HP Blade bc1500, Blade bc2000, Blade bc2500 User Manual

Embedded Web System User Guide
for the HP BladeSystem PC Blade Switch
Document Part Number: 413353-002
June 2006
© Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
This document contains proprietary information that is protected by copyright. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard Company.
WARNING: Text set off in this manner indicates that failure to follow directions could result in bodily
Å
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage
Ä
to equipment or loss of information.
Embedded Web System User Guide
for the HP BladeSystem PC Blade Switch
First Edition (February 2006) Second Edition (June 2006)
Document Part Number: 413353-002
Contents
Preface
1 Getting Started
Starting the Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–1
Understanding the Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2
Using the Management Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–3
Device Representation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4
Using Screen and Table Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4
Adding Device Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–5
Modifying Device Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–5
Deleting Device Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–5
Resetting the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6
Logging Off the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6
2 Defining System Information
3 Configuring System Time
Configuring Daylight Savings Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–1
Configuring SNTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–5
Defining SNTP Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–6
Defining SNTP Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
Defining SNTP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8
4 Configuring Device Security
Configuring Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–1
Defining Access Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–1
Defining Profile Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4
Defining Authentication Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–6
Mapping Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–9
Defining TACACS+ Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
Defining RADIUS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–14
Configuring Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–17
Defining Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–17
Defining Line Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–19
Defining Enable Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–21
Configuring Network Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–22
Network Security Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–22
Port-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–22
Advanced Port-Based Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–22
Embedded Web System User Guide www.hp.com iii
Contents
Defining Port Authentication Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–23
Defining Port Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–24
Configuring Multiple Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–27
Defining Authentication Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–29
Viewing EAP Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–30
Configuring Traffic Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–31
Defining Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–31
Defining MAC Based Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–37
Managing Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–42
Enabling Storm Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–44
5 Configuring System Logs
Defining General Log Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2
Viewing Memory Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3
Viewing Flash Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–4
Defining System Log Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–5
6 Configuring Interfaces
Configuring Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–1
Aggregating Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–4
Configuring LAG Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5
Configuring LAG Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7
Configuring LACP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9
Configuring VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–10
Defining VLAN Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–11
Defining VLAN Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–13
Defining VLAN Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–14
Configuring GARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–16
Defining GARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–16
Defining GVRP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–18
Viewing GVRP Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–20
7 Defining IP Addresses
Configuring IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–1
Defining IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–1
Defining ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–3
Defining Domain Name Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5
Defining DNS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5
Defining DNS Host Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–7
8 Defining the Forwarding Database
Defining Static Forwarding Database Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–1
Defining Dynamic Forwarding Database Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–3
9 Configuring Spanning Tree
Defining Classic Spanning Tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2
iv www.hp.com Embedded Web System User Guide
Defining STP on Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4
Defining Rapid Spanning Tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–7
Defining Multiple Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–9
Defining MSTP Instance Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10
Defining MSTP Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–12
Instance to VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15
10Configuring Multicast Forwarding
Defining IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10–1
Defining Multicast Bridging Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10–3
Defining Multicast Forward All Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10–5
11Configuring SNMP
SNMP v1 and v2c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–1
SNMP v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–1
Configuring SNMP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–2
Defining SNMP Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–2
Defining SNMP Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–3
Defining SNMP Group Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–4
Defining SNMP Group Membership. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–6
Defining SNMP Communities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–9
Configuring SNMP Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–11
Defining SNMP Notification Global Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–11
Defining SNMP Notification Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–12
Defining SNMP Notification Recipients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11–13
Contents
12Managing System Files
Downloading System Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12–2
Uploading System Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12–3
Copying Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12–4
Activating the Image File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12–5
13Configuring Quality of Service
Quality of Service Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–1
VPT Classification Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–1
CoS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–1
Defining General QoS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–2
Configuring QoS General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–2
Restoring Factory Default QoS Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–3
Defining Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–3
Defining Rate Limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–4
Mapping CoS Values to Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–7
Mapping DSCP Values to Queues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–8
Defining QoS Basic Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–9
Defining Basic Mode Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–9
Rewriting Basic Mode DSCP Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–10
Defining QoS Advanced Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–11
Embedded Web System User Guide www.hp.com v
Contents
Configuring DSCP Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–11
Class Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–12
Defining Aggregate Policer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–14
Defining Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–16
Setting Policy Binding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13–19
14Managing Device Diagnostics
Configuring Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14–1
Viewing Integrated Cable Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14–3
Viewing Optical Transceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14–4
Viewing CPU Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14–5
15Viewing Statistics
Viewing Interface Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–1
Viewing Interface Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–1
Viewing Etherlike Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–3
Managing RMON Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–4
Viewing RMON Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–4
Configuring RMON History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–6
Defining RMON History Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–6
Viewing the RMON History Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–8
Configuring RMON Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–9
Defining RMON Events Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–9
Viewing the RMON Events Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–11
Defining RMON Alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15–12
Glossary
Index
vi www.hp.com Embedded Web System User Guide
The Embedded Web System (EWS) is an intricate network management system. The EWS configures, monitors, and troubleshoots network devices from a remote Web browser. The EWS web pages are easy-to-use and easy-to-navigate. In addition, the EWS provides real time graphs and RMON statistics to help system administrators monitor network performance.
This preface provides an overview to the Embedded Web Server User Guide, and includes the following sections:
Embedded Web System User Guide Overview
Intended Audience
Embedded Web System User Guide Overview
This section provides an overview to the Embedded Web System User Guide. The Embedded Web System User Guide provides the following sections:
Chapter 1, “Getting Started” — Provides information for using the Embedded Web
Management System, including adding, editing, and deleting device configuration information.
Chapter 2, “Defining System Information” — Provides information for defining basic
device information, including the user-defined system name, the user-defined system location, and the system contact person.
Preface
Chapter 3, “Configuring System Time” — Provides information for defining basic device
information, including the user-defined system name, the user-defined system location, and the system contact person.
Chapter 4, “Configuring Device Security” — Provides information for configuring both
system and network security, including traffic control, ACLs, and device access methods.
Chapter 5, “Configuring System Logs” — Provides information for viewing system logs
and configuring device log servers.
Chapter 6, “Configuring Interfaces” — Provides information for defining ports, LAGs,
and VLANs.
Chapter 7, “Defining IP Addresses” — Provides information for configuring IP addresses,
DHCP, ARP, and Domain Name Servers.
Chapter 8, “Defining the Forwarding Database” — Provides information for configuring
both the static and dynamic forwarding databases.
Chapter 9, “Configuring Spanning Tree” — Provides information for configuring Classic,
Rapid, and multiple Spanning Tree.
Chapter 10, “Configuring Multicast Forwarding” — Provides information for
configuring Multicast forwarding.
Embedded Web System User Guide www.hp.com vii
Preface
Chapter 11, “Configuring SNMP” — Provides information for configuring SNMP access
and management.
Chapter 13, “Configuring Quality of Service” — Provides information for Basic and
Advanced Quality of Service, including DSCP and CoS mapping, policies, and configuring Trust mode.
Chapter 12, “Managing System Files” — Provides information for managing system files.
Chapter 14, “Managing Device Diagnostics” — Provides information for configuring port
mirroring, performing cable tests, and viewing device health information.
Chapter 15, “Viewing Statistics” — Provides information for viewing RMON and
interface statistics.
Intended Audience
This guide is intended for network administrators familiar with IT concepts and terminology.
viii www.hp.com Embedded Web System User Guide
This section provides an introduction to the user interface, and includes the following topics:
Starting the Application
Understanding the Interface
Resetting the Device
Logging Off the Device
Starting the Application
This section contains information for starting the application.
To open the EWS application:
1. Open a Web browser.
1
Getting Started
2. Enter the device’s IP address in the address bar and press authentication home page will load.
By default, the switch uses DHCP to get an IP address for an interface on each of the two default
VLANs. The VLAN you choose to manage the switch determines which IP address you must use to access its interface.
Enter. The HP PC Blade Switch
HP PC Blade Switch Home
Embedded Web System User Guide www.hp.com 1-1
Getting Started
3. Enter a user name and password. The default user name is admin. The device is not
4. Click . The Embedded Web System Home page opens.
configured with a default password and can be configured without entering a password. Passwords are both case sensitive and alphanumeric.
Embedded Web System Home
Understanding the Interface
The following section describes the HP PC Blade Switch interface.
User Interface Components
1-2 www.hp.com Embedded Web System User Guide
Getting Started
The following table lists the interface components with their corresponding numbers:
Interface Components
Component Description
1 Tree View The Tree View provides easy navigation through the configurable device
features. The main branches expand to provide the subfeatures.
2 Device View The device view provides information about device ports, current
configuration and status, table information, and feature components. The device view also displays other device information and dialog boxes
for configuring parameters.
This section provides the following additional information:
Using the Management Buttons — Provides a graphic representation of the device.
Device Representation — Provides an explanation of the user interface buttons.
Using Screen and Table Options — Provides instructions for adding, modifying, and
deleting device parameters.
Using the Management Buttons
Device Management buttons and icons provide an easy method of configuring device information, and include the following:
EWS Configuration Management Buttons
Button Button Name Description
Add Opens a page which creates new
Edit Modifies the configuration settings.
Submit Saves configuration changes to the device.
Test Performs cable tests.
Sign in Signs the user into the EWS.
Clear Clears the user-defined passwords from the
Delete Deletes table and configuration entries.
Help Opens the online help page.
configuration entries.
login password.
Embedded Web System User Guide www.hp.com 1-3
Rule Enables the user to define ACL rules.
Clear Logs Clears system log entries.
Interface Table Opens the MSTP Interface Table.
Getting Started
EWS Information Tabs
Link Name Description
Sign Out Signs users out of the EWS.
Save Saves the current device configuration.
Device Representation
The Zoom View page displays a detailed graphical representation of the device.
To open the Zoom View:
» Click System > Zoom. The Zoom View page opens:
Zoom View
Using Screen and Table Options
The EWS contains screens and tables for configuring devices. This section contains the following topics:
Adding Device Information
Modifying Device Information
Deleting Device Information
1-4 www.hp.com Embedded Web System User Guide
Adding Device Information
User-defined information can be added to specific EWS pages, by opening a new Add page.
To add information to tables or EWS pages:
1. Open an EWS page.
2. Click . An Add page opens, for example, the Add Port Mirroring page:
Add Port Mirroring
3. Define the fields.
Getting Started
4. Click . The configuration information is saved, and the device is updated.
Modifying Device Information
1. Open the EWS page.
2. Select a table entry.
3. Click . A Modify page opens, for example, the Port Mirroring Settings page:
Port Mirroring Settings
4. Define the fields.
5. Click . The fields are modified, and the information is saved to the device.
Deleting Device Information
1. Open the EWS page.
2. Select a table row.
3. Click .
4. Click . The information is deleted, and the device is updated.
Embedded Web System User Guide www.hp.com 1-5
Getting Started
Resetting the Device
The Reset page enables the device to be reset from a remote location. Save all changes to the Running Configuration file before resetting the device. This prevents the current device configuration from being lost.
To reset the device:
1. Click System > Reset. The Reset page opens.
Reset
2. Click . The device is reset. After the device is reset, a prompt for a user name and password displays.
3. Enter a user name and password to reconnect to the Web Interface.
Logging Off the Device
Click . The HP PC Blade Switch Home page opens.
1-6 www.hp.com Embedded Web System User Guide
2
Defining System Information
The System Information page contains parameters for configuring general device information, including the System Name, System Location, System Contact, System Object ID, System Up Time, Base MAC addresses, Hardware Version, Software Version, and Boot Version.
To define the general system information:
1. Click System > System Information. The System Information page opens:
System Information
The System Information page contains the following fields:
Model Name — Displays the device model number and name.
System Name — Defines the user-defined device name. The field range is 0-160 characters.
System Location — Defines the location where the system is currently running. The field
range is 0-160 characters.
System Contact — Defines the name of the contact person. The field range is 0-160
characters.
System Object ID — Displays the vendor’s authoritative identification of the network
management subsystem contained in the entity.
System Up Time — Displays the amount of time since the most recent device reset. The
system time is displayed in the following format: Days, Hours, Minutes, Seconds. For example, 41 days, 2 hours, 22 minutes, 15 seconds.
Base MAC Address — Displays the device MAC address.
Embedded Web System User Guide www.hp.com 2-1
Defining System Information
Hardware Version — Displays the installed device hardware version number.
Software Version — Displays the installed software version number.
Boot Version — Displays the current boot version running on the device.
2-2 www.hp.com Embedded Web System User Guide
Configuring System Time
This section provides information for configuring system time parameters, including:
Configuring Daylight Savings Time
Configuring SNTP
Configuring Daylight Savings Time
The System Time page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock. Daylight Savings Time can be enabled on the device.
The following is a list of Daylight Savings Time start and end times in specific countries:
Albania — From the last weekend of March until the last weekend of October.
Australia — From the end of October until the end of March.
Australia - Tasmania — From the beginning of October until the end of March.
3
Armenia — From the last weekend of March until the last weekend of October.
Austria — From the last weekend of March until the last weekend of October.
Bahamas — From April to October, in conjunction with Daylight Savings Time in the
United States.
Belarus — From the last weekend of March until the last weekend of October.
Belgium — From the last weekend of March until the last weekend of October.
Brazil — From the third Sunday in October until the third Saturday in March. During the
period of Daylight Savings Time, Brazilian clocks go forward one hour in most of the Brazilian southeast.
Chile — In Easter Island, from March 9 until October 12. In the rest of the country, from the
first Sunday in March or after March 9.
China — China does not use Daylight Savings Time.
Canada — From the first Sunday in April until the last Sunday of October. Daylight Savings
Time is usually regulated by provincial and territorial governments. Exceptions may exist in certain municipalities.
Cuba — From the last Sunday of March to the last Sunday of October.
Cyprus — From the last weekend of March until the last weekend of October.
Denmark — From the last weekend of March until the last weekend of October.
Egypt — From the last Friday in April until the last Thursday in September.
Estonia — From the last weekend of March until the last weekend of October.
Embedded Web System User Guide www.hp.com 3-1
Configuring System Time
Finland — From the last weekend of March until the last weekend of October.
France — From the last weekend of March until the last weekend of October.
Germany — From the last weekend of March until the last weekend of October.
Greece — From the last weekend of March until the last weekend of October.
Hungary — From the last weekend of March until the last weekend of October.
India — India does not use Daylight Savings Time.
Iran — From Farvardin 1 until Mehr 1.
Iraq — From April 1 until October 1.
Ireland — From the last weekend of March until the last weekend of October.
Israel — Varies year-to-year.
Italy — From the last weekend of March until the last weekend of October.
Japan — Japan does not use Daylight Savings Time.
Jordan — From the last weekend of March until the last weekend of October.
Latvia — From the last weekend of March until the last weekend of October.
Lebanon — From the last weekend of March until the last weekend of October.
Lithuania — From the last weekend of March until the last weekend of October.
Luxembourg — From the last weekend of March until the last weekend of October.
Macedonia — From the last weekend of March until the last weekend of October.
Mexico — From the first Sunday in April at 02:00 to the last Sunday in October at 02:00.
Moldova — From the last weekend of March until the last weekend of October.
Montenegro — From the last weekend of March until the last weekend of October.
Netherlands — From the last weekend of March until the last weekend of October.
New Zealand — From the first Sunday in October until the first Sunday on or after
March 15.
Norway — From the last weekend of March until the last weekend of October.
Paraguay — From April 6 until September 7.
Poland — From the last weekend of March until the last weekend of October.
Portugal — From the last weekend of March until the last weekend of October.
Romania — From the last weekend of March until the last weekend of October.
Russia — From the last weekend of March until the last weekend of October.
Serbia — From the last weekend of March until the last weekend of October.
Slovak Republic — From the last weekend of March until the last weekend of October.
South Africa — South Africa does not use Daylight Savings Time.
Spain — From the last weekend of March until the last weekend of October.
Sweden — From the last weekend of March until the last weekend of October.
Switzerland — From the last weekend of March until the last weekend of October.
3-2 www.hp.com Embedded Web System User Guide
Configuring System Time
Syria — From March 31 until October 30.
Ta iw an — Taiwan does not use Daylight Savings Time.
Tu rke y — From the last weekend of March until the last weekend of October.
United Kingdom — From the last weekend of March until the last weekend of October.
United States of America — From the first Sunday in April at 02:00 until the last Sunday in
October at 02:00.
To configure the system clock time:
1. Click System > Time > System Time. The System Time page opens:
System Time
The System Time page contains the following sections:
Clock Source — The source used to set the system clock. The possible field values are:
Use Local Settings — Indicates that the clock is set locally.
Use SNTP Server — Indicates that the system time is set via an SNTP server.
Date — The system date. The field format is DD/MMM/YY. For example, 04/May/05
(May 4, 2005).
Local Time — The system time. The field format is HH:MM:SS. For example,
21:15:03.
Time Zone Offset — The difference between Greenwich Mean Time (GMT) and local
time. For example, the Time Zone Offset for Paris is GMT +1, while the Time Zone Offset for New York is GMT –5.
Daylight Saving — Enables automatic Daylight Savings Time (DST) on the device
based on the device’s location. There are two types of daylight settings, either by a specific date in a particular year, or a reoccurring setting irrespective of the year. For a specific setting in a particular year, complete the Daylight Saving area, and for a recurring setting, complete the Recurring area. The possible field values are:
USA — The device switches to DST at 2:00 a.m. on the first Sunday in April, and
reverts to standard time at 2:00 a.m. on the last Sunday in October.
Embedded Web System User Guide www.hp.com 3-3
Configuring System Time
European — The device switches to DST at 1:00 am on the last Sunday in March
Other — The DST definitions are user-defined based on the device locality. If Other
Time Set Offset — Used for non-USA and European countries to set the amount of time
for DST (in minutes). The default time is 60 minutes.
From — Indicates the time that DST begins in countries other than the USA and Europe,
in the format DD/MMM/YY in one field and HH:MM in another. For example, if DST begins on October 25, 2007 at 5:00 am, the two fields should be set to 25/Oct/07 and 05:00. The possible field values are:
Date — The date on which DST begins. The field format is DD/MM/YY. DD
Time — The time at which DST begins. The field format is HH:MM. For example,
To — Indicates the time that DST ends in countries other than the USA and Europe, in
the format DD/MMM/YY in one field and HH:MM in another. For example, if DST ends on March 23, 2008 at midnight, the two fields should be 23/Mar/08 and 00:00. The possible field values are:
and reverts to standard time at 1:00 am on the last Sunday in October. The European option applies to EU members and other European countries using the EU standard.
is selected, you must define the From and To fields.
indicates the day in which the time offset begins.The possible field range is 1-31. MMM indicates the calendar month in which the time offset begins. The possible field range is Jan-Dec. YY indicates the year in which the time offset begins.
05:30.
Date — The date on which DST ends. The field format is DD/MM/YY. DD
indicates the day in which the time offset ends.The possible field range is 1-31. MMM indicates the calendar month in which the time offset ends. The possible field range is Jan-Dec. YY indicates the year in which the time offset ends.
Time — The time at which DST ends. The field format is HH:MM. For example,
05:30.
Recurring — Enables user-defined DST for countries in which DST is constant from
year to year, other than the USA and Europe.
From — The time that DST begins each year. For example, DST begins locally every
first Sunday in April at 00:00 (midnight). The possible field values are:
Day — The day of the week from which DST begins every year. The possible field
range is Sunday-Saturday.
Week — The week within the month from which DST begins every year. The
possible field range is First-Fifth.
Month — The month of the year in which DST begins every year. The possible field
range is Jan-Dec.
Time — The time at which DST begins every year. The field format is HH:MM. For
example, 02:10.
To — The time that DST ends each year. For example, DST ends locally every first
Sunday in October at 00:00 (midnight). The possible field values are:
Day — The day of the week at which DST ends every year. The possible field range
is Sunday-Saturday.
Week — The week within the month at which DST ends every year. The possible
field range is First-Fifth.
3-4 www.hp.com Embedded Web System User Guide
Month — The month of the year in which DST ends every year. The possible field
range is Jan-Dec.
Time — The time at which DST ends every year. The field format is HH:MM. For
example, 05:30.
2. Define the Date, Local Time, and Time Zone Offset fields.
3. To configure the device to automatically switch to DST, select Daylight Saving and select either USA, European, or Other. If you select Other, you must define its From and To fields. To configure DST parameters that will recur every year, select Recurring and define its From and To fields.
4. Click . The DST settings are saved, and the device is updated.
Configuring SNTP
The device supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time synchronization up to a millisecond. Time synchronization is performed by a network SNTP server. The device operates only as an SNTP client, and cannot provide time services to other systems. The device can poll the following server types for the server time:
Unicast
Configuring System Time
Anycast
Broadcast
Time sources are established by stratums. Stratums define the accuracy of the reference clock. The higher the stratum (where zero is the highest), the more accurate the clock. The device receives time from stratum 1 and above. The following is an example of stratums:
Stratum 0 — A real time clock (such as a GPS system) is used as the time source.
Stratum 1 — A server that is directly linked to a Stratum 0 time source is used. Stratum 1
time servers provide primary network time standards.
Stratum 2 — The time source is distanced from the Stratum 1 server over a network path.
For example, a Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1 server.
Information received from SNTP servers is evaluated based on the time level and server type. SNTP time definitions are assessed and determined by the following time levels:
T1 — The time at which the original request was sent by the client.
T2 — The time at which the original request was received by the server.
T3 — The time at which the server sent the client a reply.
T4 — The time at which the client received the server's reply.
Message Digest 5 (MD5) Authentication safeguards device synchronization paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication and authenticates the origin of the communication.
This section contains the following topics:
Defining SNTP Global Settings
Defining SNTP Authentication
Embedded Web System User Guide www.hp.com 3-5
Configuring System Time
Defining SNTP Global Settings
The SNTP Settings page provides information for defining SNTP parameters globally.
To define SNTP global parameters:
1. Click System > Time > SNTP Settings. The SNTP Settings page opens:
SNTP Settings
The SNTP Settings page contains the following fields:
Enable SNTP Broadcast — If checked, this field enables SNTP broadcast.
Enable SNTP Anycast — If checked, this field enables SNTP Anycast.
SNTP Server — Displays a user-defined SNTP server IP addresses. You can define up
to eight SNTP servers.
Poll Interval — Defines the interval (in seconds) at which the SNTP server is polled for
Unicast information. The Poll Interval default is 1024 seconds.
Encryption Key ID — Indicates if the encryption key identification is used to
authenticate the SNTP server and device. The field value is up to 4294967295.
Preference — Indicates the SNTP server providing SNTP system time information. The
possible field values are:
Primary — Indicates the primary server provides SNTP information.
Secondary — Indicates the backup server provides SNTP information.
Status — Indicates the SNTP server operating status. The possible field values are:
Up — Indicates the SNTP server is currently operating normally.
Down — Indicates that a SNTP server is currently not available. For example, the
SNTP server is currently not connected or is currently down.
3-6 www.hp.com Embedded Web System User Guide
In progress — Indicates the SNTP server is currently sending or receiving SNTP
information.
Unknown — Indicates the progress of the SNTP information currently being sent is
unknown. For example, the device is currently looking for an interface.
Last Response — Displays the last time a response was received from the SNTP server.
Offset — Indicates the time difference between the device local clock and the acquired
time from the SNTP server.
Delay — Indicates the amount of time it takes for a device request to reach the SNTP
server.
2. Define the fields.
3. Click . The SNTP global settings are defined, and the device is updated.
Defining SNTP Servers
To add an SNTP server:
1. Click . The Add SNTP Server page opens:
Configuring System Time
Add SNTP Server
In addition to the fields in the SNTP Settings page, the Add SNTP Server page contains the following additional field:
Enable Poll Interval — Indicates if the device polls the SNTP server. The possible field
values are:
Checked — Enables polling the SNTP server for SNTP information.
Unchecked — Disables polling the server for SNTP information. This is the default
value.
2. Define the SNTP Server, Enable Poll Interval, and Encryption Key ID fields.
3. Click . The SNTP server is added, and the device is updated.
Embedded Web System User Guide www.hp.com 3-7
Configuring System Time
Defining SNTP Authentication
The SNTP Authentication page provides parameters for defining the means by which the SNTP server is authenticated.
To define SNTP authentication:
1. Click System > Time > SNTP Authentication. The SNTP Authentication page opens:
SNTP Authentication
The SNTP Authentication page contains the following fields:
Enable SNTP Authentication — Indicates if authenticating an SNTP session between
the device and an SNTP server is enabled on the device. The possible field values are:
Checked — Authenticates SNTP sessions between the device and the SNTP server.
Unchecked — Disables authenticating SNTP sessions between the device and the
SNTP server.
Encryption Key ID — Indicates if the encryption key identification is used to
authenticate the SNTP server and the device. The field value is up to 4294967295.
Authentication Key — Indicates the key used for authentication.
Tr us te d Ke y — Indicates the encryption key used (Unicast/Anycast) or elected
(Broadcast) to authenticate the SNTP server.
2. Select the Enable SNTP Authentication field.
3. Click . SNTP Authentication is defined, and the device is updated.
3-8 www.hp.com Embedded Web System User Guide
Configuring System Time
To define SNTP authentication parameters:
1. Click . The SNTP Authentication page opens:
Add SNTP Authentication
2. Define the Encryption Key ID, Authentication Key, and Trust e d Key fields.
3. Click . The SNTP Authentication Key is added, and the device is updated
Embedded Web System User Guide www.hp.com 3-9
Configuring System Time
3-10 www.hp.com Embedded Web System User Guide
Configuring Device Security
This section provides access to security pages that contain fields for setting security parameters for ports, device management methods, users, and server security. This section contains the following topics:
Configuring Authentication Methods
Configuring Network Security
Configuring Authentication Methods
This section provides information for configuring device authentication methods. This section includes the topics:
Defining Access Profiles
Defining Profile Rules
Defining Authentication Profiles
Mapping Authentication Methods
4
Defining RADIUS Settings
Defining TACACS+ Authentication
Configuring Passwords
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles contain management methods for accessing and managing the device. The device management methods include:
All
Te lnet
Secure Telnet (SSH)
HTTP
SNMP
HTTPS
Management access to different management methods may differ between user groups. For example, User Group 1 can access the switch module only via an HTTPS session, while User Group 2 can access the switch module using both HTTPS and Telnet sessions. The Access Profiles page contains the currently configured access profiles and their activity status.
Assigning an access profile to an interface denies access using other interfaces. If an access profile is assigned to any interface, the device can be accessed by all interfaces.
Embedded Web System User Guide www.hp.com 4-1
Configuring Device Security
To configure access profiles:
1. Click Management Security > Access Method > Access Profiles. The Access Profiles page opens:
Access Profiles
The Access Profiles page contains the following fields:
Access Profile Name — Defines the access profile name. The access profile name can
contain up to 32 characters.
Current Active Access Profile — Defines the access profile currently active.
2. Click . The Add Access Profile page opens:
Add Access Profile
In addition to the fields in the Access Profiles page, the Add Access Profile page contains the following fields:
Rule Priority — Defines the rule priority. When the packet is matched to a rule, user
groups are either granted permission or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules.
Management Method — Defines the management method for which the rule is defined.
Users with this access profile can access the device using the management method selected. The possible field values are:
4-2 www.hp.com Embedded Web System User Guide
Configuring Device Security
All — Assigns all management methods to the rule.
Te ln et — Assigns Telnet access to the rule. If selected, users accessing the device
using Telnet meeting access profile criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing
the device using Telnet, meeting access profile criteria, are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device
using HTTP, meeting access profile criteria, are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users
accessing the device using HTTPS, meeting access profile criteria, are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device
using SNMP, meeting access profile criteria, are permitted or denied access to the device.
Interface — Defines the interface on which the access profile is defined. The possible
field values are:
Port — Specifies the port on which the access profile is defined.
LAG — Specifies the LAG on which the access profile is defined.
VLAN — Specifies the VLAN on which the access profile is defined.
Source IP Address — Defines the interface source IP address to which the access
profile applies. The Source IP Address field is valid for a subnetwork.
Network Mask — Defines the IP subnetwork mask.
Prefix Length — Defines the number of bits that comprises the source IP address
prefix, or the network mask of the source IP address.
Action — Defines the action attached to the rule. The possible field values are:
Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.
3. Define the fields.
4. Click . The access profile is created, and the device is updated.
Embedded Web System User Guide www.hp.com 4-3
Configuring Device Security
Defining Profile Rules
Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including:
Rule Priority
Interface
Management Method
IP Address
Prefix Length
Forwarding Action
The rule order is essential as packets are matched on a first-fit basis.
To define profile rules:
1. Click Management Security > Access Method > Profile Rules. The Profile Rules page opens:
Profile Rules
The Profile Rules page contains the following fields:
Access Profile Name — Displays the access profile to which the rule is attached.
Priority — Defines the rule priority. When the packet is matched to a rule, user groups
are either granted or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis.
Interface — Indicates the interface type to which the rule applies. The possible field
values are:
Port — Attaches the rule to the selected port.
LAG — Attaches the rule to the selected LAG.
4-4 www.hp.com Embedded Web System User Guide
Loading...
+ 186 hidden pages