HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 3

Contents - switch

Page 3 highlights

Contents Accessing the switch Introduction ...8 Additional references ...8 Typographical conventions...9 Management Network...9 Connecting through the console port...10 Connecting through Telnet...10 Connecting through Secure Shell...10 Using the command line interfaces ...10 Configuring an IP interface...11 Using the Browser-based Interface...11 Using Simple Network Management Protocol 12 SNMP v1.0 ...12 SNMP v3.0 ...12 Default configuration ...12 User configuration...13 View based configurations ...14 Configuring SNMP trap hosts ...15 SNMPv2 trap host configuration ...16 SNMPv3 trap host configuration ...16 Secure access to the switch ...17 Setting allowable source IP address ranges 17 RADIUS authentication and authorization 18 TACACS+ authentication ...21 How TACACS+ authentication works 22 TACACS+ authentication features ...22 Authorization...22 Accounting...23 Configuring TACACS+ authentication on the switch (CLI example 23 Configuring TACACS+ authentication on the switch (BBI example 24 Secure Shell and Secure Copy...25 User access control ...29 Setting up user IDs ...29 Ports and trunking Introduction ...30 Ports on the switch ...30 Port trunk groups...31 Statistical load distribution...31 Built-in fault tolerance ...31 Before you configure trunks ...31 Trunk group configuration rules...31 Port trunking example ...32 Configuring trunk groups (CLI example 33 Configuring trunk groups (BBI example 34 Configurable Trunk Hash algorithm ...36 Link Aggregation Control Protocol ...37 Configuring LACP ...38 Port-based Network Access and traffic control Port-based Network Access control...39 Extensible authentication protocol over LAN 39 802.1x authentication process...39 EAPoL Message Exchange ...40 Accessing the switch 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Accessing the switch 3
Contents
Accessing the switch
Introduction
.............................................................................................................................................
8
Additional references
...............................................................................................................................
8
Typographical conventions
........................................................................................................................
9
Management Network
..............................................................................................................................
9
Connecting through the console port
....................................................................................................
10
Connecting through Telnet
..................................................................................................................
10
Connecting through Secure Shell
.........................................................................................................
10
Using the command line interfaces
...........................................................................................................
10
Configuring an IP interface
.................................................................................................................
11
Using the Browser-based Interface
............................................................................................................
11
Using Simple Network Management Protocol
............................................................................................
12
SNMP v1.0
......................................................................................................................................
12
SNMP v3.0
......................................................................................................................................
12
Default configuration
.........................................................................................................................
12
User configuration
.............................................................................................................................
13
View based configurations
.................................................................................................................
14
Configuring SNMP trap hosts
.............................................................................................................
15
SNMPv2 trap host configuration
.........................................................................................................
16
SNMPv3 trap host configuration
.........................................................................................................
16
Secure access to the switch
.....................................................................................................................
17
Setting allowable source IP address ranges
..........................................................................................
17
RADIUS authentication and authorization
.............................................................................................
18
TACACS+ authentication
........................................................................................................................
21
How TACACS+ authentication works
...................................................................................................
22
TACACS+ authentication features
.......................................................................................................
22
Authorization
....................................................................................................................................
22
Accounting
.......................................................................................................................................
23
Configuring TACACS+ authentication on the switch (CLI example)
..........................................................
23
Configuring TACACS+ authentication on the switch (BBI example)
..........................................................
24
Secure Shell and Secure Copy
.................................................................................................................
25
User access control
................................................................................................................................
29
Setting up user IDs
............................................................................................................................
29
Ports and trunking
Introduction
...........................................................................................................................................
30
Ports on the switch
.................................................................................................................................
30
Port trunk groups
....................................................................................................................................
31
Statistical load distribution
..................................................................................................................
31
Built-in fault tolerance
........................................................................................................................
31
Before you configure trunks
.....................................................................................................................
31
Trunk group configuration rules
................................................................................................................
31
Port trunking example
.............................................................................................................................
32
Configuring trunk groups (CLI example)
...............................................................................................
33
Configuring trunk groups (BBI example)
...............................................................................................
34
Configurable Trunk Hash algorithm
..........................................................................................................
36
Link Aggregation Control Protocol
............................................................................................................
37
Configuring LACP
.............................................................................................................................
38
Port-based Network Access and traffic control
Port-based Network Access control
...........................................................................................................
39
Extensible authentication protocol over LAN
.........................................................................................
39
802.1x authentication process
............................................................................................................
39
EAPoL Message Exchange
.................................................................................................................
40