The HP V1910 Switch Series User Guide describes the software features for the HP 1910 switches and
guides you through the software configuration procedures. It also provides configuration examples to help
you apply software features to different network scenarios.
This documentation set is intended for:
Network planners
Field technical support and servicing engineers
Network administrators working with the HP V1910 switches
No part of this documentation may be reproduced or transmitted in any form or by any means without prior
written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or
for incidental or consequential damages in connection with the furnishing, performance, or use of this
material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Warranty
The Hewlett-Packard Limited Warranty Statement for this product and the HP Software License Terms which
apply to any software accompanying this product are available on the HP networking Web site at
http://www.hp.com/networking/warranty. The customer warranty support and services information are
available on the HP networking Web site at http://www.hp.com/networking/support. Additionally, your
HP-authorized network reseller can provide you with assistance, both with services that they offer and with
services offered by HP.
Configuration through the web interface ··················································································································· 2
Web-based network management operating environment ····························································································· 2
Logging in to the web interface ·········································································································································· 2
Default login information ·············································································································································· 2
Example ·········································································································································································· 3
Logging out of the web interface ······································································································································· 4
Introduction to the web interface ········································································································································ 4
Web user level ····································································································································································· 5
Introduction to the web-based NM functions ···················································································································· 5
Introduction to the common items on the web pages ··································································································· 13
Configuration guidelines ·················································································································································· 15
Configuration at the CLI ············································································································································· 16
Getting started with the CLI ············································································································································· 16
Setting up the configuration environment ················································································································· 16
Logging in to the CLI ··················································································································································· 20
CLI commands ··································································································································································· 21
upgrade ······································································································································································· 25
Configuration example for upgrading the system software image at the CLI ···························································· 26
Overview ··········································································································································································· 28
Basic service setup ···························································································································································· 28
Entering the configuration wizard homepage ········································································································· 28
Configuring system parameters ································································································································· 28
Configuring management IP address ······················································································································· 29
Stack management configuration task list ················································································································ 32
Configuring global parameters of a stack ··············································································································· 33
Displaying topology summary of a stack ················································································································· 35
Displaying device summary of a stack ····················································································································· 36
Logging into a member switch from the master switch ··························································································· 36
Stack configuration example ··········································································································································· 36
Configuration guidelines ·················································································································································· 42
Displaying system information ··································································································································· 43
Displaying device information ··································································································································· 44
Device basic information configuration ···················································································································· 46
Configuring device basic information ···························································································································· 46
Configuring system name ·········································································································································· 46
Configuring idle timeout period ································································································································ 46
System time configuration ·········································································································································· 48
Configuring system time ··················································································································································· 48
System time configuration example ································································································································ 49
Configuration guidelines ·················································································································································· 51
Configuration task list ················································································································································· 52
Setting syslog related parameters ····························································································································· 52
Displaying file list ························································································································································ 63
Downloading a file ····················································································································································· 64
Uploading a file ·························································································································································· 64
Removing a file ··························································································································································· 64
Port management configuration ································································································································ 65
Configuring a port ···························································································································································· 65
Setting operation parameters for a port ··················································································································· 65
Viewing the operation parameters of a port ··········································································································· 69
Port management configuration example ······················································································································ 70
Port mirroring configuration ······································································································································ 74
Introduction to port mirroring··········································································································································· 74
Implementing port mirroring ······································································································································ 74
Configuring local port mirroring ····································································································································· 75
Configuration task list ················································································································································· 75
Creating a mirroring group ······································································································································· 75
Configuring ports for a mirroring group ·················································································································· 76
Configuration examples ··················································································································································· 78
Local port mirroring configuration example ············································································································· 78
Configuration guidelines ·················································································································································· 81
4
User management ······················································································································································ 82
Adding a local user ···················································································································································· 82
Setting the super password ········································································································································ 83
Switching to the management level ·························································································································· 84
Loopback test configuration ······································································································································ 85
Working mechanism ·················································································································································· 95
RMON groups ···························································································································································· 96
Configuring RMON ·························································································································································· 97
Configuration task list ················································································································································· 97
Configuring a statistics entry ····································································································································· 99
Configuring a history entry ······································································································································ 100
Configuring an event entry ······································································································································ 101
Configuring an alarm entry ····································································································································· 102
Displaying RMON statistics information ················································································································ 104
Displaying RMON history sampling information ·································································································· 106
Energy saving configuration ··································································································································· 113
Overview ········································································································································································· 113
Configuring energy saving on a port ··························································································································· 113
SNMP protocol version ············································································································································ 116
SNMP configuration ······················································································································································· 116
Configuration task list ··············································································································································· 116
Configuring an SNMP view ···································································································································· 119
Configuring an SNMP community ·························································································································· 121
Configuring an SNMP group ·································································································································· 122
Configuring an SNMP user ····································································································································· 123
5
Configuring SNMP trap function ····························································································································· 125
SNMP configuration example ······································································································································· 127
Introduction to VLAN ················································································································································ 135
Introduction to port-based VLAN ····························································································································· 137
Configuring a VLAN ······················································································································································· 138
Configuration task list ··············································································································································· 138
Modifying a VLAN ···················································································································································· 140
Configuration task list ··············································································································································· 149
Creating a VLAN interface ······································································································································ 149
Modifying a VLAN interface ···································································································································· 150
Security mode and normal mode of voice VLANs ································································································ 155
Configuring the voice VLAN ·········································································································································· 155
Configuration task list ··············································································································································· 155
Configuring voice VLAN on a port ························································································································· 157
Adding OUI addresses to the OUI list ···················································································································· 159
Voice VLAN configuration examples ···························································································································· 160
Configuring voice VLAN on a port in automatic voice VLAN assignment mode ·············································· 160
Configuring a voice VLAN on a port in manual voice VLAN assignment mode ··············································· 165
Configuration guidelines ················································································································································ 171
MAC address configuration ··································································································································· 172
Configuring MAC addresses ········································································································································· 173
Configuring a MAC address entry ························································································································· 173
Setting the aging time of MAC address entries ····································································································· 175
MAC address configuration example ··························································································································· 176
Basic concepts in STP ··············································································································································· 177
How STP works ························································································································································· 178
RSTP ·················································································································································································· 184
MSTP ················································································································································································ 185
STP and RSTP limitations ·········································································································································· 185
MSTP features ···························································································································································· 185
How MSTP works ······················································································································································ 189
Implementation of MSTP on devices ······················································································································· 189
Protocols and standards ··········································································································································· 190
Configuring MSTP ··························································································································································· 190
Configuration task list ··············································································································································· 190
Configuring an MST region ····································································································································· 190
Configuring MSTP on a port ···································································································································· 194
Displaying MSTP information of a port ·················································································································· 196
MSTP configuration example ········································································································································· 199
Configuration guidelines ················································································································································ 203
Link aggregation and LACP configuration ············································································································ 205
Link aggregation modes ··········································································································································· 206
Load sharing mode of an aggregation group ······································································································· 208
Configuring link aggregation and LACP ······················································································································ 208
Configuration task list ··············································································································································· 208
Creating a link aggregation group ························································································································· 209
Displaying information of an aggregate interface ································································································ 211
Displaying information of LACP-enabled ports ······································································································ 212
Link aggregation and LACP configuration example ··································································································· 214
Configuration guidelines ················································································································································ 217
How LLDP works ························································································································································ 222
Compatibility of LLDP with CDP ······························································································································· 222
Protocols and standards ··········································································································································· 223
Configuring LLDP ····························································································································································· 223
LLDP configuration task list ······································································································································· 223
Enabling LLDP on ports ············································································································································· 224
Configuring LLDP settings on ports ·························································································································· 225
Configuring global LLDP setup ································································································································ 229
Displaying LLDP information for a port ··················································································································· 231
Displaying global LLDP information ························································································································ 236
Displaying LLDP information received from LLDP neighbors················································································· 238
LLDP configuration examples ········································································································································· 238
Basic LLDP configuration example ·························································································································· 238
CDP-compatible LLDP configuration example ········································································································ 244
Configuration guidelines ················································································································································ 250
Principle of IGMP snooping ····································································································································· 251
IGMP snooping related ports ·································································································································· 251
Work mechanism of IGMP snooping ····················································································································· 252
Protocols and standards ··········································································································································· 254
Configuring IGMP snooping ·········································································································································· 254
Configuration task list ··············································································································································· 254
Configuring IGMP snooping in a VLAN ················································································································ 256
Configuring IGMP snooping port functions ··········································································································· 257
Displaying the IPv4 active route table ···················································································································· 267
Creating an IPv4 static route ··································································································································· 268
Static route configuration example ······························································································································· 269
Precautions ······································································································································································ 273
Dynamic IP address allocation process ·················································································································· 275
IP address lease extension ······································································································································· 275
DHCP message format ··················································································································································· 276
DHCP options ·································································································································································· 277
Fundamentals ···························································································································································· 279
DHCP relay agent configuration task list ······················································································································ 280
Enabling DHCP and configuring advanced parameters for the DHCP relay agent ················································ 281
Creating a DHCP server group ····································································································································· 282
Enabling the DHCP relay agent on an interface ········································································································· 283
Configuring and displaying clients' IP-to-MAC bindings ···························································································· 284
DHCP relay agent configuration example ··················································································································· 285
Functions of DHCP snooping ··································································································································· 288
Application environment of trusted ports ················································································································ 289
DHCP snooping support for Option 82 ················································································································· 290
DHCP snooping configuration task list ························································································································· 290
Enabling DHCP snooping ·············································································································································· 291
Configuring DHCP snooping functions on an interface ······························································································ 29 3
Displaying clients' IP-to-MAC bindings ························································································································· 293
DHCP snooping configuration example ······················································································································· 294
Service management configuration ······················································································································· 299
Configuring service management ································································································································· 300
ARP function ······························································································································································ 306
ARP message format ················································································································································· 306
Architecture of 802.1X ··················································································································································· 320
Controlled/uncontrolled port and port authorization status ······················································································· 320
EAP over RADIUS ······················································································································································ 323
Initiating 802.1X authentication ···································································································································· 323
802.1X client as the initiator ··································································································································· 323
Access device as the initiator ·································································································································· 323
HP implementation of 802.1X ······································································································································· 328
Access control methods ············································································································································ 328
Using 802.1X authentication with other features ·································································································· 328
Configuring 802.1X ······················································································································································· 329
Configuring 802.1X on a port ································································································································ 332
Configuration examples ················································································································································· 334
802.1X configuration example ······························································································································· 334
ACL assignment configuration example ················································································································· 341
Introduction to AAA ·················································································································································· 351
9
Domain-based user management ···························································································································· 352
Configuring AAA ···························································································································································· 352
Configuration task list ··············································································································································· 352
Configuring an ISP domain ····································································································································· 353
Configuring authentication methods for the ISP domain ······················································································ 354
Configuring authorization methods for the ISP domain ························································································ 355
Configuring accounting methods for the ISP domain ··························································································· 356
AAA configuration example ·········································································································································· 358
Introduction to RADIUS ············································································································································· 363
Client/server model ·················································································································································· 363
Security and authentication mechanisms ··············································································································· 363
Basic message exchange process of RADIUS ······································································································· 364
RADIUS packet format ·············································································································································· 365
Protocols and standards ··········································································································································· 368
Configuring RADIUS ······················································································································································· 368
Configuration task list ··············································································································································· 368
Configuring a local user ·········································································································································· 379
Configuring a user group ········································································································································ 381
Architecture of PKI ···················································································································································· 383
Applications of PKI ··················································································································································· 384
Operation of PKI ······················································································································································· 385
Configuring PKI ······························································································································································· 385
Configuration task list ··············································································································································· 385
Creating a PKI entity ················································································································································· 388
Creating a PKI domain ············································································································································· 389
Generating an RSA key pair ··································································································································· 392
Destroying the RSA key pair ···································································································································· 392
Retrieving a certificate ·············································································································································· 393
Requesting a local certificate ··································································································································· 395
Retrieving and displaying a CRL ····························································································································· 396
PKI configuration example ············································································································································· 397
Configuring a PKI entity to request a certificate from a CA ················································································· 397
Configuration guidelines ················································································································································ 402
Port isolation group configuration ·························································································································· 403
Overview ········································································································································································· 403
Configuring a port isolation group ······························································································································· 403
Port isolation group configuration example ················································································································· 404
10
Authorized IP configuration ···································································································································· 406
Overview ········································································································································································· 406
Configuring authorized IP ·············································································································································· 406
Authorized IP configuration example ··························································································································· 407
Authorized IP configuration example ····················································································································· 407
Introduction to IPv4 ACL ··········································································································································· 410
Effective period of an ACL ······································································································································· 411
ACL step ····································································································································································· 412
Configuring an ACL ························································································································································ 412
Configuration task list ··············································································································································· 412
Configuring a time range ········································································································································ 413
Creating an IPv4 ACL ··············································································································································· 414
Configuring a rule for a basic IPv4 ACL ················································································································ 414
Configuring a rule for an advanced IPv4 ACL ······································································································ 416
Configuring a rule for an Ethernet frame header ACL ·························································································· 419
Configuration guidelines ················································································································································ 421
Introduction to QoS ························································································································································ 422
Networks without QoS guarantee ·························································································································· 422
QoS requirements of new applications ·················································································································· 422
Congestion: causes, impacts, and countermeasures ···························································································· 422
Line rate ····································································································································································· 429
Creating a class ························································································································································ 434
Configuring match criteria ······································································································································· 435
Creating a traffic behavior ······································································································································ 437
Configuring traffic mirroring and traffic redirecting for a traffic behavior ························································· 438
Configuring other actions for a traffic behavior ···································································································· 439
Creating a policy ······················································································································································ 440
Configuring classifier-behavior associations for the poli cy ·················································································· 440
Applying a policy to a port ····································································································································· 441
Configuring queue scheduling on a port ··············································································································· 442
Configuring line rate on a port ······························································································································· 443
Configuring priority trust mode on a port ·············································································································· 445
Configuration guidelines ················································································································································ 447
ACL/QoS configuration example ································································································································· 448
Displaying information about PSE and PoE ports·································································································· 462
PoE configuration example ············································································································································ 462
Support and other resources ·································································································································· 465
Contacting HP ································································································································································· 465
Related information ························································································································································· 465
Conventions ····································································································································································· 465
Subscription service ························································································································································ 466
Index ········································································································································································ 467
12
Overview
The HP V1910 Switch Series can be configured through the command line interface (CLI), web interface,
and SNMP/MIB. These configuration methods are suitable for different application scenarios.
The web interface supports all V1910 Switch Series configurations.
The CLI provides some configuration commands to facilitate your operation. To perform other
configurations not supported by the CLI, use the web interface.
HP provides the web-based network management function to facilitate the operations and maintenance on
HP’s network devices. Through this function, the administrator can visually manage and maintain network
devices through the web-based configuration interfaces.
a. Web-based network management operating environment
Logging in to the web interface
Default login information
The device is provided with the default Web login information. You can use the default information to log
in to the web interface.
1. The default web login information
Information needed at lo
g
in Default value
Username admin
Password None
IP address of the device (VLAN-interface 1)
Default IP address of the device, depending on the status
of the network where the device resides.
Table 1 The device is not connected to the network, or no DHCP server exists in the subnet where the device
resides
If the device is not connected to the network, or no DHCP server exists in the subnet where the device resides,
you can get the default IP address of the device on the label on the device, as shown in b. The default subnet
mask is 255.255.0.0.
b. Default IP address of the device
Table 2 A DHCP server exists in the subnet where the device resides
If a DHCP server exists in the subnet where the device resides, the device will dynamically obtain its default
IP address through the DHCP server. You can log in to the device through the console port, and execute the
summary command to view the information of its default IP address.
<Sysname> summary
Select menu option: Summary
IP Method: DHCP
IP address: 10.153.96.86
Subnet mask: 255.255.255.0
Default gateway: 0.0.0.0
<Omitted>
Example
Assuming that the default IP address of the device is 169.254.52.86, follow these steps to log in to the
device through the web interface.
Connect the device to a PC
Connect the GigabitEthernet interface of the device to a PC by using a crossover Ethernet cable (by default,
all interfaces belong to VLAN 1).
Configure an IP address for the PC and ensure that the PC and device can communicate with each
other properly.
Select an IP address for the PC from network segment 169.254.0.0/16 (except for the default IP address
of the device), for example, 169.254.52.86.
Open the browser, and input the login information.
On the PC, open the browser (IE 5.0 or later), type the IP address http://169.254.52.86 in the address bar,
and press Enter to enter the login page of the web interface, as shown in a. Input the username admin and
verification code, leave the password blank, and click Login.
a. Login page of the web interface
3
g
CAUTION:
The PC where you configure the device is not necessarily a web-based network mana
A web-based network management terminal is a PC used to log in to the web interface and is required
to be reachable to the device.
After logging in to the web interface, you can select DeviceUsers from the navigation tree, create
a new user, and select Wizard or Network VLAN interface to configure the IP address of the VLAN
interface acting as the management interface. For more information, see the corresponding
configuration guides of these modules.
If you click the verification code displayed on the web login page, you can get a new verification code.
Up to five users can concurrently log in to the device through the web interface.
Logging out of the web interface
Click Logout in the upper-right corner of the web interface, as shown in ato quit the web console.
The system does not save the current configuration automatically. Therefore, it is recommended to save the
current configuration before logout.
ement terminal.
Introduction to the web interface
The Web interface is composed of three parts: navigation tree, title area, and body area, as shown in a.
a. Web-based configuration interface
(1) Navigation tree (2) Body area (3) Title area
Navigation tree—Organizes the web-based NM functions as a navigation tree, where you can select
and configure functions as needed. The result is displayed in the body area.
Body area—Allows you to configure and display features.
Title area—Displays the path of the current configuration interface in the navigation tree; provides the
Help button to display the web related help information, and the Logout button to log out of the web
interface.
4
g
p
CAUTION:
The web network management functions not supported by the device are not displayed in the navi
tree.
Web user level
Web user levels, from low to high, are visitor, monitor, configure, and management. A user with a higher
level has all the operating rights of a user with a lower level.
Visitor—Users of this level can only use the network diagnostic tools ping and Trace Route. They can
neither access the device data nor configure the device.
Monitor—Users of this level can only access the device data but cannot configure the device.
Configure—Users of this level can access device data and configure the device, but they cannot
upgrade the host software, add/delete/modify users, or back up/restore configuration files.
Management—Users of this level can perform any operations to the device.
Introduction to the web-based NM functions
ation
NOTE:
User level in 1 indicates that users of this level or users of a higher level can perform the corresponding
operations.
1. Description of Web-based NM functions
Function menu Descri
Wizard IP Setup
Setup
IRF
Topology
Summary
Device
Summary
System
Information
Summary
Device
Information
Allows you to perform quick configuration of the
device.
Displays global settings and port settings of a
stack.
Allows you to configure global parameters and
stack ports.
Displays the topology summary of a stack. Configure
Displays the control panels of stack members. Configure
Displays the basic system information, system
resource state, and recent system operation logs.
Displays the port information of the device. Monitor
tion
User level
Management
Configure
Management
Monitor
Displays and allows you to configure the system
name.
Displays and allows you to configure the idle
timeout period for logged-in users.
Configure
Configure
Devi
ce
System Name
Basic
Web Idle
Timeout
5
p
Function menu Descri
Device
Maintenan
ce
System
Time
Syslog
Configurati
on
Software
Upgrade
Reboot Allows you to configure to reboot the device. Management
Electronic Label Displays the electronic label of the device. Monitor
Diagnostic
Information
System Time
Loglist
Loghost Displays and allows you to configure the loghost. Configure
Log Setup
Backup
Restore
Allows you to configure to upload upgrade file
from local host, and upgrade the system software.
Generates diagnostic information file, and allows
you to view or save the file to local host.
Displays and allows you to configure the system
date and time.
Displays and refreshes system logs. Monitor
Allows you to clear system logs. Configure
Displays and allows you to configure the buffer
capacity, and interval for refreshing system logs.
Allows you to back up the configuration file to be
used at the next startup from the device to the host
of the current user.
Allows you to upload the configuration file to be
used at the next startup from the host of the current
user to the device.
tion
User level
Management
Management
Configure
Configure
Management
Management
File
Managem
ent
Port
Managem
ent
Port
Mirroring
Users
Save
Initialize Allows you to restore the factory default settings. Configure
File
Management
Summary Displays port information by features. Monitor
Detail Displays feature information by ports. Monitor
Setup
Summary
Create Allows you to create a port mirroring group. Configure
Remove Allows you to remove a port mirroring group. Configure
Modify Port
Summary
Super Password
Allows you to save the current configuration to the
configuration file to be used at the next startup.
Allows you to manage files on the device, such as
displaying the file list, downloading a file,
uploading a file, and removing a file.
Allows you to create, modify, delete, and
enable/disable a port, and clear port statistics.
Displays the configuration information of a port
mirroring group.
Allows you to configure ports for a mirroring
group.
Displays the brief information of FTP and Telnet
users.
Allows you to configure a password for a
lower-level user to switch from the current access
level to the management level.
Configure
Management
Configure
Monitor
Configure
Monitor
Management
Create Allows you to create an FTP or Telnet user. Management
6
p
Function menu Descri
Modify
Remove Allows you to remove an FTP or a Telnet user. Management
Switch To
Management
Loopback Loopback
VCT VCT
Port Traffic
Flow
Interval
Storm
Constrain
Statistics
Interval
Configuration
Storm Constrain
Statistics
Allows you to modify FTP or Telnet user
information.
Allows you to switch the current user level to the
management level.
Allows you to perform loopback tests on Ethernet
interfaces.
Allows you to check the status of the cables
connected to Ethernet ports.
Displays the average rate at which the interface
receives and sends packets within a specified time
interval.
Allows you to set an interval for collecting traffic
statistics on interfaces.
Displays and allows you to set the interval for
collecting storm constrain statistics.
Displays, and allows you to create, modify, and
remove the port traffic threshold.
Displays, and allows you to create, modify, and
clear RMON statistics.
tion
User level
Management
Visitor
Configure
Configure
Monitor
Configure
Configure
Configure
RMON
Energy
Saving
SNMP
History
Alarm
Event
Log Displays log information about RMON events. Configure
Energy Saving
Setup
Community
Group
User
Displays, and allows you to create, modify, and
clear RMON history sampling information.
Allows you to view, create, modify, and clear
alarm entries.
Allows you to view, create, modify, and clear event
entries.
Displays and allows you to configure the energy
saving settings of an interface.
Displays and refreshes SNMP configuration and
statistics information.
Allows you to configure SNMP. Configure
Displays SNMP community information. Monitor
Allows you to create, modify and delete an SNMP
community.
Displays SNMP group information. Monitor
Allows you to create, modify and delete an SNMP
group.
Displays SNMP user information. Monitor
Allows you to create, modify and delete an SNMP
user.
Configure
Configure
Configure
Configure
Monitor
Configure
Configure
Configure
7
p
Function menu Descri
Displays the status of the SNMP trap function and
information about target hosts.
Allows you to enable or disable the SNMP trap
function, or create, modify and delete a target host.
Displays SNMP view information. Monitor
Allows you to create, modify and delete an SNMP
view.
Displays and allows you to clear the statistics
information of an interface.
Allows you to modify the description and member
ports of a VLAN.
Allows you to change the VLAN to which a port
belongs.
Interface
Statistics
VLAN
Trap
View
Interface
Statistics
Select VLAN Allows you to select a VLAN range. Monitor
Create Allows you to create VLANs. Configure
Port Detail Displays the VLAN-related details of a port. Monitor
Detail Displays the member port information of a VLAN. Monitor
Modify VLAN
Modify Port
Remove Allows you to remove VLANs. Configure
tion
User level
Monitor
Configure
Configure
Configure
Configure
Configure
Net
work
VLAN
Interface
Voice
VLAN
MAC
Summary
Create
Modify
Remove Allows you to remove VLAN interfaces. Configure
Summary
Setup Allows you to configure the global voice VLAN. Configure
Port Setup Allows you to configure a voice VLAN on a port. Configure
OUI Summary
OUI Add
OUI Remove
MAC
Setup
Displays information about VLAN interfaces by
address type.
Allows you to create VLAN interfaces and
configure IP addresses for them.
Allows you to modify the IP addresses and status of
VLAN interfaces.
Displays voice VLAN information globally or on a
port.
Displays the addresses of the OUIs that can be
identified by voice VLAN.
Allows you to add the address of an OUI that can
be identified by voice VLAN.
Allows you to remove the address of an OUI that
can be identified by voice VLAN.
Displays MAC address information. Monitor
Allows you to create and remove MAC addresses. Configure
Displays and allows you to configure MAC address
aging time.
Monitor
Configure
Configure
Monitor
Monitor
Configure
Configure
Configure
MSTP Region Displays information about MST regions. Monitor
8
p
Function menu Descri
Allows you to modify MST regions. Configure
Global Allows you to set global MSTP parameters. Configure
Port Summary Displays the MSTP information of ports. Monitor
Port Setup Allows you to set MSTP parameters on ports. Configure
Displays information about link aggregation
groups.
Displays information about LACP-enabled ports
and their partner ports.
Displays the LLDP configuration information, local
information, neighbor information, statistics
information, and status information of a port.
Allows you to modify LLDP configuration on a port. Configure
Displays global LLDP configuration information. Monitor
Allows you to configure global LLDP parameters. Configure
Link
Aggregati
on
LACP
LLDP
Summary
Create Allows you to create link aggregation groups. Configure
Modify Allows you to modify link aggregation groups. Configure
Remove Allows you to remove link aggregation groups. Configure
Summary
Setup Allows you to set LACP priorities. Configure
Port Setup
Global Setup
tion
User level
Monitor
Monitor
Monitor
Global
Summary
Neighbor
Summary
Basic
IGMP
Snooping
Advanced
Summary Displays the IPv4 active route table. Monitor
IPv4
Routing
DHCP DHCP Relay
Create Allows you to create an IPv4 static route. Configure
Remove Allows you to delete the selected IPv4 static routes. Configure
Displays global LLDP local information and
statistics.
Displays global LLDP neighbor information. Monitor
Displays global IGMP snooping configuration
information or the IGMP snooping configuration
information in a VLAN, and allows you to view the
IGMP snooping multicast entry information.
Allows you to configure IGMP snooping globally or
in a VLAN.
Displays the IGMP snooping configuration
information on a port.
Allows you to configure IGMP snooping on a port. Configure
Displays information about the DHCP status,
advanced configuration information of the DHCP
relay agent, DHCP server group configuration,
DHCP relay agent interface configuration, and the
DHCP client information.
Monitor
Monitor
Configure
Monitor
Monitor
9
p
Function menu Descri
Allows you to enable/disable DHCP, configure
advanced DHCP relay agent settings, configure a
DHCP server group, and enable/disable the DHCP
relay agent on an interface.
Displays the status, trusted and untrusted ports and
DHCP
Snooping
Service Service
Diagnostic
Tools
ARP
Managem
ent
Ping Allows you to ping an IPv4 address. Visitor
Trace Route Allows you to perform trace route operations. Visitor
ARP Table
Gratuitous ARP
DHCP client information of DHCP snooping.
Allows you to enable/disable DHCP snooping,
and configure DHCP snooping trusted and
untrusted ports.
Displays the states of services: enabled or
disabled.
Allows you to enable/disable services, and set
related parameters.
Displays ARP table information. Monitor
Allows you to add, modify, and remove ARP
entries.
Displays the configuration information of gratuitous
ARP.
Allows you to modify the priority mapping entries. Configure
Displays port priority and trust mode information. Monitor
Allows you to modify port priority and trust mode. Configure
Displays PSE information and PoE interface
information.
Configure
Configure
Configure
Monitor
12
13
Introduction to the common items on the web pages
Buttons and icons
1. Commonly used buttons and icons
Button and icon Function
Used to apply the configuration on the current page.
Used to cancel the configuration on the current page, and return to the
corresponding list page or the Device Info page.
Used to refresh the information on the current page.
Used to clear all the information on a list or all statistics.
Used to enter a page for adding an item.
,
Used to remove the selected items.
Used to select all the entries on a list, or all the ports on the device panel.
Used to deselect all the entries on a list, or all the ports on the device panel.
Generally present on the configuration wizard; used to buffer but not apply
the configuration of the current step and enter the next configuration step.
Generally present on the configuration wizard; used to buffer but not apply
the configuration of the current step and return to the previous configuration
step.
Generally present on the configuration wizard; used to apply the
configurations of all configuration steps.
Generally present on the “Operation” column on a list; used to enter the
modification page of an item so that you can modify the configurations of
the item.
Generally present on the “Operation” column on a list; used to delete the
item corresponding to this icon.
Click the plus sign before a corresponding item. You can see the collapsed
contents.
Page display
The web interface can display a long list by pages, as shown in a. You can set the number of entries
displayed per page, and use the First, Prev, Next, and Last links to view the contents on the first, previous,
next, and last pages, or go to any page that you want to view.
14
a. Content display by pages
Search function
On some list pages, the web interface provides basic and advanced search functions. You can use the
search function to display those entries matching certain search criteria.
Basic search function—Select a search item from the drop-down list as shown in a, input the keyword,
and click the Query button to display the entries that match the criteria.
Advanced search function—Click
before Search Item, as shown in a. You can select Match case
and whole word, that is, the item to be searched must completely match the keyword, or you can select
Search in previous results. If you do not select exact search, a fuzzy search is performed.
a. Advanced search
Sorting function
On some list pages, the web interface provides the sorting function to display the entries in a certain order.
As shown in a, you can click the blue heading item of each column to sort the entries based on the heading
item you selected. Then, the heading item is displayed with an arrow beside it. The upward arrow indicates
the ascending order, and the downward arrow indicates the descending order.
a. Sort display (based on MAC address in the ascending order)
Configuration guidelines
The web console supports Microsoft Internet Explorer 6.0 SP2 and higher.
The web console does not support the Back, Next, Refresh buttons provided by the browser. Using
these buttons may result in abnormal display of web pages.
When the device is performing the spanning tree calculation, you cannot log in to or use the web
interface.
The Windows firewall limits the number of TCP connections, so when you use IE to log in to the web
interface, sometimes you may be unable to open the web interface. To avoid this problem, turn off the
Windows firewall before login.
If the software version of the device changes, when you log in to the device through the web interface,
delete the temporary Internet files of IE; otherwise, the web page content may not be displayed
correctly.
15
16
Configuration at the CLI
NOTE:
The HP V1910 Switch Series can be configured through the CLI, web interface, and SNMP/MIB,
among which the web interface supports all V1910 Switch Series configurations. These configuration
methods are suitable for different application scenarios. As a supplementary to the web interface, the
CLI provides some configuration commands to facilitate your operation, which are described in this
chapter. To perform other configurations not supported by the CLI, use the web interface.
You will enter user view directly after you log in to the device. Commands in the document are all
performed in user view.
Getting started with the CLI
As a supplementary to the web interface, the CLI provides some configuration commands to facilitate your
operation. For example, if you forget the IP address of VLAN-interface 1 and cannot log in to the device
through the web interface, you can connect the console port of the device to a PC, and reconfigure the IP
address of VLAN-interface 1 at the CLI.
This section describes using the CLI to manage the device.
Setting up the configuration environment
To set up the configuration environment, connect a terminal (a PC in this example) to the console port on the
switch with a console cable.
A console cable is an 8-core shielded cable, with a crimped RJ-45 connector at one end for connecting to
the console port of the switch, and a DB-9 female connector at the other end for connecting to the serial port
on the console terminal.
a. Console cable
Use a console cable to connect a terminal device to the switch, as follows:
Table 3 Plug the DB-9 female connector to the serial port of the console terminal or PC.
Table 4 Connect the RJ-45 connector to the console port of the switch.
V
b. Network diagram for configuration environment setup
CAUTION:
erify the mark on the console port to ensure that you are connecting to the correct port.
NOTE:
The serial port on a PC does not support hot swapping. When you connect a PC to a powered-on
switch, connect the DB-9 connector of the console cable to the PC before connecting the RJ-45
connector to the switch.
When you disconnect a PC from a powered-on switch, disconnect the DB-9 connector of the console
cable from the PC after disconnecting the RJ-45 connector from the switch.
Setting terminal parameters
To configure and manage the switch, you must run a terminal emulator program on the console terminal, for
example, a PC. This section uses Windows XP HyperTerminal as an example.
The following are the required terminal settings:
Bits per second—38400
Data bits—8
Parity—None
Stop bits—1
Flow control—None
Emulation—VT100
Follow these steps to set terminal parameters, for example, on a Windows XP HyperTerminal:
Table 5 Select Start All Programs Accessories Communications HyperTerminal, and in the
Connection Description dialog box that appears, type the name of the new connection in the Name text
box and click OK.
17
b. Connection description of the HyperTerminal
Table 6 Select the serial port to be used from the Connect using drop-down list, and click OK.
c. Set the serial port used by the HyperTerminal connection
Table 7 Set Bits per second to 38400, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to
None, and click OK.
18
Loading...
+ 453 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.