HP V1910 Switch, 1910, V1910-24G-PoE (365W), V1910-24G-PoE (170W) User Manual

HP V1910 Switch Series
User Guide
59982269
Part number: 5998-2269
Document version: 6W100-20110615
Legal and notice information
© Copyright 2011 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Preface
The HP V1910 Switch Series User Guide describes the software features for the HP 1910 switches and guides you through the software configuration procedures. It also provide configuration examples to help you apply software features to different network scenarios.
This preface includes:
Audience Conventions Contacting HP Subscription service Warranty Documents
Audience
This documentation set is intended for:
Network planners Field technical support and servicing engineers Network administrators working with the HP V1910 switches
Conventions
This section describes the conventions used in this documentation.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Descri
p
tion
Boldface
Window names, button names, field names, and menu items are in Boldface. For example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Descri
p
tion
WARNING
An alert that calls attention to important information that if not understood or followed can result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
Contacting HP
For worldwide technical support information, see the HP support website:
http://www.hp.com/support
Before contacting HP, collect the following information:
Product model names and numbers Technical support registration number (if applicable) Product serial numbers Error messages Operating system type and revision level Detailed questions
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/e-updates
After registering, you will receive e-mail notification of product enhancements, new driver versions, firmware updates, and other product resources.
Warranty
The Hewlett-Packard Limited Warranty Statement for this product and the HP Software License Terms which apply to any software accompanying this product are available on the HP networking Web site at www.hp.com/networking/warranty. The customer warranty support and services information are available on the HP networking Web site at www.hp.com/networking/support. Additionally, your HP-authorized network reseller can provide you with assistance, both with services that they offer and with services offered by HP.
Documents
To find related documents, browse to the Manuals page of the HP Business Support Center website:
http://www.hp.com/support/manuals
i
Contents
Overview ······································································································································································ 1 Configuration through the web interface ··················································································································· 2
Web-based network management operating environment ·························································································· 2 Logging in to the web interface ······································································································································· 2
Default login information ········································································································································· 2
Example ····································································································································································· 3 Logging out of the web interface ····································································································································· 4 Introduction to the web interface ····································································································································· 4 Web user level ·································································································································································· 4 Introduction to the web-based NM functions ················································································································· 5 Introduction to the common items on the web pages ································································································· 12 Configuration guidelines ··············································································································································· 15
Configuration at the CLI ············································································································································· 16
Getting started with the CLI ··········································································································································· 16
Setting up the configuration environment ··········································································································· 16
Setting terminal parameters ·································································································································· 17
Logging in to the CLI ············································································································································· 20 CLI commands ································································································································································ 21
initialize ·································································································································································· 21
ipsetup ···································································································································································· 21
password ································································································································································ 22
ping ········································································································································································· 22
quit ·········································································································································································· 23
reboot ····································································································································································· 24
summary ································································································································································· 24
upgrade ·································································································································································· 25 Configuration example for upgrading the system software image at the CLI ························································· 26
Configuration wizard ················································································································································· 28
Overview ········································································································································································· 28 Basic service setup ························································································································································· 28
Entering the configuration wizard homepage ···································································································· 28
Configuring system parameters ··························································································································· 28
Configuring management IP address ·················································································································· 29
Finishing configuration wizard ···························································································································· 31
IRF stack management ··············································································································································· 32
Configuring stack management ···································································································································· 32
Stack management configuration task list ·········································································································· 32
Configuring global parameters of a stack ·········································································································· 33
Configuring stack ports ········································································································································· 35
Displaying topology summary of a stack ············································································································ 35
Displaying device summary of a stack ················································································································ 36
Logging into a member switch from the master switch ····················································································· 36 Stack configuration example ········································································································································ 36 Configuration guidelines ··············································································································································· 42
Summary ····································································································································································· 43
Displaying device summary ·········································································································································· 43
ii
Displaying system information ····························································································································· 43
Displaying device information ····························································································································· 44
Device basic information configuration ···················································································································· 46
Configuring device basic information ·························································································································· 46
Configuring system name ····································································································································· 46
Configuring idle timeout period ··························································································································· 46
System time configuration ·········································································································································· 48
Configuring system time ················································································································································ 48 System time configuration example ····························································································································· 49 Configuration guidelines ··············································································································································· 51
Log management configuration ································································································································ 52
Configuring log management ······································································································································· 52
Configuration task list ··········································································································································· 52
Setting syslog related parameters ························································································································ 52
Displaying syslog ·················································································································································· 53
Setting loghost ······················································································································································· 55
Configuration management ······································································································································· 56
Back up configuration ···················································································································································· 56 Restore configuration ····················································································································································· 56 Save configuration ························································································································································· 57 Initialize ··········································································································································································· 58
Device maintenance ··················································································································································· 59
Software upgrade ·························································································································································· 59 Device reboot ································································································································································· 60 Electronic label ······························································································································································· 60 Diagnostic information ·················································································································································· 61
File management ························································································································································ 63
File management configuration ···································································································································· 63
Displaying file list ·················································································································································· 63
Downloading a file ··············································································································································· 64
Uploading a file····················································································································································· 64
Removing a file ······················································································································································ 64
Port management configuration ································································································································ 65
Configuring a port ························································································································································· 65
Setting operation parameters for a port ············································································································· 65
Viewing the operation parameters of a port ······································································································ 69 Port management configuration example ···················································································································· 70
Port mirroring configuration ······································································································································ 74
Introduction to port mirroring ········································································································································ 74
Implementing port mirroring ································································································································· 74 Configuring local port mirroring ·································································································································· 74
Configuration task list ··········································································································································· 74
Creating a mirroring group ·································································································································· 75
Configuring ports for a mirroring group ············································································································· 76 Configuration examples ················································································································································ 77
Local port mirroring configuration example ······································································································· 77 Configuration guidelines ··············································································································································· 80
User management ······················································································································································ 81
Overview ········································································································································································· 81
iii
Managing users ····························································································································································· 81
Adding a local user ··············································································································································· 81
Setting the super password ·································································································································· 82
Switching to the management level ····················································································································· 83
Loopback test configuration ······································································································································ 84
Overview ········································································································································································· 84 Loopback operation ······················································································································································· 84 Configuration guidelines ··············································································································································· 85
VCT·············································································································································································· 86
Overview ········································································································································································· 86 Testing cable status ························································································································································ 86
Flow interval configuration ········································································································································ 88
Overview ········································································································································································· 88 Monitoring port traffic statistics ···································································································································· 88
Setting the traffic statistics generating interval ··································································································· 88
Viewing port traffic statistics ································································································································ 88
Storm constrain configuration ··································································································································· 90
Overview ········································································································································································· 90 Configuring storm constrain ·········································································································································· 90
Setting the traffic statistics generating interval ··································································································· 90
Configuring storm constrain ································································································································· 91
RMON configuration ················································································································································· 94
Working mechanism ············································································································································· 94
RMON groups ······················································································································································· 95 Configuring RMON ······················································································································································· 96
Configuration task list ··········································································································································· 96
Configuring a statistics entry ································································································································ 98
Configuring a history entry ··································································································································· 99
Configuring an event entry ································································································································· 100
Configuring an alarm entry ································································································································ 101
Displaying RMON statistics information ··········································································································· 103
Displaying RMON history sampling information ····························································································· 105
Displaying RMON event logs ···························································································································· 107 RMON configuration example ··································································································································· 107
Energy saving configuration ··································································································································· 112
Overview ······································································································································································· 112 Configuring energy saving on a port ························································································································ 112
SNMP configuration ··············································································································································· 114
SNMP mechanism ··············································································································································· 114
SNMP protocol version ······································································································································· 115 SNMP configuration ···················································································································································· 115
Configuration task list ········································································································································· 115
Enabling SNMP ··················································································································································· 116
Configuring an SNMP view ······························································································································· 118
Configuring an SNMP community ····················································································································· 120
Configuring an SNMP group ····························································································································· 121
Configuring an SNMP user ································································································································ 122
Configuring SNMP trap function ······················································································································· 124 SNMP configuration example ····································································································································· 125
iv
Interface statistics ···················································································································································· 131
Overview ······································································································································································· 131 Displaying interface statistics ······································································································································ 131
VLAN configuration ················································································································································ 133
Introduction to VLAN ··········································································································································· 133
VLAN fundamentals············································································································································· 133
VLAN types ·························································································································································· 134
Introduction to port-based VLAN ······················································································································· 135 Configuring a VLAN ···················································································································································· 136
Configuration task list ········································································································································· 136
Creating VLANs ··················································································································································· 136
Selecting VLANs ·················································································································································· 137
Modifying a VLAN ·············································································································································· 138
Modifying ports ··················································································································································· 140 VLAN configuration example ······································································································································ 141 Configuration guidelines ············································································································································· 145
VLAN interface configuration ································································································································· 146
Configuring VLAN interfaces ······································································································································ 146
Configuration task list ········································································································································· 146
Creating a VLAN interface ································································································································· 146
Modifying a VLAN interface ······························································································································ 147
Voice VLAN configuration ······································································································································ 149
OUI addresses ····················································································································································· 149
Voice VLAN assignment modes ························································································································· 149
Security mode and normal mode of voice VLANs ··························································································· 150 Configuring the voice VLAN ······································································································································· 151
Configuration task list ········································································································································· 151
Configuring voice VLAN globally ······················································································································ 153
Configuring voice VLAN on a port ···················································································································· 153
Adding OUI addresses to the OUI list ·············································································································· 155 Voice VLAN configuration examples ························································································································· 155
Configuring voice VLAN on a port in automatic voice VLAN assignment mode ········································· 155
Configuring a voice VLAN on a port in manual voice VLAN assignment mode ········································· 160 Configuration guidelines ············································································································································· 166
MAC address configuration ··································································································································· 167
Configuring MAC addresses ······································································································································ 168
Configuring a MAC address entry ···················································································································· 168
Setting the aging time of MAC address entries ······························································································· 170 MAC address configuration example ························································································································ 170
MSTP configuration ················································································································································· 172
STP ················································································································································································· 172
STP protocol packets ··········································································································································· 172
Basic concepts in STP ·········································································································································· 172
How STP works ···················································································································································· 173 RSTP ··············································································································································································· 179 MSTP ·············································································································································································· 179
STP and RSTP limitations ····································································································································· 179
MSTP features ······················································································································································ 180
MSTP basic concepts ·········································································································································· 180
How MSTP works ················································································································································ 184
Implementation of MSTP on devices ·················································································································· 18 4
v
Protocols and standards ····································································································································· 185 Configuring MSTP ························································································································································ 185
Configuration task list ········································································································································· 185
Configuring an MST region ······························································································································· 185
Configuring MSTP globally ································································································································ 187
Configuring MSTP on a port ······························································································································ 189
Displaying MSTP information of a port ············································································································· 191 MSTP configuration example ······································································································································ 194 Configuration guidelines ············································································································································· 198
Link aggregation and LACP configuration ············································································································ 200
Basic concepts ····················································································································································· 200
Link aggregation modes ····································································································································· 201
Load sharing mode of an aggregation group ·································································································· 203 Configuring link aggregation and LACP ··················································································································· 203
Configuration task list ········································································································································· 203
Creating a link aggregation group ··················································································································· 204
Displaying information of an aggregate interface ·························································································· 206
Setting LACP priority ··········································································································································· 206
Displaying information of LACP-enabled ports ································································································ 207 Link aggregation and LACP configuration example ································································································· 209 Configuration guidelines ············································································································································· 211
LLDP configuration ··················································································································································· 213
Background ·························································································································································· 213
Basic concepts ····················································································································································· 213
How LLDP works ·················································································································································· 217
Compatibility of LLDP with CDP ························································································································· 217
Protocols and standards ····································································································································· 218 Configuring LLDP ·························································································································································· 218
LLDP configuration task list ································································································································· 218
Enabling LLDP on ports ······································································································································· 219
Configuring LLDP settings on ports ···················································································································· 220
Configuring global LLDP setup ··························································································································· 224
Displaying LLDP information for a port ············································································································· 226
Displaying global LLDP information ··················································································································· 230
Displaying LLDP information received from LLDP neighbors ··········································································· 232 LLDP configuration examples ······································································································································ 232
Basic LLDP configuration example ····················································································································· 232
CDP-compatible LLDP configuration example ··································································································· 238 Configuration guidelines ············································································································································· 244
IGMP snooping configuration ································································································································ 245
Overview ······································································································································································· 245
Principle of IGMP snooping ······························································································································· 245
IGMP snooping related ports ····························································································································· 245
Work mechanism of IGMP snooping ················································································································ 246
IGMP snooping querier ······································································································································ 248
Protocols and standards ····································································································································· 248 Configuring IGMP snooping ······································································································································· 248
Configuration task list ········································································································································· 248
Enabling IGMP snooping globally ···················································································································· 249
Configuring IGMP snooping in a VLAN ··········································································································· 249
Configuring IGMP snooping port functions ······································································································ 251
Display IGMP snooping multicast entry information ························································································ 252 IGMP snooping configuration example ····················································································································· 253
vi
Routing configuration ·············································································································································· 259
Routing table ························································································································································ 259
Static route ··························································································································································· 259
Default route ························································································································································· 260 Configuring IPv4 routing ············································································································································· 260
Displaying the IPv4 active route table ··············································································································· 260
Creating an IPv4 static route ······························································································································ 261 Static route configuration example ···························································································································· 262 Precautions ···································································································································································· 266
DHCP overview ······················································································································································· 267
Introduction to DHCP ··················································································································································· 267 DHCP address allocation ············································································································································ 267
Allocation mechanisms ······································································································································· 267
Dynamic IP address allocation process············································································································· 268
IP address lease extension·································································································································· 268 DHCP message format ················································································································································· 269 DHCP options ······························································································································································· 270
DHCP options overview ······································································································································ 270
Introduction to DHCP options ····························································································································· 270
Introduction to Option 82 ··································································································································· 270 Protocols and standards ·············································································································································· 271
DHCP relay agent configuration ···························································································································· 272
Introduction to DHCP relay agent ······························································································································ 272
Application environment ····································································································································· 272
Fundamentals ······················································································································································· 272 DHCP relay agent configuration task list ··················································································································· 273 Enabling DHCP and configuring advanced parameters for the DHCP relay agent ············································· 274 Creating a DHCP server group ·································································································································· 275 Enabling the DHCP relay agent on an interface ······································································································ 276 Configuring and displaying clients' IP-to-MAC bindings ························································································· 277 DHCP relay agent configuration example ················································································································· 277
DHCP snooping configuration ······························································································································· 281
DHCP snooping overview ··········································································································································· 281
Functions of DHCP snooping······························································································································ 281
Application environment of trusted ports ·········································································································· 282
DHCP snooping support for Option 82 ············································································································ 283 DHCP snooping configuration task list ······················································································································ 283 Enabling DHCP snooping ··········································································································································· 284 Configuring DHCP snooping functions on an interface ··························································································· 285 Displaying clients' IP-to-MAC bindings ······················································································································ 285 DHCP snooping configuration example ···················································································································· 286
Service management configuration ······················································································································· 291
Configuring service management ······························································································································ 292
Diagnostic tools ······················································································································································· 294
Ping ······································································································································································· 294
Trace route ··························································································································································· 294 Diagnostic tool operations ·········································································································································· 295
Ping operation ····················································································································································· 295
Trace route operation·········································································································································· 296
ARP management ···················································································································································· 298
ARP overview ································································································································································ 298
vii
ARP function ························································································································································· 298
ARP message format ··········································································································································· 298
ARP operation ······················································································································································ 299
ARP table ······························································································································································ 299 Managing ARP entries ················································································································································· 300
Displaying ARP entries ········································································································································ 300
Creating a static ARP entry ································································································································ 301
Static ARP configuration example ····················································································································· 301 Gratuitous ARP ····························································································································································· 305
Introduction to gratuitous ARP ···························································································································· 305
Configuring gratuitous ARP ································································································································ 305
ARP attack defense configuration ·························································································································· 307
ARP detection ······························································································································································· 307
Introduction to ARP detection ····························································································································· 307
Configuring ARP detection ································································································································· 309
Creating a static binding entry ·························································································································· 311
802.1X fundamentals ············································································································································· 312
Architecture of 802.1X ················································································································································ 312 Controlled/uncontrolled port and port authorization status ···················································································· 312
802.1X-related protocols ············································································································································ 313
Packet formats ······················································································································································ 313
EAP over RADIUS ················································································································································ 315 Initiating 802.1X authentication ································································································································· 315
802.1X client as the initiator ······························································································································ 315
Access device as the initiator ····························································································································· 315
802.1X authentication procedures····························································································································· 316
A comparison of EAP relay and EAP termination ···························································································· 316
EAP relay ······························································································································································ 317
EAP termination ··················································································································································· 319
802.1X configuration ············································································································································· 320
HP implementation of 802.1X ···································································································································· 320
Access control methods ······································································································································ 320
Using 802.1X authentication with other features ···························································································· 320 Configuring 802.1X ···················································································································································· 321
Configuration prerequisites ································································································································ 321
802.1X configuration task list ···························································································································· 322
Configuring 802.1X globally ····························································································································· 322
Configuring 802.1X on a port ··························································································································· 324 Configuration examples ·············································································································································· 326
802.1X configuration example ·························································································································· 326
ACL assignment configuration example············································································································ 333
AAA configuration ·················································································································································· 342
Overview ······································································································································································· 342
Introduction to AAA ············································································································································ 342
Domain-based user management ······················································································································ 343 Configuring AAA ························································································································································· 343
Configuration prerequisites ································································································································ 343
Configuration task list ········································································································································· 343
Configuring an ISP domain ································································································································ 344
Configuring authentication methods for the ISP domain ················································································· 345
Configuring authorization methods for the ISP domain ·················································································· 346
Configuring accounting methods for the ISP domain ······················································································ 347
viii
AAA configuration example ······································································································································· 349
RADIUS configuration ············································································································································· 354
Introduction to RADIUS ······································································································································· 354
Client/server model ············································································································································ 354
Security and authentication mechanisms ·········································································································· 354
Basic message exchange process of RADIUS ·································································································· 355
RADIUS packet format ········································································································································ 356
Extended RADIUS attributes ······························································································································· 358
Protocols and standards ····································································································································· 359 Configuring RADIUS ···················································································································································· 359
Configuration task list ········································································································································· 359
Configuring RADIUS servers ······························································································································ 360
Configuring RADIUS parameters ······················································································································· 361 RADIUS configuration example ·································································································································· 363 Configuration guidelines ············································································································································· 369
Users ········································································································································································ 370
Configuring users ························································································································································· 370
Configuring a local user ····································································································································· 370
Configuring a user group ··································································································································· 372
PKI configuration ····················································································································································· 374
PKI overview ································································································································································· 374
PKI terms ······························································································································································· 374
Architecture of PKI ··············································································································································· 374
Applications of PKI ·············································································································································· 375
Operation of PKI ·················································································································································· 376 Configuring PKI ···························································································································································· 376
Configuration task list ········································································································································· 376
Creating a PKI entity ··········································································································································· 379
Creating a PKI domain ······································································································································· 380
Generating an RSA key pair ······························································································································ 383
Destroying the RSA key pair ······························································································································ 383
Retrieving a certificate ········································································································································ 384
Requesting a local certificate ····························································································································· 385
Retrieving and displaying a CRL ························································································································ 386 PKI configuration example ·········································································································································· 388
Configuring a PKI entity to request a certificate from a CA ··········································································· 388 Configuration guidelines ············································································································································· 393
Port isolation group configuration ·························································································································· 394
Overview ······································································································································································· 394 Configuring a port isolation group ···························································································································· 394 Port isolation group configuration example ·············································································································· 395
Authorized IP configuration ···································································································································· 397
Overview ······································································································································································· 397 Configuring authorized IP ··········································································································································· 397 Authorized IP configuration example ························································································································· 398
Authorized IP configuration example ················································································································ 398
ACL configuration ··················································································································································· 401
ACL overview ······························································································································································· 401
Introduction to IPv4 ACL ····································································································································· 401
Effective period of an ACL ································································································································· 402
ACL step ······························································································································································· 402
ix
Configuring an ACL ····················································································································································· 403
Configuration task list ········································································································································· 403
Configuring a time range ··································································································································· 403
Creating an IPv4 ACL ········································································································································· 405
Configuring a rule for a basic IPv4 ACL ··········································································································· 40 5
Configuring a rule for an advanced IPv4 ACL ································································································· 407
Configuring a rule for an Ethernet frame header ACL ···················································································· 410 Configuration guidelines ············································································································································· 412
QoS configuration ··················································································································································· 413
Introduction to QoS ······················································································································································ 413
Networks without QoS guarantee ····················································································································· 413
QoS requirements of new applications ············································································································· 413
Congestion: causes, impacts, and countermeasures ······················································································· 413
End-to-end QoS ···················································································································································· 415
Traffic classification ············································································································································· 415
Packet precedences ············································································································································· 416
Queue scheduling ··············································································································································· 418
Line rate ································································································································································ 420
Priority mapping ·················································································································································· 421
Introduction to priority mapping tables ············································································································· 422 QoS configuration························································································································································ 423
Configuration task lists ········································································································································ 423
Creating a class ··················································································································································· 425
Configuring match criteria ································································································································· 426
Creating a traffic behavior ································································································································· 428
Configuring traffic mirroring and traffic redirecting for a traffic behavior ··················································· 429
Configuring other actions for a traffic behavior ······························································································ 430
Creating a policy················································································································································· 431
Configuring classifier-behavior associations for the policy ············································································ 431
Applying a policy to a port ································································································································ 432
Configuring queue scheduling on a port ·········································································································· 433
Configuring line rate on a port ·························································································································· 434
Configuring priority mapping tables ················································································································· 435
Configuring priority trust mode on a port ········································································································· 436 Configuration guidelines ············································································································································· 438
ACL/QoS configuration examples ························································································································ 439
ACL/QoS configuration example ······························································································································ 439
PoE configuration ···················································································································································· 448
PoE overview ································································································································································ 448
Advantages ·························································································································································· 448
Composition ························································································································································· 448
Protocol specification ·········································································································································· 449 Configuring PoE ··························································································································································· 449
Configuring PoE ports ········································································································································· 449
Configuring non-standard PD detection ············································································································ 451
Displaying information about PSE and PoE ports ···························································································· 452 PoE configuration example ········································································································································· 452
Index ········································································································································································ 455
1
Overview
The HP V1910 Switch Series can be configured through the command line interface (CLI), web interface, and SNMP/MIB. These configuration methods are suitable for different application scenarios.
The web interface supports all V1910 Switch Series configurations. The CLI provides some configuration commands to facilitate your operation. To perform other
configurations not supported by the CLI, use the web interface.
2
Configuration through the web interface
Web-based network management operating environment
HP provides the web-based network management function to facilitate the operations and maintenance on HP’s network devices. Through this function, the administrator can visually manage and maintain network devices through the web-based configuration interfaces.
Figure 1 Web-based network management operating environment
Logging in to the web interface
Default login information
The device is provided with the default Web login information. You can use the default information to log in to the web interface.
Table 1 The default web login information
Information needed at lo
g
in Default value
Username admin
Password None
IP address of the device (VLAN-interface 1)
Default IP address of the device, depending on the status of the network where the device resides.
1. The device is not connected to the network, or no DHCP server exists in the subnet where the
device resides
If the device is not connected to the network, or no DHCP server exists in the subnet where the device resides, you can get the default IP address of the device on the label on the device, as shown in Figure
2. The default subnet mask is 255.255.0.0.
Figure 2 Default IP address of the device
2. A DHCP server exists in the subnet where the device resides
3
If a DHCP server exists in the subnet where the device resides, the device will dynamically obtain its default IP address through the DHCP server. You can log in to the device through the console port, and execute the summary command to view the information of its default IP address.
<Sysname> summary Select menu option: Summary IP Method: DHCP IP address: 10.153.96.86 Subnet mask: 255.255.255.0 Default gateway: 0.0.0.0 <Omitted>
Example
Assuming that the default IP address of the device is 169.254.52.86, follow these steps to log in to the device through the web interface.
Connect the device to a PC
Connect the GigabitEthernet interface of the device to a PC by using a crossover Ethernet cable (by default, all interfaces belong to VLAN 1).
Configure an IP address for the PC and ensure that the PC and device can communicate with each
other properly.
Select an IP address for the PC from network segment 169.254.0.0/16 (except for the default IP address of the device), for example, 169.254.52.86.
Open the browser, and input the login information.
On the PC, open the browser (IE 5.0 or later), type the IP address http://169.254.52.86 in the address bar, and press Enter to enter the login page of the web interface, as shown in Figure 3.Input the username admin and the verification code, leave the password blank, and click Login.
Figure 3 Login page of the web interface
CAUTION:
The PC where you configure the device is not necessarily a web-based network mana
g
ement terminal. A web-based network management terminal is a PC used to log in to the web interface and is required to be reachable to the device.
After logging in to the web interface, you can select Device > Users from the navigation tree, create a
new user, and select Wizard or Network > VLAN interface to configure the IP address of the VLAN interface acting as the management interface. For more information, see the corresponding configuration guides of these modules.
If you click the verification code displayed on the web login page, you can get a new verification code.Up to five users can concurrently log in to the device through the web interface.
4
Logging out of the web interface
Click Logout in the upper-right corner of the web interface, as shown in Figure 4 to quit the web console.
The system does not save the current configuration automatically. Therefore, you are recommended to save the current configuration before logout.
Introduction to the web interface
The Web interface is composed of three parts: navigation tree, title area, and body area, as shown in
Figure 4.
Figure 4 Web-based configuration interface
(1) Navigation tree (2) Body area (3) Title area
Navigation tree—Organizes the web-based NM functions as a navigation tree, where you can
select and configure functions as needed. The result is displayed in the body area.
Body area—Allows you to configure and display features. Title area—Displays the path of the current configuration interface in the navigation tree; provides
the Help button to display the web related help information, and the Logout button to log out of the web interface.
CAUTION:
The web network management functions not supported by the device are not displayed in the navi
g
ation
tree.
Web user level
Web user levels, from low to high, are visitor, monitor, configure, and management. A user with a higher level has all the operating rights of a user with a lower level.
Visitor—Users of this level can only use the network diagnostic tools ping and Trace Route. They can
neither access the device data nor configure the device.
Monitor—Users of this level can only access the device data but cannot configure the device.
5
Configure—Users of this level can access device data and configure the device, but they cannot
upgrade the host software, add/delete/modify users, or back up/restore configuration files.
Management—Users of this level can perform any operations to the device.
Introduction to the web-based NM functions
NOTE:
User level in Table 2 indicates that users of this level or users of a higher level can perform the corresponding operations.
Table 2 Description of Web-based NM functions
Function menu Descri
p
tion
User level
Wizard IP Setup
Allows you to perform quick configuration of the device.
Management
IRF
Setup
Displays global settings and port settings of a stack.
Configure
Allows you to configure global parameters and stack ports.
Management
Topology Summary
Displays the topology summary of a stack. Configure
Device Summary
Displays the control panels of stack members. Configure
Summary
System Information
Displays the basic system information, system resource state, and recent system operation logs.
Monitor
Device Information
Displays the port information of the device. Monitor
Devi ce
Basic
System Name
Displays and allows you to configure the system name.
Configure
Web Idle Timeout
Displays and allows you to configure the idle timeout period for logged-in users.
Configure
Device Maintenan ce
Software Upgrade
Allows you to configure to upload upgrade file from local host, and upgrade the system software.
Management
Reboot Allows you to configure to reboot the device. Management
Electronic Label Displays the electronic label of the device. Monitor
Diagnostic Information
Generates diagnostic information file, and allows you to view or save the file to local host.
Management
System Time
System Time
Displays and allows you to configure the system date and time.
Configure
Syslog
Loglist
Displays and refreshes system logs. Monitor
Allows you to clear system logs. Configure
Loghost Displays and allows you to configure the loghost. Configure
Log Setup
Displays and allows you to configure the buffer capacity, and interval for refreshing system logs.
Configure
6
Function menu Descri
p
tion
User level
Configurati on
Backup
Allows you to back up the configuration file to be used at the next startup from the device to the host of the current user.
Management
Restore
Allows you to upload the configuration file to be used at the next startup from the host of the current user to the device.
Management
Save
Allows you to save the current configuration to the configuration file to be used at the next startup.
Configure
Initialize Allows you to restore the factory default settings. Configure
File Managem ent
File Management
Allows you to manage files on the device, such as displaying the file list, downloading a file, uploading a file, and removing a file.
Management
Port Managem ent
Summary Displays port information by features. Monitor
Detail Displays feature information by ports. Monitor
Setup
Allows you to create, modify, delete, and enable/disable a port, and clear port statistics.
Configure
Port Mirroring
Summary
Displays the configuration information of a port mirroring group.
Monitor
Create Allows you to create a port mirroring group. Configure
Remove Allows you to remove a port mirroring group. Configure
Modify Port
Allows you to configure ports for a mirroring group.
Configure
Users
Summary
Displays the brief information of FTP and Telnet users.
Monitor
Super Password
Allows you to configure a password for a lower-level user to switch from the current access level to the management level.
Management
Create Allows you to create an FTP or Telnet user. Management
Modify
Allows you to modify FTP or Telnet user information.
Management
Remove Allows you to remove an FTP or a Telnet user. Management
Switch To Management
Allows you to switch the current user level to the management level.
Visitor
Loopback Loopback
Allows you to perform loopback tests on Ethernet interfaces.
Configure
VCT VCT
Allows you to check the status of the cables connected to Ethernet ports.
Configure
Flow Interval
Port Traffic Statistics
Displays the average rate at which the interface receives and sends packets within a specified time interval.
Monitor
Interval Configuration
Allows you to set an interval for collecting traffic statistics on interfaces.
Configure
7
Function menu Descri
p
tion
User level
Storm Constrain
Storm Constrain
Displays and allows you to set the interval for collecting storm constrain statistics.
Displays, and allows you to create, modify, and remove the port traffic threshold.
Configure
RMON
Statistics
Displays, and allows you to create, modify, and clear RMON statistics.
Configure
History
Displays, and allows you to create, modify, and clear RMON history sampling information.
Configure
Alarm
Allows you to view, create, modify, and clear alarm entries.
Configure
Event
Allows you to view, create, modify, and clear event entries.
Configure
Log Displays log information about RMON events. Configure
Energy Saving
Energy Saving
Displays and allows you to configure the energy saving settings of an interface.
Configure
SNMP
Setup
Displays and refreshes SNMP configuration and statistics information.
Monitor
Allows you to configure SNMP. Configure
Community
Displays SNMP community information. Monitor
Allows you to create, modify and delete an SNMP community.
Configure
Group
Displays SNMP group information. Monitor
Allows you to create, modify and delete an SNMP group.
Configure
User
Displays SNMP user information. Monitor
Allows you to create, modify and delete an SNMP user.
Configure
Trap
Displays the status of the SNMP trap function and information about target hosts.
Monitor
Allows you to enable or disable the SNMP trap function, or create, modify and delete a target host.
Configure
View
Displays SNMP view information. Monitor
Allows you to create, modify and delete an SNMP view.
Configure
Interface Statistics
Interface Statistics
Displays and allows you to clear the statistics information of an interface.
Configure
Net
VLAN Select VLAN Allows you to select a VLAN range. Monitor
8
Function menu Descri
p
tion
User level
Create Allows you to create VLANs. Configure
Port Detail Displays the VLAN-related details of a port. Monitor
Detail Displays the member port information of a VLAN. Monitor
Modify VLAN
Allows you to modify the description and member ports of a VLAN.
Configure
Modify Port
Allows you to change the VLAN to which a port belongs.
Configure
Remove Allows you to remove VLANs. Configure
VLAN Interface
Summary
Displays information about VLAN interfaces by address type.
Monitor
Create
Allows you to create VLAN interfaces and configure IP addresses for them.
Configure
Modify
Allows you to modify the IP addresses and status of VLAN interfaces.
Configure
Remove Allows you to remove VLAN interfaces. Configure
Voice VLAN
Summary
Displays voice VLAN information globally or on a port.
Monitor
Setup Allows you to configure the global voice VLAN. Configure
Port Setup Allows you to configure a voice VLAN on a port. Configure
OUI Summary
Displays the addresses of the OUIs that can be identified by voice VLAN.
Monitor
OUI Add
Allows you to add the address of an OUI that can be identified by voice VLAN.
Configure
OUI Remove
Allows you to remove the address of an OUI that can be identified by voice VLAN.
Configure
MAC
MAC
Displays MAC address information. Monitor
Allows you to create and remove MAC addresses. Configure
Setup
Displays and allows you to configure MAC address aging time.
Configure
MSTP
Region
Displays information about MST regions. Monitor
Allows you to modify MST regions. Configure
Global Allows you to set global MSTP parameters. Configure
Port Summary Displays the MSTP information of ports. Monitor
Port Setup Allows you to set MSTP parameters on ports. Configure
Link Aggregati on
Summary
Displays information about link aggregation groups.
Monitor
Create Allows you to create link aggregation groups. Configure
Modify Allows you to modify link aggregation groups. Configure
Remove Allows you to remove link aggregation groups. Configure
9
Function menu Descri
p
tion
User level
LACP
Summary
Displays information about LACP-enabled ports and their partner ports.
Monitor
Setup Allows you to set LACP priorities. Configure
LLDP
Port Setup
Displays the LLDP configuration information, local information, neighbor information, statistics information, and status information of a port.
Monitor
Allows you to modify LLDP configuration on a port. Configure
Global Setup
Displays global LLDP configuration information. Monitor
Allows you to configure global LLDP parameters. Configure
Global Summary
Displays global LLDP local information and statistics.
Monitor
Neighbor Summary
Displays global LLDP neighbor information. Monitor
IGMP Snooping
Basic
Displays global IGMP snooping configuration information or the IGMP snooping configuration information in a VLAN, and allows you to view the IGMP snooping multicast entry information.
Monitor
Allows you to configure IGMP snooping globally or in a VLAN.
Configure
Advanced
Displays the IGMP snooping configuration information on a port.
Monitor
Allows you to configure IGMP snooping on a port. Configure
IPv4 Routing
Summary Displays the IPv4 active route table. Monitor
Create Allows you to create an IPv4 static route. Configure
Remove Allows you to delete the selected IPv4 static routes. Configure
DHCP
DHCP Relay
Displays information about the DHCP status, advanced configuration information of the DHCP relay agent, DHCP server group configuration, DHCP relay agent interface configuration, and the DHCP client information.
Monitor
Allows you to enable/disable DHCP, configure advanced DHCP relay agent settings, configure a DHCP server group, and enable/disable the DHCP relay agent on an interface.
Configure
DHCP Snooping
Displays the status, trusted and untrusted ports and DHCP client information of DHCP snooping.
Monitor
Allows you to enable/disable DHCP snooping, and configure DHCP snooping trusted and untrusted ports.
Configure
Service Service
Displays the states of services: enabled or disabled.
Configure
Allows you to enable/disable services, and set related parameters.
Management
10
Function menu Descri
p
tion
User level
Diagnostic Tools
Ping Allows you to ping an IPv4 address. Visitor
Trace Route Allows you to perform trace route operations. Visitor
ARP Managem ent
ARP Table
Displays ARP table information. Monitor
Allows you to add, modify, and remove ARP entries.
Configure
Gratuitous ARP
Displays the configuration information of gratuitous ARP.
Monitor
Allows you to configure gratuitous ARP. Configure
ARP Anti-Attack
ARP Detection
Displays ARP detection configuration information. Monitor
Allows you to configure ARP detection. Configure
Auth entic ation
802.1X 802.1X
Displays 802.1X configuration information globally or on a port.
Monitor
Allows you to configure 802.1X globally or on a port.
Configure
AAA
Domain Setup
Displays ISP domain configuration information. Monitor
Allows you to add and remove ISP domains. Management
Authentication
Displays the authentication configuration information of an ISP domain.
Monitor
Allows you to specify authentication methods for an ISP domain.
Management
Authorization
Displays the authorization method configuration information of an ISP domain.
Monitor
Allows you to specify authorization methods for an ISP domain.
Management
Accounting
Displays the accounting method configuration information of an ISP domain.
Monitor
Allows you to specify accounting methods for an ISP domain.
Management
RADIUS
RADIUS Server
Displays and allows you to configure RADIUS server information.
Management
RADIUS Setup
Displays and allows you to configure RADIUS parameters.
Management
Users
Local User
Displays configuration information about local users.
Monitor
Allows you to create, modify and remove a local user.
Management
User Group
Displays configuration information about user groups.
Monitor
Allows you to create, modify and remove a user group.
Management
PKI Entity Displays information about PKI entities. Monitor
11
Function menu Descri
p
tion
User level
Allows you to add, modify, and delete a PKI entity. Configure
Domain
Displays information about PKI domains. Monitor
Allows you to add, modify, and delete a PKI domain.
Configure
Certificate
Displays the certificate information of PKI domains and allows you to view the contents of a certificate.
Monitor
Allows you to generate a key pair, destroy a key pair, retrieve a certificate, request a certificate, and delete a certificate.
Configure
CRL
Displays the contents of the CRL. Monitor
Allows you to receive the CRL of a domain. Configure
Secu rity
Port Isolate Group
Summary Displays port isolation group information. Monitor
Modify Allows you to configure a port isolation group. Configure
Authorized IP
Summary
Displays the configurations of authorized IP, the associated IPv4 ACL list, and the associated IPv6 ACL list.
Management
Setup Allows you to configure authorized IP. Management
QoS
Time Range
Summary Displays time range configuration information. Monitor
Create Allows you to create a time range. Configure
Remove Allows you to delete a time range. Configure
ACL IPv4
Summary Displays IPv4 ACL configuration information. Monitor
Create Allows you to create an IPv4 ACL. Configure
Basic Setup Allows you to configure a rule for a basic IPv4 ACL. Configure
Advanced Setup
Allows you to configure a rule for an advanced IPv4 ACL.
Configure
Link Setup Allows you to create a rule for a link layer ACL. Configure
Remove Allows you to delete an IPv4 ACL or its rules. Configure
Queue
Summary Displays the queue information of a port. Monitor
Setup Allows you to configure a queue on a port. Configure
Line Rate
Summary Displays line rate configuration information. Monitor
Setup Allows you to configure the line rate. Configure
Classifier
Summary Displays classifier configuration information. Monitor
Create Allows you to create a class. Configure
Setup
Allows you to configure the classification rules for a class.
Configure
Remove
Allows you to delete a class or its classification rules.
Configure
Behavior
Summary Displays traffic behavior configuration information. Monitor
Create Allows you to create a traffic behavior. Configure
12
Function menu Descri
p
tion
User level
Setup
Allows you to configure actions for a traffic behavior.
Configure
Port Setup
Allows you to configure traffic mirroring and traffic redirecting for a traffic behavior
Configure
Remove Allows you to delete a traffic behavior. Configure
QoS Policy
Summary Displays QoS policy configuration information. Monitor
Create Allows you to create a QoS policy. Configure
Setup
Allows you to configure the classifier-behavior associations for a QoS policy.
Configure
Remove
Allows you to delete a QoS policy or its classifier-behavior associations.
Configure
Port Policy
Summary Displays the QoS policy applied to a port. Monitor
Setup Allows you to apply a QoS policy to a port. Configure
Remove Allows you to remove the QoS policy from the port. Configure
Priority Mapping
Priority Mapping
Displays priority mapping table information. Monitor
Allows you to modify the priority mapping entries. Configure
Port Priority Port Priority
Displays port priority and trust mode information. Monitor
Allows you to modify port priority and trust mode. Configure
PoE PoE
Summary
Displays PSE information and PoE interface information.
Monitor
Setup Allows you to configure a PoE interface. Configure
Introduction to the common items on the web pages
Buttons and icons
Table 3 Commonly used buttons and icons
Button and icon Function
Used to apply the configuration on the current page.
Used to cancel the configuration on the current page, and return to the corresponding list page or the Device Info page.
Used to refresh the information on the current page.
Used to clear all the information on a list or all statistics.
Used to enter a page for adding an item.
,
Used to remove the selected items.
Used to select all the entries on a list, or all the ports on the device panel.
13
Button and icon Function
Used to deselect all the entries on a list, or all the ports on the device panel.
Generally present on the configuration wizard; used to buffer but not apply the configuration of the current step and enter the next configuration step.
Generally present on the configuration wizard; used to buffer but not apply the configuration of the current step and return to the previous configuration step.
Generally present on the configuration wizard; used to apply the configurations of all configuration steps.
Generally present on the “Operation” column on a list; used to enter the modification page of an item so that you can modify the configurations of the item.
Generally present on the “Operation” column on a list; used to delete the item corresponding to this icon.
Click the plus sign before a corresponding item. You can see the collapsed contents.
Page display
The web interface can display a long list by pages, as shown in Figure 5. You can set the number of entries displayed per page, and use the First, Prev, Next, and Last links to view the contents on the first, previous, next, and last pages, or go to any page that you want to view.
Figure 5 Content display by pages
14
Search function
On some list pages, the web interface provides basic and advanced search functions. You can use the search function to display those entries matching certain search criteria.
Basic search function—Select a search item from the drop-down list as shown in Figure 5, input the
keyword, and click the Query button to display the entries that match the criteria.
Advanced search function—You can click
before Search Item, as shown in Figure 6. You can select Match case and whole word, that is, the item to be searched must completely match the keyword, or you can select Search in previous results. If you do not select exact search, fuzzy search is performed.
Figure 6 Advanced search
Sorting function
On some list pages, the web interface provides the sorting function to display the entries in a certain order.
As shown in Figure 7, you can click the blue heading item of each column to sort the entries based on the heading item you selected. Then, the heading item is displayed with an arrow beside it. The upward arrow indicates the ascending order, and the downward arrow indicates the descending order.
Figure 7 Sort display (based on MAC address in the ascending order)
15
Configuration guidelines
The web console supports Microsoft Internet Explorer 6.0 SP2 and higher. The web console does not support the Back, Next, Refresh buttons provided by the browser. Using
these buttons may result in abnormal display of web pages.
When the device is performing spanning tree calculation, you cannot log in to or use the web
interface.
The Windows firewall limi ts th e num ber of TCP connections, so when you use I E to log in to th e we b
interface, sometimes you may be unable to open the web interface. To avoid this problem, turn off the Windows firewall before login.
If the software version of the device changes, when you log in to the device through the web
interface, delete the temporary Internet files of IE; otherwise, the web page content may not be displayed correctly.
16
Configuration at the CLI
NOTE:
The HP V1910 Switch Series can be confi
g
ured through the CLI, web interface, and SNMP/MIB, amon
g
which the web interface supports all V1910 Switch Series configurations. These configuration methods are suitable for different application scenarios. As a supplementary to the web interface, the CLI provides some configuration commands to facilitate your operation, which are described in this chapter. To perform other configurations not supported by the CLI, use the web interface.
You will enter user view directly after you log in to the device. Commands in the document are all
performed in user view.
Getting started with the CLI
As a supplementary to the web interface, the CLI provides some configuration commands to facilitate your operation. For example, if you forget the IP address of VLAN-interface 1 and cannot log in to the device through the web interface, you can connect the console port of the device to a PC, and reconfigure the IP address of VLAN-interface 1 at the CLI.
This section describes using the CLI to manage the device.
Setting up the configuration environment
To set up the configuration environment, connect a terminal (a PC in this example) to the console port on the switch with a console cable.
A console cable is an 8-core shielded cable, with a crimped RJ-45 connector at one end for connecting to the console port of the switch, and a DB-9 female connector at the other end for connecting to the serial port on the console terminal.
Figure 8 Console cable
Use a console cable to connect a terminal device to the switch, as follows:
Step1 Plug the DB-9 female connector to the serial port of the console terminal or PC. Step2 Connect the RJ-45 connector to the console port of the switch.
Loading...
+ 440 hidden pages