describes roles of the ports shown in a. Roles of ports Trusted port disabled from Trusted port enabled to Device Untrusted port recording binding entries record binding entries Switch A GigabitEthernet 1/0/1 GigabitEthernet 1/0/3 GigabitEthernet 1/0/2 GigabitEthernet 1/0/3 and Switch B GigabitEthernet 1/0/1 GigabitEthernet 1/0/2 GigabitEthernet 1/0/4...
  • Page 303: Enabling Dhcp Snooping

    Task Remarks Required Specify an interface as trusted and configure DHCP snooping to support Option 82. By default, an interface is untrusted and DHCP snooping does not support Configuring DHCP snooping Option 82. functions on an interface IMPORTANT: You need to specify the ports connected to the authorized DHCP servers as trusted to ensure that DHCP clients can obtain valid IP addresses.
  • Page 304 DHCP snooping configuration page  To enable DHCP snooping, click on the Enable radio button in the DHCP Snooping field.  To disable DHCP snooping, click on the Disable radio button in the DHCP Snooping field. Return to DHCP snooping configuration task list.
  • Page 305: Configuring Dhcp Snooping Functions On An Interface

    Configuring DHCP snooping functions on an interface Select Network  DHCP from the navigation tree, and then click the DHCP Snooping tab to enter the page shown in a. You can view trusted and untrusted ports in the Interface Config field. Click the icon of a specific interface to enter the page shown in a.
  • Page 306: Dhcp Snooping Configuration Example

    DHCP snooping user information DHCP snooping user information configuration items Item Description IP Address This field displays the IP address assigned by the DHCP server to the client. MAC Address This field displays the MAC address of the client. This field displays the client type, which can be: ...
  • Page 307 Network diagram for DHCP snooping configuration Device DHCP server GE1/0/1 Switch DHCP snooping GE1/0/3 GE1/0/2 DHCP client DHCP client Configuration procedure # Enable DHCP snooping. Select Network  DHCP from the navigation tree, and then click the DHCP Snooping tab. Perform the ...
  • Page 308 Enable DHCP snooping Click on the Enable radio button next to DHCP Snooping.  # Configure DHCP snooping functions on GigabitEthernet 1/0/1.  Click the icon of GigabitEthernet 1/0/1 on the interface list. Perform the following operations on the DHCP Snooping Interface Configuration page shown in b.
  • Page 309 Configure DHCP snooping functions on GigabitEthernet 1/0/1  Click on the Trust radio button next to Interface State.  Click Apply. # Configure DHCP snooping functions on GigabitEthernet 1/0/2. Click the icon of GigabitEthernet 1/0/2 on the interface list. Perform the following operations on ...
  • Page 310 Configure DHCP snooping functions on GigabitEthernet 1/0/3 Click on the Untrust radio button for Interface State.  Click on the Enable radio button next to Option 82 Support.  Select Replace for Option 82 Strategy.  Click Apply. ...
  • Page 311: Service Management Configuration

    Service management configuration The service management module provides the following types of services: FTP, Telnet, SSH, SFTP, HTTP and HTTPS. You can enable or disable the services as needed. In this way, the performance and security of the system can be enhanced, thus secure management of the device can be achieved. The service management module also provides the function to modify HTTP and HTTPS port numbers, and the function to associate the FTP, HTTP, or HTTPS service with an ACL, thus reducing attacks of illegal users on these services.
  • Page 312: Configuring Service Management

    Configuring service management Select Network  Service from the navigation tree to enter the service management configuration page, as shown in a. Service management Service management configuration items Item Description Specify whether to enable the FTP service. Enable FTP service The FTP service is disabled by default.
  • Page 313 Item Description Set the port number for HTTP service. You can view this configuration item by clicking the expanding button in front of HTTP. Port Number IMPORTANT: When you modify a port, ensure that the port is not used by other service. Associate the HTTP service with an ACL.
  • Page 314: Diagnostic Tools

    Diagnostic tools Ping The ping command allows you to verify whether a device with a specified address is reachable, and to examine network connectivity. The ping function is implemented through the Internet Control Message Protocol (ICMP): Table 87 The source device sends an ICMP echo request to the destination device. Table 88 The source device determines whether the destination is reachable based on whether it receives an ICMP echo reply.
  • Page 315: Diagnostic Tool Operations

    Table 93 The process continues until the ultimate destination device is reached. No application of the destination uses this UDP port. The destination replies a port unreachable ICMP error message with the destination IP address 1.1.3.2. Table 94 When the source device receives the port unreachable ICMP error message, it knows that the packet has reached the destination, and it can get the addresses of all the Layer 3 devices involved to get to the destination device (1.1.1.2, 1.1.2.2, 1.1.3.2).
  • Page 316: Trace Route Operation

    Ping operation result Trace route operation NOTE: The web interface supports trace route on IPv4 addresses only. Before performing the trace route operation on the Web interface, on the intermediate device execute the ip ttl-expires enable command to enable the sending of ICMP timeout packets and on the destination device execute the ip unreachables enable command to enable the sending of ICMP destination unreachable packets.
  • Page 317 Type in the IP address or host name of the destination device in the Trace Route text box, and click Start to execute the trace route command. You will see the output in the Summary area, as shown in b. Trace route operation result...
  • Page 318: Arp Management

    ARP management ARP overview ARP function The Address Resolution Protocol (ARP) is used to resolve an IP address into an Ethernet MAC address (or physical address). In an Ethernet LAN, when a device sends data to another device, it uses ARP to translate the IP address of the destination device to the corresponding MAC address.
  • Page 319: Arp Operation

    Target protocol address: This field specifies the protocol address of the device the message is being  sent to. ARP operation Suppose that Host A and Host B are on the same subnet and Host A sends a packet to Host B, as shown in a.
  • Page 320: Managing Arp Entries

    Dynamic ARP entry A dynamic entry is automatically created and maintained by ARP. It can get aged, be updated by a new ARP packet, or be overwritten by a static ARP entry. When the aging timer expires or the interface goes down, the corresponding dynamic ARP entry will be removed.
  • Page 321: Creating A Static Arp Entry

    Creating a static ARP entry Select Network  ARP Management from the navigation tree to enter the default ARP Table page shown in a. Click Add to enter the New Static ARP Entry page. Select the Advanced Options checkbox to expand advanced configuration items, as shown in a.
  • Page 322 Network diagram for configuring static ARP entries Configuration procedure # Create VLAN 100.  Select Network  VLAN from the navigation tree, click the Add tab, and then perform the following operations, as shown in a. Create VLAN 100  Type 100 for VLAN ID.
  • Page 323 Click the Modify Port tab and then perform the following operations, as shown in b.  Add GigabitEthernet 1/0/1 to VLAN 100 Select interface GigabitEthernet 1/0/1 in the Select Ports field.  Click on the Untagged radio button in the Select membership type field. ...
  • Page 324 # Create VLAN-interface 100. Select Network  VLAN Interface from the navigation tree, click the Create tab, and then perform the  following operations, as shown in d. Create VLAN-interface 100 Type 100 for VLAN ID.  Select the Configure Primary IPv4 Address checkbox. ...
  • Page 325: Gratuitous Arp

    Create a static ARP entry Type 192.168.1.1 for IP Address.  Type 00e0-fc01-0000 for MAC Address.  Select the Advanced Options checkbox.  Type 100 for VLAN ID.  Select GigabitEthernet1/0/1 for Port.  Click Apply to complete the configuration. ...
  • Page 326 Gratuitous ARP configuration page Gratuitous ARP configuration items Item Description Enable or disable learning of ARP entries according to gratuitous ARP Disable gratuitous ARP packets packets. learning function Enabled by default. Enable the device to send gratuitous ARP packets upon receiving ARP Send gratuitous ARP packets requests from another network segment.
  • Page 327: Arp Attack Defense Configuration

    ARP attack defense configuration Although ARP is easy to implement, it provides no security mechanism and thus is prone to network attacks. ARP attacks and viruses are threatening LAN security. The device can provide multiple features to detect and prevent such attacks. This chapter mainly introduces these features. ARP detection Introduction to ARP detection The ARP detection feature allows only the ARP packets of authorized clients to be forwarded, preventing...
  • Page 328 Man-in-the-middle attack Switch Host A Host C IP_ A IP_C MAC_ A MAC_C Forged Forged ARP reply ARP reply Host B IP_B MAC_B ARP detection mechanism With ARP detection enabled for a specific VLAN, ARP messages arrived on any interface in the VLAN are redirected to the CPU to have their MAC and IP addresses checked.
  • Page 329: Configuring Arp Detection

    ARP detection based on DHCP snooping entries on your access device.  If access clients are 802.1X clients and large in number, and most of them use static IP addresses, HP recommends that you enable 802.1X authentication, upload of client IP addresses, and ARP detection based on 802.1X security entries on your access device.
  • Page 330 NOTE: If both the ARP detection based on specified objects and the ARP detection based on static IP-to-MAC bindings/DHCP snooping entries/802.1X security entries are enabled, the former one applies first, and then the latter applies. Select Network  ARP Anti-Attack from the navigation tree to enter the default ARP Detection page shown in a.
  • Page 331: Creating A Static Binding Entry

    Item Description Select trusted ports. To add ports to the Trusted Ports list box, select one or multiple ports from the Untrusted Trusted Ports Ports list box and click the << button. To remove ports from the Trusted Ports list box, select one or multiple ports from the list box and click the >>...
  • Page 332: 802.1X Fundamentals

    802.1X fundamentals 802.1X is a port-based network access control protocol initially proposed by the IEEE 802 LAN/WAN committee for securing wireless LANs (WLANs), and it has also been widely used on Ethernet networks for access control. 802.1X controls network access by authenticating the devices connected to 802.1X-enabled LAN ports. Architecture of 802.1X 802.1X operates in the client/server model.
  • Page 333: 802.1X-Related Protocols

    Performs unidirectional traffic control to deny traffic from the client.  NOTE: The HP devices support only unidirectional traffic control. 802.1X-related protocols 802.1X uses the Extensible Authentication Protocol (EAP) to transport authentication information for the client, the network access device, and the authentication server. EAP is an authentication framework that uses the client/server model.
  • Page 334 PAE Ethernet type: Protocol type. It takes the value 0x888E for EAPOL.  Protocol version: The EAPOL protocol version used by the EAPOL packet sender.  Type: Type of the EAPOL packet. lists the types of EAPOL packets that the HP implementation of  802.1X supports. Types of EAPOL packets Value...
  • Page 335: Eap Over Radius

    Packet body: Content of the packet. When the EAPOL packet type is EAP-Packet, the Packet body field  contains an EAP packet. EAP over RADIUS RADIUS adds two attributes, EAP-Message and Message-Authenticator, for supporting EAP authentication. For the RADIUS packet format, see the chapter “RADIUS configuration.” EAP-Message RADIUS encapsulates EAP packets in the EAP-Message attribute, as shown in a.
  • Page 336: 802.1X Authentication Procedures

    The access device supports the following modes: Multicast trigger mode—The access device multicasts Identity EAP-Request packets periodically (every  30 seconds by default) to initiate 802.1X authentication.  Unicast trigger mode—Upon receiving a frame with the source MAC address not in the MAC address table, the access device sends an Identity EAP-Request packet out of the receiving port to the unknown MAC address.
  • Page 337: Eap Relay

    Packet exchange method Benefits Limitations  Supports only MD5-Challenge EAP authentication and the "username + password" EAP Works with any RADIUS server that authentication initiated by an EAP termination supports PAP or CHAP authentication. iNode 802.1X client.  The processing is complex on the network access device.
  • Page 338 Table 100 The network access device relays the Identity EAP-Response packet in a RADIUS Access-Request packet to the authentication server. Table 101 The authentication server uses the identity information in the RADIUS Access-Request to search its user database. If a matching entry is found, the server uses a randomly generated challenge (EAP-Request/MD5 challenge) to encrypt the password in the entry, and sends the challenge in a RADIUS Access-Challenge packet to the network access device.
  • Page 339: Eap Termination

    EAP termination shows the basic 802.1X authentication procedure in EAP termination mode, assuming that CHAP authentication is used. 802.1X authentication procedure in EAP termination mode In EAP termination mode, it is the network access device rather than the authentication server generates an MD5 challenge for password encryption (see Step 4).
  • Page 340: 802.1X Configuration

    HP implementation of 802.1X This chapter describes how to configure 802.1X on an HP device. Access control methods HP implements port-based access control as defined in the 802.1X protocol, and extends the protocol to support MAC-based access control.  With port-based access control, once an 802.1X user passes authentication on a port, any subsequent user can access the network through the port without authentication.
  • Page 341: Configuring 802.1X

    Guest VLAN You can configure a guest VLAN on a port to accommodate users that have not performed 802.1X authentication or have failed 802.1X authentication, so they can access a limited set of network resources, such as a software server, to download anti-virus software and system patches. After a user in the guest VLAN passes 802.1X authentication, it is removed from the guest VLAN and can access authorized network resources.
  • Page 342: 802.1X Configuration Task List

    802.1X configuration task list 802.1X configuration task list Task Description Required Enable 802.1X authentication globally and configure the Configuring 802.1X globally authentication method and advanced parameters. By default, 802.1X authentication is disabled globally. Required Error! Reference source not Enable 802.1X authentication on specified ports and configure found.
  • Page 343 Item Description Specify the authentication method for 802.1X users. Options include CHAP, PAP, and EAP.  CHAP: Sets the access device to perform EAP termination and use the CHAP to communicate with the RADIUS server.  PAP: Sets the access device to perform EAP termination and use the PAP to communicate with the RADIUS server.
  • Page 344: Configuring 802.1X On A Port

    Item Description Set the username request timeout timer. The timer starts when the device sends an EAP-Request/Identity packet to a client in response to an authentication request. If the device receives no response before this timer TX-Period expires, it retransmits the request. The timer also sets the interval at which the network device sends multicast EAP-Request/Identity packets to detect clients that cannot actively request authentication.
  • Page 345 802.1X configuration on a port Port 802.1X configuration items Item Description Select the port to be enabled with 802.1X authentication. Only 802.1X-disabled ports are available. IMPORTANT: Port  If the PVID of a port is the same as a voice VLAN, the 802.1X function cannot take effect on the port.
  • Page 346: Configuration Examples

    Item Description Specify whether to enable the online user handshake function. The online user handshake function checks the connectivity status of online 802.1X users. The network access device sends handshake messages to online users at the interval specified by the Handshake Period setting. If no response is received from an online user after the maximum number of handshake attempts (set by the Retry Times setting) has been made, the network access device sets the HandShake...
  • Page 347 All users belong to default domain test. RADIUS authentication is performed. If RADIUS accounting  fails, the switch gets the corresponding user offline. The RADIUS servers run iMC.  A server group with two RADIUS servers is connected to the switch. The IP addresses of the servers are 10.1.1.1 and 10.1.1.2 respectively.
  • Page 348 Global 802.1X configuration  Select the check box before Enable 802.1X.  Select the authentication method as CHAP.  Click Apply to finish the operation. # Enable and configure 802.1X on port GigabitEthernet 1/0/1. In the Ports With 802.1X Enabled area, click Add. ...
  • Page 349 Table 115 Configure the RADIUS scheme system. # Configure the RADIUS authentication servers. From the navigation tree, select Authentication  RADIUS. The RADIUS server configuration page  appears. RADIUS authentication server configuration Select Authentication Server as the server type.  Enter the primary server IP address 10.1.1.1.
  • Page 350 Enter the primary server IP address 10.1.1.2.  Select active as the primary server’s status.  Enter the secondary server IP address 10.1.1.1.  Select active as the secondary server’s status.   Click Apply to finish the operation. # Configure the scheme used for communication between the device and the RADIUS servers. Select the RADIUS Setup tab to enter the RADIUS parameter configuration page.
  • Page 351 Create an ISP domain  Enter test in the Domain Name textbox.  Select Enable to use the domain as the default domain.  Click Apply to finish the operation. # Configure the AAA authentication method for the ISP domain. Select the Authentication tab.
  • Page 352 Select the Default AuthN checkbox and then select RADIUS as the authentication mode.  Select system from the Name drop-down list to use it as the authentication scheme.  Click Apply. A configuration progress dialog box appears, as shown in i. ...
  • Page 353: Acl Assignment Configuration Example

    Configure the AAA accounting method for the ISP domain Select the domain name test.  Select the Default Accounting checkbox and then select RADIUS as the accounting mode.  Select system from the Name drop-down list to use it as the accounting scheme. ...
  • Page 354 Configuration procedure Table 117 Configure the IP addresses of the interfaces. (Omitted) Table 118 Configure the RADIUS scheme system # Configure the RADIUS authentication server. From the navigation tree, select Authentication  RADIUS. The RADIUS server configuration page  appears. RADIUS authentication server configuration Select Authentication Server as the server type.
  • Page 355 Select Accounting Server as the server type.  Enter the primary server IP address 10.1.1.2.  Enter the primary server UDP port number 1813.  Select active as the primary server status.   Click Apply to finish the operation. # Configure the scheme to be used for communication between the switch and the RADIUS servers.
  • Page 356 Create an ISP domain  Enter test in the Domain Name textbox.  Select Enable to use the domain the default domain.  Click Apply to finish the operation. # Configure the AAA authentication method for the ISP domain. Select the Authentication tab. ...
  • Page 357 Select the Default AuthN checkbox and then select RADIUS as the authentication mode.  Select system from the Name drop-down list to use it as the authentication scheme.  Click Apply. A configuration progress dialog box appears, as shown in g. ...
  • Page 358 Configure the AAA accounting method for the ISP domain Select the domain name test.  Select the Accounting Optional checkbox, and then select Enable for this parameter.  Select the Default Accounting checkbox and then select RADIUS as the accounting mode. ...
  • Page 359 Enter 3000 as the ACL number.  Click Apply to finish the operation.  # Configure the ACL to deny packets with destination IP address 10.0.0.1. Select the Advanced Setup tab.  ACL rule configuration Select 3000 from the Select Access Control List(ACL) drop-down list. ...
  • Page 360 Select Deny as the operation action.  In the IP Address Filter area, select the Destination IP Address check box, and enter 10.0.0.1 in the text  box.  Enter 0.0.0.0 in the Destination Wildcard text box. Click Add to finish the operation. ...
  • Page 361 802.1X configuration of GigabitEthernet 1/0/1 Select GigabitEthernet1/0/1 from the port list.  Click Apply to finish the operation.  Configuration verification # After the user passes authentication and gets online, use the ping command to test whether ACL 3000 takes effect. From the navigation tree, select Network ...
  • Page 362 Ping operation summary...
  • Page 363: Aaa Configuration

    AAA configuration Overview Introduction to AAA Authentication, Authorization, and Accounting (AAA) provides a uniform framework for implementing network access management. It can provide the following security functions: Authentication—Identifies users and determines whether a user is valid.  Authorization—Grants different users different rights and controls their access to resources and ...
  • Page 364: Domain-Based User Management

    AAA can be implemented through multiple protocols. The switch supports using RADIUS, which is the most commonly used protocol in practice. For more information, see the chapter “RADIUS configuration.” Domain-based user management On a NAS, each user belongs to one Internet service provider (ISP) domain. A NAS determines the ISP domain a user belongs to by the username entered by the user at login, and controls access of the user based on the AAA methods configured for the domain.
  • Page 365: Configuring An Isp Domain

    Task Remarks Optional Configuring authentication Configure authentication methods for various types of AAA user types methods for the ISP domain users. include LAN users By default, all types of users use local authentication. (such as 802.1X authentication users Optional and MAC Configuring authorization Specify the authorization methods for various types of authentication users),...
  • Page 366: Configuring Authentication Methods For The Isp Domain

    ISP domain configuration items Item Description Type the ISP domain name, which is for identifying the domain. Domain Name You can type a new domain name to create a domain, or specify an existing domain to change its status (whether it is the default domain). Specify whether to use the ISP domain as the default domain.
  • Page 367: Configuring Authorization Methods For The Isp Domain

    Item Description Configure the authentication method and secondary authentication method for LAN LAN-access AuthN users. Name Options include:  Local—Performs local authentication.  None—All users are trusted and no authentication is performed. For security, do not use this mode whenever possible. Secondary Method ...
  • Page 368: Configuring Accounting Methods For The Isp Domain

    Authorization method configuration items Item Description Select an ISP Select the ISP domain for which you want to specify authentication methods. domain Configure the default authorization method and secondary authorization method for all Default AuthZ types of users. Options include: Name ...
  • Page 369 Accounting method configuration page Accounting method configuration items Item Description Select an ISP Select the ISP domain for which you want to specify authentication methods. domain Specify whether to enable the accounting optional feature. Accounting When no accounting server is available or communication with the accounting servers Optional fails, this feature allows users to use network resources and stops the switch from sending real-time accounting updates for the users.
  • Page 370: Aaa Configuration Example

    Item Description  None—Performs no accounting.  RADIUS—Performs RADIUS accounting. You must specify the RADIUS scheme to be Secondary used. Method  Not Set—Uses the default accounting methods. Return to Configuration task list. AAA configuration example Network requirements As shown in a, configure the switch to perform local authentication, authorization, and accounting for Telnet users.
  • Page 371 Configure a local user Enter telnet as the username.  Select Management as the access level.  Enter abcd as the password.  Enter abcd to confirm the password.  Select Telnet Service as the service type.  Click Apply. ...
  • Page 372 Configure ISP domain test Enter test as the domain name.  Click Apply.  # Configure the ISP domain to use local authentication.  Select Authentication  AAA from the navigation tree and then select the Authentication tab, as shown in c.
  • Page 373 Configuration progress dialog box  After the configuration process is complete, click Close. # Configure the ISP domain to use local authorization. Select Authentication  AAA from the navigation tree and then select the Authorization tab, as shown  in e. Configure the ISP domain to use local authorization Select the domain test.
  • Page 374 Configure the ISP domain to use local accounting Select the domain test.  Select the Login Accounting check box and select the accounting method Local.  Click Apply. A configuration progress dialog box appears.  After the configuration process is complete, click Close. ...
  • Page 375: Radius Configuration

    RADIUS configuration Introduction to RADIUS The Remote Authentication Dial-In User Service (RADIUS) protocol implements Authentication, Authorization, and Accounting (AAA). For more information, see the chapter “AAA configuration”. RADIUS uses the client/server model. It can protect networks against unauthorized access and is often used in network environments where both high security and remote user access are required.
  • Page 376: Basic Message Exchange Process Of Radius

    to prevent user passwords from being intercepted on insecure networks, RADIUS encrypts passwords before transmitting them. A RADIUS server supports multiple user authentication methods. Moreover, a RADIUS server can act as the client of another AAA server to provide authentication proxy services. Basic message exchange process of RADIUS illustrates the interaction of the host, the RADIUS client, and the RADIUS server.
  • Page 377: Radius Packet Format

    Table 129 The RADIUS server returns a stop-accounting response (Accounting-Response) and stops accounting for the user. Table 130 The user stops access to network resources. RADIUS packet format RADIUS uses UDP to transmit messages. It ensures the smooth message exchange between the RADIUS server and the client through a series of mechanisms, including the timer management mechanism, retransmission mechanism, and slave server mechanism.
  • Page 378 Table 132 The Identifier field (1 byte long) is used to match request packets and response packets and to detect duplicate request packets. Request and response packets of the same type have the same identifier. Table 133 The Length field (2 byte long) indicates the length of the entire packet, including the Code, Identifier, Length, Authenticator, and Attribute fields.
  • Page 379: Extended Radius Attributes

    Attribute Attribute Callback-Number Tunnel-Client-Endpoint Callback-ID Tunnel-Server-Endpoint (unassigned) Acct-Tunnel-Connection Framed-Route Tunnel-Password Framed-IPX-Network ARAP-Password State ARAP-Features Class ARAP-Zone-Access Vendor-Specific ARAP-Security Session-Timeout ARAP-Security-Data Idle-Timeout Password-Retry Termination-Action Prompt Called-Station-Id Connect-Info Calling-Station-Id Configuration-Token NAS-Identifier EAP-Message Proxy-State Message-Authenticator Login-LAT-Service Tunnel-Private-Group-id Login-LAT-Node Tunnel-Assignment-id Login-LAT-Group Tunnel-Preference Framed-AppleTalk-Link ARAP-Challenge-Response Framed-AppleTalk-Network Acct-Interim-Interval Framed-AppleTalk-Zone...
  • Page 380: Protocols And Standards

    A vendor can encapsulate multiple sub-attributes in the type-length-value (TLV) format in RADIUS packets for extension of applications. As shown in a, a sub-attribute that can be encapsulated in Attribute 26 consists of the following parts: Vendor-ID—Indicates the ID of the vendor. Its most significant byte is 0; the other three bytes contains ...
  • Page 381: Configuring Radius Servers

    Task Description Optional Configuring RADIUS Configure the information related to the primary and accounting servers secondary RADIUS accounting servers. By default, no RADIUS accounting server is configured. Required Configuring RADIUS Configure the parameters that are necessary for information exchange between the parameters device and RADIUS servers.
  • Page 382: Configuring Radius Parameters

    Item Description Set the status of the primary server, including:  active: The server is working normally. Primary Server Status  blocked: The server is down. If the IP address of the primary server is not specified or the specified IP address is to be removed, the status is blocked.
  • Page 383 RADIUS parameter configuration RADIUS parameters Item Description Specify the type of the RADIUS server supported by the device, including:  extended: Specifies an extended RADIUS server (usually a CAMS or iMC server). That is, the RADIUS client and RADIUS server communicate using the proprietary RADIUS protocol and Server Type packet format.
  • Page 384 Item Description Set the maximum number of transmission attempts. Timeout Retransmission Times The product of the timeout value and the number of retransmission attempts cannot exceed 75. Set the real-time accounting interval, whose value must be n times 3 (n is an integer). To implement real-time accounting on users, it is necessary to set the real-time accounting interval.
  • Page 385: Radius Configuration Example

    Item Description Specify the unit for data packets sent to the RADIUS server, which can be  one-packet Unit of Packets  kilo-packet  mega-packet  giga-packet Relationship between the real-time accounting interval and the number of users Number of users Real-time accounting interval (in minutes) 1 to 99 100 to 499...
  • Page 386 # Configure the RADIUS authentication server. From the navigation tree, select Authentication  RADIUS. The RADIUS server configuration page  appears. Configure the RADIUS authentication server Select Authentication Server as the server type.  Enter 10.110.91.146 as the IP address of the primary authentication server ...
  • Page 387  Select active as the primary server status. Click Apply.  # Configure the parameters for communication between the switch and the RADIUS servers. Select the RADIUS Setup tab.  Configure RADIUS parameters Select extended as the server type.  Select the Authentication Server Shared Key check box and enter expert in the text box.
  • Page 388 Create an ISP domain Enter test in the Domain Name textbox.  Select Enable to use the domain as the default domain.   Click Apply. # Configure the AAA authentication method for the ISP domain.  Select the Authentication tab. Configure the AAA authentication method for the ISP domain Select the domain name test.
  • Page 389 Configuration progress dialog box  After the configuration process is complete, click Close. # Configure the AAA authorization method for the ISP domain.  Select the Authorization tab. Configure the AAA authorization method for the ISP domain Select the domain name test. ...
  • Page 390: Configuration Guidelines

    Configure the AAA accounting method for the ISP domain Select the domain name test.   Select the Accounting Optional checkbox and then select Enable. Select the Default Accounting checkbox and then select RADIUS as the accounting mode.  Select system from the Name drop-down list to use it as the accounting scheme. ...
  • Page 391: Users

    Users This module allows you to configure local users and user groups. Local user A local user represents a set of user attributes configured on a device (such as the user password, service type, and authorization attribute), and is uniquely identified by the username. For a user requesting a network service to pass local authentication, you must add an entry as required in the local user database of the device.
  • Page 392 Local user configuration page Local user configuration items Item Description Username Specify a name for the local user. Password Specify and confirm the password of the local user. The settings of these two fields must be the same. Confirm Select a user group for the local user. Group For more information about user group configuration, see “Configuring a user...
  • Page 393: Configuring A User Group

    Specify the user profile for the local user. NOTE: User-profile HP V1910 Switch Series does not support user-profile configuration. Configuring a user group Select Authentication  Users from the navigation tree, and then select the User Group tab to display the existing user groups, as shown in a.
  • Page 394 Specify the ACL to be used by the access device to control the access of users of the user group after the users pass authentication. Specify the user profile for the user group. User-profile NOTE: HP V1910 Switch Series does not support user-profile configuration.
  • Page 395: Pki Configuration

    PKI configuration PKI overview The Public Key Infrastructure (PKI) is a hierarchical framework designed for providing information security through public key technologies and digital certificates and verifying the identities of the digital certificate owners. PKI employs digital certificates, which are bindings of certificate owner identity information and public keys. It allows users to obtain certificates, use certificates, and revoke certificates.
  • Page 396: Applications Of Pki

    PKI architecture Entity An entity is an end user of PKI products or services, such as a person, an organization, a device like a router or a switch, or a process running on a computer. A certificate authority (CA) is a trusted authority responsible for issuing and managing digital certificates. A CA issues certificates, specifies the validity periods of certificates, and revokes certificates as needed by publishing CRLs.
  • Page 397: Operation Of Pki

    Secure email Emails require confidentiality, integrity, authentication, and non-repudiation. PKI can address these needs. The secure e-mail protocol that is developing rapidly is Secure/Multipurpose Internet Mail Extensions (S/MIME), which is based on PKI and allows for transfer of encrypted mails with signature. Web security For Web security, two peers can establish a Secure Sockets Layer (SSL) connection first for transparent and secure communications at the application layer.
  • Page 398 Configuration task list for requesting a certificate manually Task Remarks Required Create a PKI entity and configure the identity information. A certificate is the binding of a public key and an entity, where an entity is the collection of the identity information of a user. A CA identifies a certificate applicant by Creating a PKI entity entity.
  • Page 399 Task Remarks Required When requesting a certificate, an entity introduces itself to the CA by providing its identity information and public key, which will be the major components of the certificate. A certificate request can be submitted to a CA in two ways: online and offline. ...
  • Page 400: Creating A Pki Entity

    Task Remarks Optional Destroying the RSA Destroy the existing RSA key pair and the corresponding local certificate. key pair If the certificate to be retrieved contains an RSA key pair, you need to destroy the existing key pair. Otherwise, the retrieving operation will fail. Optional Retrieving a certificate...
  • Page 401: Creating A Pki Domain

    PKI entity configuration items Item Description Entity Name Type the name for the PKI entity. Common Name Type the common name for the entity. IP Address Type the IP address of the entity. Type the fully qualified domain name (FQDN) for the entity. An FQDN is a unique identifier of an entity on the network.
  • Page 402 PKI domain configuration page PKI domain configuration items Item Description Domain Name Type the name for the PKI domain. Type the identifier of the trusted CA. An entity requests a certificate from a trusted CA. The trusted CA takes the responsibility CA Identifier of certificate registration, distribution, and revocation, and query.
  • Page 403 Item Description Type the URL of the RA. The entity will submit the certificate request to the server at this URL through the SCEP protocol. The SCEP protocol is intended for communication between an entity and an authentication authority. Requesting URL In offline mode, this item is optional;...
  • Page 404: Generating An Rsa Key Pair

    Return to Configuration task list for requesting a certificate manually. Return to Configuration task list for requesting a certificate automatically. Generating an RSA key pair Select Authentication  PKI from the navigation tree, and then select the Certificate tab to enter the page displaying existing PKI certificates, as shown in a.
  • Page 405: Retrieving A Certificate

    as shown in a. Then, click Apply to destroy the existing RSA key pair and the corresponding local certificate. Key pair destruction page Return to Configuration task list for requesting a certificate manually. Return to Configuration task list for requesting a certificate automatically.
  • Page 406 Item Description  If the certificate file is saved on the device, select Get File From Device and then specify the path of the file on the device. Get File From PC  If the certificate file is saved on a local PC, select Get File From PC and. then specify the path to the file and select the partition of the device for saving the file.
  • Page 407: Requesting A Local Certificate

    Requesting a local certificate Select Authentication  PKI from the navigation tree, and then select the Certificate tab to enter the page displaying existing PKI certificates, as shown in a. Click Request Cert to enter the local certificate request page, as shown in a. Local certificate request page Configuration items for requesting a local certificate Item...
  • Page 408: Retrieving And Displaying A Crl

    Retrieving and displaying a CRL Select Authentication  PKI from the navigation tree, and then select the CRL tab to enter the page displaying CRLs, as shown in a. CRL page  Click Retrieve CRL to retrieve the CRL of a domain. ...
  • Page 409: Pki Configuration Example

    Field Description Identifier of the CA that issued the certificate and the certificate version X509v3 Authority Key Identifier (X509v3). Pubic key identifier keyid A CA may have multiple key pairs, and this field identifies which key pair is used for the CRL signature. Return to Configuration task list for requesting a certificate manually.
  • Page 410 After completing the above configuration, you need to perform CRL related configurations. In this example, select the local CRL publishing mode of HTTP and set the HTTP URL to http://4.4.4.133:447/myca.crl. After the above configuration, make sure that the system clock of the Switch is synchronous to that of the CA, so that the Switch can request certificates and retrieve CRLs properly.
  • Page 411 PKI domain list Configure a PKI domain  Type torsa as the PKI domain name.  Type myca as the CA identifier.  Select aaa as the local entity.  Select CA as the authority for certificate request.  Type http://4.4.4.133:446/c95e970f632d27be5e8cbf80e971d9c4a9a93337 as the URL for certificate request.
  • Page 412 Type http://4.4.4.133:447/myca.crl as the CRL URL.  Click Apply. A dialog box appears, asking “Fingerprint of the root certificate not specified. No root  certificate validation will occur. Continue?” Click OK. # Generate an RSA key pair. Select the Certificate tab, and then click Create Key, as shown in f, and perform the configuration as ...
  • Page 413 Certificate list Retrieve the CA certificate  Select torsa as the PKI domain.  Select CA as the certificate type.  Click Apply. # Request a local certificate. Select the Certificate tab, and then click Request Cert, as shown in j, and then perform the following ...
  • Page 414: Configuration Guidelines

    Request a local certificate Select torsa as the PKI domain.  Select Password and then type challenge-word as the password.  Click Apply.  # Retrieve the CRL.  After retrieving a local certificate, select the CRL tab.  Click Retrieve CRL of the PKI domain of torsa, as shown in l. Retrieve the CRL Configuration guidelines When you configure PKI, note the following guidelines:...
  • Page 415: Port Isolation Group Configuration

    VLAN, allowing for great flexibility and security. HP V1910 Switch Series supports only one isolation group that is created automatically by the system as isolation group 1. You can neither remove the isolation group nor create other isolation groups on such devices.
  • Page 416: Port Isolation Group Configuration Example

     Uplink-port: Assign the port to the isolation group as the uplink port. IMPORTANT: The uplink port is not supported on HP V1910 Switch Series. Select the port(s) you want to assign to the isolation group. Select port(s) You can click ports on the chassis front panel for selection; if aggregation interfaces are configured, they will be listed under the chassis panel for selection.
  • Page 417 Configure isolated ports for an isolation group  Select Isolate port for the port type.  Select GigabitEthernet 1/0/2, GigabitEthernet 1/0/3, and GigabitEthernet 1/0/4 on the chassis front panel. Click Apply. A configuration progress dialog box appears.  After the configuration process is complete, click Close in the dialog box. ...
  • Page 418: Authorized Ip Configuration

    Authorized IP configuration Overview The authorized IP function is to associate the HTTP or Telnet service with an ACL to filter the requests of clients. Only the clients that pass the ACL filtering can access the device. Configuring authorized IP Select Security ...
  • Page 419: Authorized Ip Configuration Example

    Authorized IP configuration example Authorized IP configuration example Network requirements In a, configure Switch to deny Telnet and HTTP requests from Host A, and permit Telnet and HTTP requests from Host B. Network diagram for authorized IP Configuration procedure # Create an ACL. Select QoS ...
  • Page 420 Select 2001 from the Select Access Control List (ACL) drop-down list.  Select Permit from the Operation drop-down list.  Select the Source IP Address check box and then type 10.1.1.3.  Type 0.0.0.0 in the Source Wildcard text box. ...
  • Page 421 Configure authorized IP...
  • Page 422: Acl Configuration

    ACL configuration ACL overview With the growth of network scale and network traffic, network security and bandwidth allocation become more and more critical to network management. Packet filtering can be used to efficiently prevent illegal access to networks and to control network traffic and save network resources. One way to implement packet filtering is to use access control lists (ACLs).
  • Page 423: Effective Period Of An Acl

    Depth-first match for IPv4 ACLs IPv4 ACL category Depth-first match procedure Sort rules by source IP address wildcard mask and compare packets against the rule configured with more zeros in the source Basic IPv4 ACL IP address wildcard mask. In case of a tie, compare packets against the rule configured first. Sort rules by the protocol carried over IP.
  • Page 424: Acl Step

    ACL step NOTE: The Web interface does not support ACL step configuration. Meaning of the step The step defines the difference between two neighboring numbers that are automatically assigned to ACL rules by the device. For example, with a step of 5, rules are automatically numbered 0, 5, 10, 15, and so on.
  • Page 425: Configuring A Time Range

    Configuring a time range Select QoS  Time Range from the navigation tree and then select the Create tab to enter the time range configuration page, as shown in a. The page for creating a time range describes the configuration items for creating a time range. Time range configuration items Item Description...
  • Page 426: Creating An Ipv4 Acl

    Item Description of the week Set the end time and date of the absolute time range. The time only within the of the day is in the hh:mm format (24-hour clock), and the date specified is in the MM/DD/YYYY format. The end time must be greater period.
  • Page 427 The page for configuring an basic IPv4 ACL describes the configuration items for creating a rule for a basic IPv4 ACL. Configuration items for a basic IPv4 ACL rule Item Description Select the basic IPv4 ACL for which you want to configure rules. Select Access Control List (ACL) Available ACLs are basic IPv4 ACLs that have been configured.
  • Page 428: Configuring A Rule For An Advanced Ipv4 Acl

    Item Description and a wildcard mask, in dotted decimal notation. Source Wildcard Select the time range during which the rule takes effect. Time Range Available time ranges are those that have been configured. Return to IPv4 ACL configuration task list. Configuring a rule for an advanced IPv4 ACL Select QoS ...
  • Page 429 The page for configuring an advanced IPv4 ACL describes the configuration items for creating a rule for an advanced IPv4 ACL.
  • Page 430 Configuration items for an advanced IPv4 ACL rule Item Description Select the advanced IPv4 ACL for which you want to configure rules. Select Access Control List (ACL) Available ACLs are advanced IPv4 ACLs that have been configured. Select the Rule ID option and type a number for the rule. Rule ID If you do not specify the rule number, the system will assign one automatically.
  • Page 431: Configuring A Rule For An Ethernet Frame Header Acl

    Item Description These items are available only when you select 6 TCP or To Port 17 UDP from the Protocol drop-down box. Operator Different operators have different configuration Port requirements for the port number fields:  Not Check—The following port number fields cannot be configured.
  • Page 432 The page for configuring a rule for an Ethernet frame header ACL describes the configuration items for creating a rule for an Ethernet frame header IPv4 ACL. Configuration items for an Ethernet frame header IPv4 ACL rule Item Description Select the Ethernet frame header IPv4 ACL for which you want to configure rules.
  • Page 433: Configuration Guidelines

    Item Description Destination Mask COS(802.1p precedence) Specify the 802.1p precedence for the rule. Select the LSAP Type option and specify the DSAP and SSAP fields in the LLC LSAP Type encapsulation by configuring the following items:  LSAP Type—Indicates the frame encapsulation format. LSAP Mask ...
  • Page 434: Qos Configuration

    QoS configuration Introduction to QoS Quality of Service (QoS) reflects the ability of a network to meet customer needs. In an Internet, QoS evaluates the ability of the network to forward packets of different services. The evaluation can be based on different criteria because the network may provide various services. Generally, QoS performance is measured with respect to bandwidth, delay, jitter, and packet loss ratio during packet forwarding process.
  • Page 435 Traffic congestion causes The traffic enters a device from a high speed link and is forwarded over a low speed link.   The packet flows enter a device from several incoming interfaces and are forwarded out an outgoing interface, whose rate is smaller than the total rate of these incoming interfaces. When traffic arrives at the line speed, a bottleneck is created at the outgoing interface causing congestion.
  • Page 436: End-To-End Qos

    End-to-end QoS End-to-end QoS model As shown in a, traffic classification, traffic policing, traffic shaping, congestion management, and congestion avoidance are the foundations for a network to provide differentiated services. Mainly they implement the following functions: Traffic classification uses certain match criteria to organize packets with different characteristics into ...
  • Page 437: Packet Precedences

    adopt the classification results from its upstream network or classify the packets again according to its own criteria. To provide differentiated services, traffic classes must be associated with certain traffic control actions or resource allocation actions. What traffic control actions to adopt depends on the current phase and the resources of the network.
  • Page 438 Assured forwarding (AF) class: This class is divided into four subclasses (AF 1 to AF 4), each  containing three drop priorities for more granular classification. The QoS level of the AF class is lower than that of the EF class. ...
  • Page 439: Queue Scheduling

    As shown in b, the 4-byte 802.1Q tag header consists of the tag protocol identifier (TPID, two bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length). presents the format of the 802.1Q tag header. 802.1Q tag header Byte 1 Byte 2...
  • Page 440 Schematic diagram for SP queuing A typical switch provides eight queues per port. As shown in a, SP queuing classifies eight queues on a port into eight classes, numbered 7 to 0 in descending priority order. SP queuing schedules the eight queues strictly according to the descending order of priority. It sends packets in the queue with the highest priority first.
  • Page 441: Line Rate

    queue. On a 100 Mbps port, you can set the weight values of WRR queuing to 50, 30, 10, 10, 50, 30, 10, and 10 (corresponding to w7, w6, w5, w4, w3, w2, w1, and w0 respectively). In this way, the queue with the lowest priority is assured of at least 5 Mbps of bandwidth, avoiding the disadvantage of SP queuing that packets in low-priority queues may fail to be served for a long time.
  • Page 442: Priority Mapping

    Mean rate—The rate at which tokens are put into the bucket (the permitted average rate of traffic). It  is usually set to the committed information rate (CIR). Burst size—The capacity of the token bucket (the maximum traffic size that is permitted in each burst). ...
  • Page 443: Introduction To Priority Mapping Tables

    The device provides the following priority trust modes on a port: Trust packet priority—The device assigns to the packet the priority parameters corresponding to the  packet’s priority from the mapping table.  Trust port priority—The device assigns a priority to a packet by mapping the priority of the receiving port.
  • Page 444: Qos Configuration

    The default DSCP to CoS/DSCP to Queue mapping table Input DSCP value Local precedence (Queue) 0 to 7 8 to 15 16 to 23 24 to 31 32 to 39 40 to 47 48 to 55 56 to 63 NOTE: In the default DSCP to DSCP mapping table, an input value yields a target value equal to it.
  • Page 445 Task Remarks Required Creating a traffic behavior Create a traffic behavior. Configuring traffic Configure a mirroring and traffic traffic redirecting for a Use either approach Configuring actions behavior traffic behavior Configure various actions for the traffic for a behavior behavior. Configuring other actions for a traffic behavior...
  • Page 446: Creating A Class

    Priority mapping table configuration task list Task Remarks Required Configuring priority mapping tables Set priority mapping tables. Configuring priority trust mode Perform the task in to configure priority trust mode: Priority trust mode configuration task list Task Remarks Required Configuring priority trust mode on a port Set the priority trust mode of a port.
  • Page 447: Configuring Match Criteria

    Return to QoS policy configuration task list. Configuring match criteria Select QoS  Classifier from the navigation tree and click Setup to enter the page for setting a class, as shown in a. The page for configuring match criteria shows the configuration items of configuring match criteria. Configuration items of configuring match criteria Item Description...
  • Page 448 Item Description Define a match criterion to match DSCP values. If multiple such match criteria are configured for a class, the new configuration does not overwrite the previous one. DSCP You can configure up to eight DSCP values each time. If multiple identical DSCP values are specified, the system considers them as one.
  • Page 449: Creating A Traffic Behavior

    Item Description Define a match criterion to match customer VLAN IDs. If multiple such match criteria are configured for a class, the new configuration does not overwrite the previous one. You can configure multiple VLAN IDs each time. If the same VLAN ID is specified multiple times, the system considers them as one.
  • Page 450: Configuring Traffic Mirroring And Traffic Redirecting For A Traffic Behavior

    Configuring traffic mirroring and traffic redirecting for a traffic behavior Select QoS  Behavior from the navigation tree and click Port Setup to enter the port setup page for a traffic behavior, as shown in a. Port setup page for a traffic behavior describes the traffic mirroring and traffic redirecting configuration items.
  • Page 451: Configuring Other Actions For A Traffic Behavior

    Configuring other actions for a traffic behavior Select QoS  Behavior from the navigation tree and click Setup to enter the page for setting a traffic behavior, as shown in a. The page for setting a traffic behavior describes the configuration items of configuring other actions for a traffic behavior. Configuration items of configuring other actions for a traffic behavior Item Description...
  • Page 452: Creating A Policy

    Creating a policy Select QoS  QoS Policy from the navigation tree and click Create to enter the page for creating a policy, as shown in a. The page for creating a policy describes the configuration items of creating a policy. Configuration items of creating a policy Item Description...
  • Page 453: Applying A Policy To A Port

    The page for setting a policy describes the configuration items of configuring classifier-behavior associations for the policy. Configuration items of configuring classifier-behavior associations for the policy Item Description Please select a policy Select a created policy in the drop-down list. Select an existing classifier in the drop-down list.
  • Page 454: Configuring Queue Scheduling On A Port

    The page for applying a policy to a port describes the configuration items of applying a policy to a port. Configuration items of applying a policy to a port Item Description Please select a policy Select a created policy in the drop-down list. Set the direction in which the policy is to be applied.
  • Page 455: Configuring Line Rate On A Port

    describes the configuration items of configuring queue scheduling on a port. Configuration items of configuring queue scheduling on a port Item Description Enable or disable the WRR queue scheduling mechanism on selected ports. Two options are available:  Enable—Enables WRR on selected ports. ...
  • Page 456: Configuring Priority Mapping Tables

    The page for configuring line rate on a port describes the configuration items of configuring line rate on a port. Configuration items of configuring line rate on a port Item Description Select the types of interfaces to be configured with line rate. Please select an interface type The interface types available for selection depend on your device model.
  • Page 457: Configuring Priority Trust Mode On A Port

    The page for configuring priority mapping tables describes the configuration items of configuring priority mapping tables. Configuration items of configuring priority mapping tables Item Description Select the priority mapping table to be configured, which can be CoS to DSCP, CoS to Queue, DSCP to CoS, DSCP to DSCP, or DSCP to Mapping Type Queue.
  • Page 458 The page for configuring port priority The page for modifying port priority describes the port priority configuration items. Port priority configuration items Item Description Interface The interface to be configured. Priority Set a local precedence value for the port. Select a priority trust mode for the port: ...
  • Page 459: Configuration Guidelines

    Return toPriority trust mode configuration task list. Configuration guidelines When an ACL is referenced to implement QoS, the actions defined in the ACL rules, deny or permit, do not take effect; actions to be taken on packets matching the ACL depend on the traffic behavior definition in QoS.
  • Page 460: Acl/Qos Configuration Examples

    ACL/QoS configuration examples ACL/QoS configuration example Network requirements As shown in b, in the network, the FTP server at IP address 10.1.1.1/24 is connected to the Switch, and the clients access the FTP server through GigabitEthernet 1/0/1 of the Switch. Configure an ACL and a QoS policy as follows to prevent the hosts from accessing the FTP server from 8:00 to 18:00 every day: Table 152...
  • Page 461 Define a time range covering 8:00 to 18:00 every day Type the time range name test-time.  Select the Periodic Time Range option, set the Start Time to 8:00 and the End Time to 18:00, and then  select the checkboxes Sun through Sat. Click Apply.
  • Page 462 Create an advanced IPv4 ACL Type the ACL number 3000.  Click Apply.  # Define an ACL rule for traffic to the FTP server.  Click Advanced Setup.
  • Page 463 Define an ACL rule for traffic to the FTP server Select ACL 3000 in the drop-down list.  Select the Rule ID option, and type rule ID 2.   Select Permit in the Operation drop-down list. Select the Destination IP Address option, and type IP address 10.1.1.1 and destination wildcard mask ...
  • Page 464 # Create a class. Select QoS  Classifier from the navigation tree and click Create.  Create a class Type the class name class1.  Click Create.  # Define match criteria.  Click Setup.
  • Page 465 Define match criteria Select the class name class1 in the drop-down list.  Select the ACL IPv4 option, and select ACL 3000 in the following drop-down list.  Click Apply. A configuration progress dialog box appears, as shown in g. ...
  • Page 466 Configuration progress dialog box After the configuration is complete, click Close on the dialog box.  # Create a traffic behavior. Select QoS  Behavior from the navigation tree and click Create.  Create a traffic behavior Type the behavior name behavior1. ...
  • Page 467 Configure actions for the behavior  Select behavior1 in the drop-down list. Select the Filter option, and then select Deny in the following drop-down list.  Click Apply. A configuration progress dialog box appears.  After the configuration is complete, click Close on the dialog box. ...
  • Page 468 Create a policy  Type the policy name policy1. Click Create.  # Configure classifier-behavior associations for the policy.  Click Setup. Configure classifier-behavior associations for the policy Select policy1.   Select class1 in the Classifier Name drop-down list. Select behavior1 in the Behavior Name drop-down list.
  • Page 469 Apply the QoS policy in the inbound direction of GigabitEthernet 1/0/1 Select policy1 in the Please select a policy drop-down list.  Select Inbound in the Direction drop-down list.  Select port GigabitEthernet 1/0/1.  Click Apply. A configuration progress dialog box appears. ...
  • Page 470: Poe Configuration

    PoE configuration NOTE: Only HP V1910-24G-PoE (365W) Switch JE007A and HP V1910-24G-PoE (170W) Switch JE008A support the PoE function. PoE overview Power over Ethernet (PoE) means that power sourcing equipment (PSE) supplies power to powered devices (PDs) from Ethernet interfaces through twisted pair cables.
  • Page 471: Protocol Specification

    PSE. The system uses PSE IDs to identify different PSEs. NOTE: HP V1910-24G-PoE (365W) Switch JE007A and HP V1910-24G-PoE (170W) Switch JE008A are devices with a single PSE, so this document describes the device with a single PSE only.
  • Page 472 port setup page PoE port configuration items Item Description Click to select ports to be configured and they will be displayed in the Select Port Selected Ports list box. Enable or disable PoE on the selected ports.  The system does not supply power to or reserve power for the PD connected to a PoE port if the PoE port is not enabled with the PoE function.
  • Page 473: Configuring Non-Standard Pd Detection

    Item Description Set the power supply priority for a PoE port. The priority levels of a PoE port include low, high, and critical in ascending order.  When the PoE power is insufficient, power is first supplied to PoE ports with a higher priority level.
  • Page 474: Displaying Information About Pse And Poe Ports

    To disable the non-standard PD detection for all PSEs, click Disable All.  Displaying information about PSE and PoE ports Select PoE  PoE from the navigation tree to enter the page of the Summary tab. The upper part of the page displays the PSE summary.
  • Page 475 Network diagram for PoE GE1/0/11 GE1/0/1 GE1/0/2 Configuration procedure # Enable PoE on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2, and set their power supply priority to critical. Select PoE  PoE from the navigation tree and click the Setup tab to perform the following ...
  • Page 476 Configure the PoE port supplying power to AP  Click to select port GigabitEthernet 1/0/11 from the chassis front panel. Select Enable from the Power State drop-down list.   Select the check box before Power Max and type 9000. Click Apply.
  • Page 477: Support And Other Resources

    Operating system type and revision level Detailed questions  Related information To find related documents, go to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals Conventions This section describes the conventions used in this documentation. Command conventions...
  • Page 478: Subscription Service

    The port numbers in this document are for illustration only and might be unavailable on your device. Subscription service HP recommends that you register your product at the Subscriber's Choice for Business website: http://www.hp.com/go/e-updates After registering, you will receive e-mail notification of product enhancements, new driver versions,...
  • Page 479: Index

    Index A B C D E F G H I L M O P Q R S T V W...
  • Page 480 AAA configuration example,358 overview,410 ACL/QoS configuration example,448 Architecture of 802.1X,320 detection,315 overview,306 Authorized IP configuration example,407 Back up configuration,56 Basic service setup,28 commands,21 Configuration example for upgrading the system software image at the CLI,26 Configuration examples,334 Configuration examples,78 Configuration guidelines,203 Configuration guidelines,378 Configuration...
  • Page 481 Configuring IPv4 routing,267 Configuring link aggregation and LACP,208 Configuring LLDP,223 Configuring local port mirroring,75 Configuring log management,52 Configuring MAC addresses,173 Configuring MSTP,190 Configuring PKI,385 Configuring PoE,459 Configuring RADIUS,368 Configuring RMON,97 Configuring service management,300 Configuring stack management,32 Configuring storm constrain,91 Configuring system time,48 Configuring the voice VLAN,155...
  • Page 482 Getting started with the CLI,16 Gratuitous ARP,313 HP implementation of 802.1X,328 IGMP snooping configuration example,259 Initialize,58 Initiating 802.1X authentication,323 Introduction to DHCP,274 Introduction to DHCP relay agent,279 Introduction to port mirroring,74 Introduction to QoS,422 Introduction to the common items on the web...
  • Page 483 Overview,351 PKI configuration example,397 overview,383 PoE configuration example,462 overview,458 Port isolation group configuration example,404 Port management configuration example,70 Precautions,273 Protocols and standards,278 configuration,432 RADIUS configuration example,373 Restore configuration,56 RMON configuration example,108 RSTP,184 Save configuration,57 SNMP configuration,1 16 SNMP configuration example,127 Software upgrade,59 Stack configuration...

This manual is also suitable for:

V1910-24g-poe (365w)V1910-24g-poe (170w)

Table of Contents