warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft, Windows, and Windows NT are U.S. registered trademarks of Microsoft Corporation. Windows Server 2003 is a trademark of
Microsoft Corporation. Intel, Pentium, and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United
States and other countries. UNIX is a registered trademark of The Open Group.
Audience assumptions
This document is for the person who installs, administers, and troubleshoots servers and storage systems. HP assumes you are qualified in the
servicing of computer equipment and trained in recognizing hazards in products with hazardous energy levels.
1:10Gb Ethernet Blade Switch front panel.................................................................................................. 16
Installing the switch ..................................................................................................................... 18
Preparing for installation .......................................................................................................................... 18
Planning the switch configuration ..............................................................................................................18
Installing the switch.................................................................................................................................. 21
Accessing the switch................................................................................................................................ 22
Logging on and configuring the switch....................................................................................................... 23
Canadian notice ..................................................................................................................................... 28
European Union regulatory notice .............................................................................................................29
Japanese class A notice ...........................................................................................................................29
Korean class A notice .............................................................................................................................. 30
Features .................................................................................................................................................. 6
Configure the switch after installation. Detailed information about how to configure the switch is available
in the reference guides listed below. To obtain these guides, see the HP website
(http://www.hp.com/go/bladesystem/documentation
• HP 1:10Gb Ethernet BL-c Switch Application Guide
).
• HP 1:10Gb Ethernet BL-c Switch Command Reference Guide
• HP 1:10Gb Ethernet BL-c Switch Browser-based Interface Reference Guide
• HP 1:10Gb Ethernet BL-c Switch Quick Setup Instructions
Features
The switch is designed for easy installation and high performance in an environment where traffic on the
Enterprise class performance
network and the number of users increases continually.
The switch features include:
• Up to a 16-to-1 reduction in networking cables and connections, concentration of sixteen Gigabit
Ethernet server ports down to as little as one Gigabit Ethernet port. This switch has the unique feature
to provide both one Gigabit and ten Gigabit ports to the network, allowing the user the ultimate in
network flexibility
• Fully supported on the HP c-Class BladeSystem server blade enclosure and infrastructure compatible
with any combination of HP c-Class BladeSystem server blades
• Ability to replace an existing switch without having to power down the server blades or the server
blade enclosure
• Pre-configured for immediate use with the HP c-Class BladeSystem server blade enclosure
• System security including SSH, SCP, 255 port-based IEEE 802.1Q tagged VLANs per switch,
RADIUS user authentication and authorization, or TACACS+ AAA
• An extensive list of industry standard protocol support, compatible with widely-used networking
components
Introduction 6
• 9K jumbo frames that improve performance by increasing application throughput and decreasing
server processor utilization
• Robust configuration and management from any switch port using the included browser-based and
scriptable command line user interfaces.
• Support for Telnet, SNMP, SCP, FTP, and TFTP file transfer, human read/write configuration file,
XModem, and an extensive list of MIB objects further enhance the management capabilities
• Fully redundant end-to-end architecture maximizing server availability from the network
• Support for IGMP snooping for multicasting
• Support for UFD for network path resiliency. It works in conjunction with NIC teaming functionality
that is supported on the blade servers. This feature tracks the link state on uplink ports. When an
uplink port goes down or is in STP blocking state, this feature will enable the switch to auto disable
the downlinks which are connected to the blade server NICs. This enables NIC teaming software to
detect link failure on the primary NIC port and fail over to the secondary NIC in the team. As a
result, the secondary path is enabled for continued blade server access.
When used in conjunction with UFD, NIC teams on the blade server must be configured for switch
redundancy. That is, the team will span ports on both Switch 1 and Switch 2. See the HP network
adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems
white paper for additional information. To locate this white paper:
a. Go to the HP website (http://www.hp.com/support).
b. Enter "nic" in the product search box.
c. A product list displays. Select one of the NIC products.
d. Select the "Manuals" link to display the documentation list. This white paper will be under the
"White papers" category.
• RMON feature, which allows network devices to exchange network monitoring data. RMON
performs these major functions:
o Gathers cumulative statistics for Ethernet interfaces
o Tracks a history of statistics for Ethernet interfaces
o Creates and triggers alarms for user-defined events
• An administrator can define end user accounts that permit limited access to the switch. The switch
requires username/password authentication for end users.
• Fast Uplink Convergence that enables the switch to quickly recover from the failure of the primary
link or trunk group in a Layer 2 network using Spanning Tree Protocol.
• Support for SSH version 2. SSH is a protocol that enables remote administrators to log securely into
the switch over a network to execute management commands.
• Switch software provides SNMP support for access through any network management software, such
as HP OpenView.
• Support for HTTP software upgrade using the BBI. FTP or TFTP server is not required to perform a
software upgrade.
• Port Fast Forwarding that allows a port that participates in Spanning Tree to bypass the Listening and
Learning states and enter directly into the Forwarding state.
• Allows secure browser access (HTTPS) to management functions
Introduction 7
Switch redundancy
In a dual switch configuration, the switches offer several redundancy and failover features. With these
features, the network configuration is designed to allow for continued network access to each server
blade in case of a component or link failure. The switch redundancy and failover features include:
• Up to eight separate switches per one HP c-Class BladeSystem server blade enclosure
• Up to four, one Gigabit Ethernet uplink ports and three, ten Gigabit Ethernet uplink ports (ports 19-
21), per switch, for designing fully meshed uplink paths to the network backbone
• Server networking connections routed to each of the separate switches for redundant paths to
tolerate a switch or port malfunction
• Redundant data path ten Gigabit Ethernet cross connection between switches
• STP support that eliminates potential problems caused by redundant networking paths and provides
for failover with a secondary path in case of primary path failure; supports IEEE 802.1D Spanning
Tree Protocol and is compatible with Cisco
configured as untagged or configured to use 802.1q tagging. The switch also supports IEEE 802.1s
MSTP and IEEE 802.1w RSTP.
• Redundant power supplies and redundant cooling fans within the server blade enclosure
®
PVST+ and Cisco PVST, when the other device is
• Redundant firmware images and configuration settings on switch flash memory
• Redundant, configurable DNS clients, syslog servers, gateways, and community strings and SNMP
trap manager hosts
Configuration and management
The switch provides these configuration and management interfaces and tools:
• A scriptable CLI allows local, Telnet, or SSH access.
• An iSCLI that is software selectable.
• A BBI allows remote access using a Web browser such as Microsoft® Internet Explorer or Netscape
Navigator.
• SNMP manageability and monitoring are supported.
• The switch functionality allows uploading and downloading of switch configurations through TFTP
and SCP, thus allowing the rapid deployment of multiple server blade systems, and providing robust
backup and restore capabilities.
• NTP is supported, allowing the switch to display and record the accurate date and time as provided
by an NTP server.
• Two firmware images, either of which can be selected to be the current runtime image, can be held
in memory.
• RADIUS provides support for user authentication and authorization.
• TACACS+ provides support for Cisco TACACS+ server compatible authentication, authorization,
and accounting.
• The user interfaces provide multi-level password protected user accounts.
• IP settings are set manually or obtained automatically from a BOOTP server.
Introduction 8
• A text-based, human read/write configuration file provides viewing, printing, and editing
capabilities.
• A DNS client supports primary and secondary DNS servers.
• Any port can be enabled or disabled as desired.
• Any switch port can be used to perform switch management and PXE.
Diagnostic tools
The hardware, software, and firmware diagnostic tools that are available include:
• HP Systems Insight Manager automatic discovery and identification
• POST built into the switch boot process
• Switch port mirroring
• Switch LED panel displaying per port status and speed
• System, management, and option compatibility status LEDs
• Rear panel reset power switch and DB-9 management serial port
• Statistic monitoring including port utilization, data packets received/transmitted, port error packets,
trunk utilization, and so on
• Ping and trace route capability
• Remote syslog with support for primary and secondary syslog server
• The ability to return the switch to known good condition in case of firmware corruption
• State information dump for tuning and debugging switch performance
• Panic command for immediate state dump to flash memory and automatic switch boot
• Ability to set NVRAM diagnostic flags
Switch architecture
The HP c-Class BladeSystem provides Ethernet switching technology for network cable reduction.
The switch does not affect or determine NIC enumeration and the associated mapping of NIC interfaces
to switch ports. The numbering of the NICs on the server (for example, NIC 1, NIC 2, NIC 3) is
Port Mapping
Dual switches
determined by the server type, the server operating system, and what NICs are enabled on the server.
For detailed port mapping information, see the HP BladeSystem enclosure installation poster or the HP
BladeSystem enclosure setup and installation guide on the HP website
(http://www.hp.com/go/bladesystem/documentation
In a dual switch configuration, two switches in the server blade enclosure provide switch redundancy and
redundant paths to the network ports on the server blades. Each switch has four, one Gigabit and three,
).
Introduction 9
ten Gigabit external Ethernet ports and sixteen internal Gigabit Ethernet ports providing connectivity to the
blade servers within the enclosure.
Redundant crosslinks
In a dual switch configuration, the two switches are connected through a single ten gigabit crosslink. This
crosslink provides throughput of ten Gb/s for traffic between the switches.
This crosslink is disabled by default. This crosslink must be enabled for use.
Redundant paths to server bays
In a dual switch configuration, redundant Ethernet signals from each blade server are routed through the
enclosure backplane to separate switches within the enclosure. This configuration provides redundant
paths to each server bay.
Redundant Ethernet signals from each blade server are routed through the enclosure backplane to
separate switches within the enclosure. However, specific switch port to server mapping varies depending
on which type of server blade is installed.
On a heavily used system, using a single uplink port for 32 Ethernet signals causes a traffic bottleneck.
For optimum performance, HP recommends using at least one uplink port per switch.
Supported technologies
Layer 2 switching
The switch uses Gigabit Layer 2 switching technology. Layer 2 refers to the Data Link layer of the OSI
model, which is concerned with moving data packets across a network by enforcing CSMA/CD. This
layer performs:
• Ethernet packet framing
• MAC addressing
• Physical medium transmission error detection
• Medium allocation (collision avoidance)
• Contention resolution (collision handling)
Layer 2 switching technology allows the switch to look into data packets and redirect them based on the
destination MAC address. This reduces traffic congestion on the network because packets, instead of
being transmitted to all ports, are transmitted to the destination port only.
Layer 3 switching
In addition to Layer 2 features, the switch also supports Layer 3 switching. Layer 3 switching features
include:
• IP forwarding
• Static routing
• Dynamic routing based on RIP V1/V2 or OSPF protocols
Introduction 10
• High availability VRRP
Layer 3 switching provides more power, flexibility, and security capabilities to network administrators.
Network traffic is managed much more efficiently and broadcast traffic between servers remains within
the enclosure. Security features provide added protection for switch configuration data, while packet
filtering helps secure and segment sensitive traffic or network access.
IEEE 802.1 Q-based VLAN
The switch provides support for a total of 1000 IEEE 802.1Q VLANs for server grouping and isolation. A
VLAN is a network segment configured according to a logical scheme rather than a physical layout.
VLANs are used to combine any collection of LAN segments into an autonomous user group that appears
as a single LAN.
VLANs also logically segment the physical network into different broadcast domains so that packets are
forwarded only between ports within the VLAN. This technology enhances performance by conserving
bandwidth and improves security by limiting traffic to specific domains. For example, isolate the server
blade iLO ports from the rest of the NICs. The iLO ports on Switch 2 are assigned to their own VLAN and
go to a dedicated uplink or share an uplink using VLAN tagging.
IMPORTANT: The greater the number of VLANs, the greater the switch CPU utilization. For
maximum switch performance, HP recommends being judicious when configuring the number
of VLANs.
NOTE: VLAN 4095 is reserved for future functionality.
Spanning Tree Protocol
The switch supports IEEE 802.1D STP, which allows the blocking of links that form loops between switches
in a network. When multiple links between switches are detected, a primary link is established.
Duplicated links are blocked from use and become standby links. If the primary link fails, the standby link
is activated.
In addition, the switch provides a spanning tree domain per VLAN. The switch is compatible with Cisco
PVST+ and Cisco PVST, when the other device is configured as untagged or configured to use 802.1q
tagging. Thirty-two spanning tree domains are supported per switch.
NOTE: STP 32 is reserved for future functionality.
The switch also provides IEEE 802.1s-based MSTP and IEEE 802.1w-based RSTP.
SNMP
The switch is configured and monitored remotely from an SNMP-based network management station. The
switch supports industry-standard SNMP MIBs and proprietary HP enterprise switch MIBs for fault
detection and monitoring of switch functionality. In addition, the switch supports various environmental
traps such as temperature and fan failure traps.
®
To secure the management interface, the switch administrator configures community strings with two levels
of access: Read and Read/Write. Access to the switch is also restricted to only management stations that
Introduction 11
are members of a specific IP network. This is achieved by configuring the address/mask of that specific
network as a restricted management network address/mask.
Port mirroring
The switch allows mirroring of one or multiple ports (source ports) to another port (destination port) for
network monitoring and troubleshooting purposes. This technology offers a way for network packet
analyzers to view the traffic moving through the switch by providing a copy of the traffic that is currently
being passed through any other port. The packets are sent to a network packet analyzer or other
monitoring device attached to the mirror port.
Port trunking and load balancing
The switch supports EtherChannel compatible IEEE 802.3ad (without LACP) port trunking allowing several
ports to be grouped together and act as a single logical link called a trunk. This feature provides a
bandwidth that is a multiple of the bandwidth of a single link. It also improves reliability since load
balancing is automatically applied to the ports in the trunked group. A link failure within the group causes
the network traffic to be directed to the remaining links in the group.
TFTP support
TFTP support allows the switch firmware to be upgraded by downloading a new firmware file from a TFTP
server to the switch. Firmware images of the switch are also uploaded to a TFTP server, a configuration
file is downloaded into a switch from a TFTP server, and configuration settings are saved to the TFTP
server.
Store and forward switching scheme
The switch provides a store and forward switching scheme that allows each packet to be buffered (stored)
before it is forwarded to its destination. While this method creates latency, it improves reliability in a
heavily used switch. Packets that cannot be forwarded are saved immediately, rather than dropped, so
that packets behind them are less likely to be dropped in periods of heavy usage.
BOOTP
By default, the switch is configured to obtain an IP address from a BOOTP server during the boot process.
The IP settings are also manually configured by means of the serial interface. The IP settings are
configurable from the browser-based interface, but because the connection is based on an IP address for
these interfaces, users will have to reconnect with the newly assigned IP address.
NTP
The switch maintains the current date and time. This information displays on the management interfaces
and is used to record the date and time of switch events. Current date and time information are manually
set on the switch or are obtained through NTP. NTP allows the switch to send a request to a primary NTP
server in each polling period asking for GMT.
Introduction 12
RADIUS
The switch supports the RADIUS method to authenticate and authorize remote administrators for managing
the switch. This method is based on a client/server model. The RAS, the switch, is a client to the back-end
database server. A remote user (the remote administrator) interacts only with the RAS, not the back-end
server and database.
RADIUS authentication consists of:
• A protocol with a frame format that utilizes UDP over IP, based on RFC 2138 and 2866
• A centralized server that stores all the user authorization information
• A client, in this case, the switch
The switch, acting as the RADIUS client, communicates to the RADIUS server to authenticate and authorize
a remote administrator using the protocol definitions specified in RFC 2138 and 2866. Transactions
between the client and the RADIUS server are authenticated using a shared key that is not sent over the
network. In addition, the remote administrator passwords are sent encrypted between the RADIUS client
(the switch) and the back-end RADIUS server.
The benefits of using RADIUS are:
• Authentication of remote administrators
• Identification of the administrator using name/password
• Authorization of remote administrators
• Determination of the permitted actions and customizing service for individual administrators
TACACS+
The switch supports the TACACS+ method to authenticate, authorize, and account for remote
administrators managing the switch. This method is based on a client/server model. The switch is a client
to the back-end TACACS+ AAA server. A remote user (the remote administrator) interacts only with the
client, and not with the back end AAA server.
The TACACS+ AAA method consists of:
• A protocol with a frame format that utilizes TCP over IP
• A centralized AAA server that stores all the user authentication, authorization, and accounting (of
usage) information
• A NAS or client (in this case, the switch)
The switch, acting as the TACACS+ client or NAS, communicates to the TACACS+ server to authenticate,
authorize, and account for user access. Transactions between the client and the TACACS+ server are
authenticated using a shared key that is not sent over the network. In addition, the remote administrator
passwords are sent encrypted between the TACACS+ client (the switch) and the back-end TACACS+
server.
The switch supports:
• Only standard ASCII inbound login authentication. PAP, CHAP, or ARAP login methods are not
supported. One-time password authentication is also not supported.
• Authorization privilege levels of only 0, 3, and 6. These map to management levels of user, oper,
and admin, respectively.
Introduction 13
• The accounting attributes of protocol, start_time, stop_time, and elapsed_time. For BBI users,
accounting stop records are only sent if the user presses the QUIT button.
SSH and SCP
SSH and SCP use secure tunnels to encrypt and secure messages between a remote administrator and the
switch. Telnet does not provide this level of security. The Telnet method of managing a switch does not
provide a secure connection.
SSH is a protocol that enables remote administrators to log securely into the switch over a network to
execute management commands.
SCP is used to copy files securely from one machine to another. SCP uses SSH for encryption of data on
the network. On a switch, SCP is used to download and upload the switch configuration via secure
channels.
XModem
The switch supports XModem for transferring files during direct dial-up communications. XModem sends
blocks of data in 128-byte blocks, and includes an error-detection system called a checksum. When the
data is received, the error detection system ensures that the entire message reached its destination. If not,
the receiving computer sends a request for retransmission of the data.
IGMP Snooping
The switch supports IGMP Snooping for multicasting. Version 1-, Version 2-, and Version 3-based IGMP
Snooping are supported. In addition, auto detection of the multicast router port and manual configuration
of the multicast router port is supported. For efficient multicast traffic management, the IGMP Filtering
option is supported.
Jumbo frames
By default, the switch supports jumbo frames up to 9216 bytes, which help reduce server CPU utilization
and increase application throughput. No configuration is required. The switch does not fragment frames
as they exit, or assemble packets into jumbo frames as they enter the switch.
Auto-MDI/MDIX
The switch RJ-45 Ethernet ports are MDI/MDI crossover capable. MDI/MDIX is a type of Ethernet port
connection using twisted pair cabling. The MDI is the component of the MAU that provides the physical
and electrical connection to the cabling medium. An MDIX is a version of MDI that enables connection
between like devices. MDI ports connect to MDIX ports via straight-through twisted pair cabling whereas
both MDI-to-MDI and MDIX-to-MDIX connections use crossover twisted pair cabling. The switch has the
capability to automatically detect the cable selection/type, making the distinction between a straightthrough cable and a crossover cable unimportant.
Auto-negotiation of duplex mode and speed on 1 Gigabit ports
Auto-negotiation of duplex mode and speed are configured on the switch. Network adapters that support
multiple data speeds, such as Fast Ethernet and Gigabit Ethernet, choose the speed at which they run
Introduction 14
through a procedure called auto-negotiation. Auto-negotiation involves probing the capability of the
network using low-level signaling techniques to select compatible Ethernet speeds. Auto-negotiation was
originally developed to make the migration from traditional Ethernet to Fast Ethernet products easier.
Redundant images in firmware
The switch stores up to two different software images, called image1 and image2, as well as boot
software, called boot. When downloading new software, the ability to specify where it is to be placed
(into image1, image2, or boot) is activated.
For example, if the active image is currently loaded into image1, load the new image software into
image2. This allows a test of the new software and the option to revert back to the original image stored
in image1, if needed.
CAUTION: Unlike the firmware that has two images, there is only one image of boot
supported. Upgrading the boot image replaces the original boot image.
Introduction 15
Component identification
In this section
1:10Gb Ethernet Blade Switch front panel ................................................................................................ 16
1:10Gb Ethernet Blade Switch front panel
CAUTION: Pressing the Reset button while the Health LED is green resets the switch.
Item Description
1 UID LED
2 Health LED
• Off—Not powered up
• Green—Powered up and all ports match
• Amber—Indicates a problem such as a port mismatch. For more
information, see the HP BladeSystem enclosure setup and
installation guide.
3 DB-9 management serial port
4 CX4 connector port 19
• Link LED (top)—Green
• Activity LED (bottom)—Flashing green
5 XFP transceiver cage port 20
• Link LED (top)—Green
• Activity LED (bottom)—Flashing green
Component identification 16
Item Description
6 XFP transceiver cage port 21
• Green—Link LED (top)
• Flashing green—Activity LED (bottom)
7 RJ-45 ports 22-25
Speed LED (right)
• Off—10 Mb/s
• Green—100 Mb/s
• Amber—1 Gb/s
Activity/Link LED (left)
• Green—Link
• Flashing green—Activity
8 Reset button
Component identification 17
Installing the switch
In this section
Preparing for installation ......................................................................................................................... 18
Planning the switch configuration ............................................................................................................. 18
Installing the switch ................................................................................................................................ 21
Accessing the switch............................................................................................................................... 22
Logging on and configuring the switch...................................................................................................... 23
Supporting software and special considerations......................................................................................... 24
Preparing for installation
IMPORTANT: Before installing the switch, make a record of the MAC address (printed on the
MAC address label attached to the switch). This address is needed when configuring the
switch.
Planning the switch configuration
The switch ships with a default configuration in which all downlink and uplink ports are enabled and
assigned a default VLAN with a VID equal to 1. This default configuration simplifies the initial setup by
allowing use of a single uplink cable (from any external Ethernet connector) to connect the server blade
enclosure to the network. Assess the particular server environment to determine any requirements for other
considerations.
The switch does not affect or determine NIC numeration and the associated mapping of NIC interfaces to
switch ports. The numbering of the NICs on the server (for example, NIC 1, NIC 2, NIC 3) is determined
by the server type, the server operating system, and which NICs are enabled on the server.
NOTE: Port 18 is reserved for connection to the Onboard Administrator module for switch
management. This allows a user to enable the functionality of future firmware upgrade
The Onboard Administrator module controls all port enabling. Enabling is based on matching ports
between the server and the interconnect bay. Before power up, the Onboard Administrator module
verifies that the server NIC option matches the switch bay that is selected and enables all ports for the
NICs installed.
releases.
For detailed port mapping information, see the HP BladeSystem enclosure installation poster or the HP
BladeSystem enclosure setup and installation guide on the HP website
(http://www.hp.com/go/bladesystem/documentation
Default settings
When planning the configuration, consider the default settings for these parameters:
).
Installing the switch 18
• Switch IP settings
• VLAN settings
• XFP settings
• Port names and types
• Port trunking settings
• Interswitch X-Connect port settings
• SNMP settings
• User name and password settings
• Default access to various management interfaces
• NTP settings
IMPORTANT: See "Runtime switching software default settings (on page 33)" for a complete
list of default configuration settings.
Switch security
When planning the switch configuration, secure access to the management interface by:
• Creating users with various access levels
• Enabling or disabling access to various management interfaces to fit the security policy
• Changing default SNMP community strings for read-only and read-write access
User, operator, and administrator access rights
To enable better switch management and user accountability, three levels or classes of user access have
been implemented on the switch. Levels of access to CLI, Web management functions, and screens
increase as needed to perform various switch management tasks. Conceptually, access classes are
defined as:
• User interaction with the switch is completely passive. Nothing can be changed on the switch. Users
can display information that has no security or privacy implications, such as switch statistics and
current operational state information.
• Operators can only effect temporary changes on the switch. These changes will be lost when the
switch is rebooted/reset. Operators have access to the switch management features used for daily
switch operations. Because any changes an operator makes are undone by a reset of the switch,
operators cannot severely impact switch operation.
• Administrators are the only ones that can make permanent changes to the switch configuration,
changes that are persistent across a reboot/reset of the switch. Administrators can access switch
functions to configure and troubleshoot problems on the switch. Because administrators can also
make temporary (operator-level) changes as well, they must be aware of the interactions between
temporary and permanent changes.
Access to switch functions is controlled through the use of unique user names and passwords. Once
connected to the switch via the local console, Telnet, or SSH, a password prompt appears.
Installing the switch 19
NOTE: It is recommended to change the default switch passwords after initial configuration
and as regularly as required under the network security policies. For more information, see the
The default user name and password for each access level are:
HP 1:10Gb Ethernet BL-c Switch Command Reference Guide.
User account Description and tasks performed Password
User The user has no direct responsibility for switch management. He or she
can view all switch status information and statistics, but cannot make
any configuration changes to the switch.
user
Operator The operator manages all functions of the switch. The operator can
reset ports or the entire switch.
By default, the operator account is disabled and has no password.
Administrator The super user administrator has complete access to all menus,
information, and configuration commands on the switch, including the
ability to change both the user and administrator passwords.
Manually configuring a switch
The switch is configured manually using a command line interface, a browser-based interface, or an
SNMP interface. See the HP 1:10Gb Ethernet BL-c Switch Command Reference Guide for more
information on using these management interfaces to configure the switch.
After a switch is configured, back up the configuration as a text file to a TFTP server. The backup
configuration file is then downloaded from the TFTP server to restore the switch back to the original
configuration. This restoration is necessary if one of these conditions apply:
• The switch configuration becomes corrupted during operation.
• The switch must be replaced because of a hardware failure.
Configuring multiple switches
admin
Configure multiple switches by using scripted CLI commands through Telnet or by downloading a
configuration file using a TFTP server.
Using scripted CLI commands through Telnet
The CLI, provided with the switch, executes customized configuration scripts on multiple switches. A
configuration script is tailored to one of the multiple switches, and then that configuration can be
deployed to other switches from a central deployment server.
Using a configuration file
If planning for the base configuration of multiple switches in a network to be the same, manually
configure one switch, upload the configuration to a TFTP server, and use that configuration as a base
configuration template file.
Installing the switch 20
Loading...
+ 46 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.