HP A3100-24 User Manual

Browse online or download User Manual for Software HP A3100-24. HP A3100-24 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 157
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
HP A3100 v2 Switch Series
Fundamentals
Configuration Guide
HP A3100-8 v2 SI Switch (JG221A)
HP A3100-16 v2 SI Switch (JG222A)
HP A3100-24 v2 SI Switch (JG223A)
HP A3100-8 v2 EI Switch (JD318B)
HP A3100-16 v2 EI Switch (JD319B)
HP A3100-24 v2 EI Switch (JD320B)
HP A3100-8-PoE v2 EI Switch (JD311B)
HP A3100-16-PoE v2 EI Switch (JD312B)
HP A3100-24-PoE v2 EI Switch (JD313B)
Part number: 5998-1963
Software version: Release 5103
Document version: 6W100-20110909
Page view 0
1 2 3 4 5 6 ... 156 157

Summary of Contents

Page 1 - HP A3100 v2 Switch Series

HP A3100 v2 Switch Series Fundamentals Configuration Guide HP A3100-8 v2 SI Switch (JG221A) HP A3100-16 v2 SI Switch (JG222A) HP A3100-24 v2 SI Switc

Page 2

CLI views adopt a hierarchical structure. See Figure 3. • After logging in to the switch, you are in user view. The user view prompt is <device na

Page 3 - Contents

To do… Use the command… Remarks Configure user properties authorization-attribute { acl acl-number | callback-number callback-number | idle-cut min

Page 4

# Check files on your device. Remove those redundant to ensure adequate space for the system software image file to be uploaded. <Sysname> dir

Page 5

Displaying and maintaining FTP To do… Use the command… Remarks Display the configuration of the FTP client display ftp client configuration [ | { b

Page 6

TFTP configuration TFTP overview Introduction to TFTP The Trivial File Transfer Protocol (TFTP) provides functions similar to those provided by FTP,

Page 7

Table 10 Configuration when the device serves as the TFTP client Device Configuration Remarks Device (TFTP client) • Configure the IP address and r

Page 8 - CLI configuration

To do… Use the command… Remarks Configure the source address of the TFTP client tftp client source { interface interface-type interface-number | ip

Page 9 - CLI view description

Configuration procedure 1. Configure the PC (TFTP Server), the configuration procedure is omitted. • On the PC, enable the TFTP server • Configure

Page 10 - Exiting the current view

100 File management Managing files Files such as host software and configuration files that are necessary for the operation of the device are saved

Page 11 - Using the CLI online help

101 Displaying directory information To do… Use the command… Remarks Display directory or file information dir [ /all ] [ file-url ] Required Avai

Page 12 - Typing commands

102 NOTE: You can create a file by copying, downloading or using the save command. Displaying file information To do… Use the command… Remarks

Page 13 - Configuring CLI hotkeys

To do… Use the command… Remarks Return to the parent view from the current view quit Required Available in any view. NOTE: • The quit command in

Page 14

103 CAUTION: • The files in the recycle bin still occupy storage space. To delete a file in the recycle bin, execute the resetrecycle-bin command

Page 15 - Using command history

104 Performing storage medium operations Managing the space of a storage medium When the space of a storage medium becomes inaccessible due to abnor

Page 16 - Accessing history commands

105 1 -rw- 1218 Feb 16 2006 11:46:19 config.cfg 2 drw- - Feb 16 2006 15:20:27 test 3 -rw- 184108 Feb 16 2006 1

Page 17 - Controlling the CLI display

Configuration file management Configuration file overview A configuration file contains a set of commands. You can save the current configuration to

Page 18

Coexistence of multiple configuration files The switch can save multiple configuration files on its storage media. You can save the configurations us

Page 19 - Character Meaning Remarks

The fast saving mode is suitable for environments where the power supply is stable. The safe mode is preferred in environments where a stable power s

Page 20

When you enter the configuration replace file command, the system compares the running configuration and the specified replacement configuration file

Page 21

To do… Use the command… Remarks Set the maximum number of configuration files that can be saved archive configuration max file-number Optional The

Page 22

To do… Use the command… Remarks Manually save the running configuration archive configuration Required Available in user view NOTE: Specify the

Page 23

To do… Use the command… Remarks Specify a startup configuration file to be used at the next startup startup saved-configuration cfgfile [ backup |

Page 24

<1-4094> VLAN interface [sysname] interface vlan-interface 1 ? <cr> [sysname] interface vlan-interface 1 The string <cr> indica

Page 25

To do… Use the command… Remarks Delete a startup configuration file to be used at the next startup from the storage media reset saved-configuration

Page 26

To do… Use the command… Remarks Display the configuration files used at this and the next system startup display startup [ | { begin | exclude | in

Page 27

Software upgrade configuration Switch software overview Switch software includes the Boot ROM and the system software images. After powered on, the d

Page 28 - Login methods

Upgrade method Upgrade object Description Upgrading system software through a system reboot System software upgrade process, and is not recommended.

Page 29 - User interface overview

Upgrading system software through a system reboot Follow these steps to upgrade system software through a system reboot: To do… Use the command… Re

Page 30 - Relative numbering

Common patch and temporary patch • Common patches are those formally released through the version release flow. • Temporary patches are those not

Page 31 - CLI login

Figure 43 Patches are not loaded to the memory patch area Patch 1 IDLEPatch 2 IDLEPatch 3 IDLEPatch 4 IDLEPatch 5 IDLEPatch 6 IDLEPatch 7 IDLEPatch 8

Page 32 - Login procedure

Figure 45 Patches are activated Patch 1 ACTIVEPatch 2 ACTIVEPatch 3 ACTIVEPatch 4 ACTIVEPatch 5 ACTIVEPatch 6 DEACTIVEPatch 7 DEACTIVEPatch 8 IDLEMem

Page 33

on the PATCH-FLAG. If there is a match, the system loads patches to or installs them on the memory patch area. The following table describes the def

Page 34

To do… Use the command… Remarks Activate the specified patches patch active patch-number slot slot-number Required • After you activate a patch, t

Page 35

• To set the configuration file for next startup, type st s. You can also press Tab to have an incomplete keyword automatically completed. Configuri

Page 36

Displaying and maintaining the software upgrade To do… Use the command… Remarks Display information about system software display boot-loader [ slo

Page 37

[FTP-Server] local-user aaa [FTP-Server-luser-aaa] password cipher hello [FTP-Server-luser-aaa] service-type ftp [FTP-Server-luser-aaa] authorization

Page 38

Hotfix configuration example Network requirements • As shown in Figure 48, the software running on Device is having problems, and a hotfix is needed

Page 39

Device management Device management includes monitoring the operating status of devices and configuring their running parameters. NOTE: The config

Page 40

Command Effective system time Configuration example System time 1, 2 date-time ± zone-offset clock datetime 2:00 2007/2/2 clock timezone zone-time

Page 41 - Figure 11 Configuration page

Command Effective system time Configuration example System time date-time – summer-offset outside the daylight saving time range: date-time – summe

Page 42

Command Effective system time Configuration example System time date-time in the daylight saving time range, but date-time – summer-offset outside t

Page 43 - Logging in through Telnet

To do… Use the command… Remarks Enter system view system-view — Enable displaying the copyright statement copyright-info enable Optional Enabled

Page 44

Configuration procedure Follow these steps to configure a banner: To do… Use the command… Remarks Enter system view system-view — Configure the i

Page 45

Rebooting the device You can reboot the device in one of the following ways to recover from an error condition: • Reboot the device immediately at t

Page 46

NOTE: By default, the Ctrl+G, Ctrl+L and Ctrl+O hotkeys are associated with pre-defined commands as definedbelow, the Ctrl+T and Ctrl+U hotkeys are

Page 47

Scheduling jobs You can schedule a job to automatically run a command or a set of commands without administrative interference. The commands in a job

Page 48

Scheduling a job in the non-modular approach Perform one of the following commands in user view to schedule a job: To do… Use the command… Remarks

Page 49 - • Before enabling command

To view Boot ROM accessibility status, use the display startup command. For more information about the display startup command, see the Fundamentals

Page 50

To do… Use the command… Remarks Configure temperature alarm thresholds temperature-limit slot slot-number inflow sensor-number lowerlimit warningli

Page 51

• Display its electronic label. The electronic label is a profile of the transceiver module and contains the permanent configuration including the s

Page 52 - Figure 15 Configuration page

To do… Use the command… Remarks Display the system time and date display clock [ | { begin | exclude | include } regular-expression ] Available in

Page 53

To do… Use the command… Remarks Display the device reboot setting display schedule reboot [ | { begin | exclude | include } regular-expression ] Av

Page 54 - Logging in through SSH

Automatic configuration Automatic configuration overview Automatic configuration enables a device without any configuration file to automatically obt

Page 55 - Configuring the SSH server

How automatic configuration works Automatic configuration works in the following manner: 1. During startup, the device sets the first up interface (

Page 56 - • Command accounting allows

Using DHCP to obtain an IP address and other configuration information Address acquisition process As mentioned before, a device sets the first up in

Page 57 - Configuration Guide

NOTE: The hotkeys in Table 3 are defined by the switch. If the same hotkeys are defined by the terminal softwarethat you use to interact with the sw

Page 58 - Configur

administrator can Telnet to each device to perform specific configurations (for example, configure the IP address of each interface). • If devices u

Page 59 - Logging in through modems

Obtaining the configuration file Figure 51 Obtain the configuration file Is the configuration file contained in the DHCP response?Obtain the network

Page 60

NOTE: After broadcasting a TFTP request, the device selects the TFTP server that responds first to obtain the configuration file. If the requested

Page 61

Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Before c

Page 62

Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text repr

Page 63

Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch

Page 64

Index A B C D E F H L M N O P R S T U V W A Automatic configuration overview,14 0 B Backing up the startup configuration file,112 C Changing the s

Page 65

Typing commands,5 Rebooting the device,132 Related information,14 6 U Restoring a startup configuration file,113 Undo form of a command,2 S Upgrad

Page 66

Accessing history commands Follow a step below to access history commands: To do… Use the key/command… Result Display history commands display hist

Page 67

Controlling the CLI display Multi-screen display Controlling multi-screen display If the output information spans multiple screens, each screen pauses

Page 68

• When the system displays the output information in multiple screens, use /, - or + plus a regular expression to filter subsequent output informatio

Page 69 - Figure 26 Configuration page

Character Meaning Remarks \index Repeats the character string specified by the index. A character string refers to the string within () before \. ind

Page 70

Legal and notice information © Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitte

Page 71

user privilege level 3 # return 2. Example of using the exclude keyword # Display the non-direct routes in the routing table (the output depends on

Page 72

Level Privilege Description 3 Manage Involves commands that influence the basic operation of the system and commands for configuring system support mo

Page 73 - Web login

<Sysname> system-view [Sysname] user-interface vty 1 [Sysname-ui-vty1] authentication-mode scheme [Sysname-ui-vty1] quit [Sysname] local-user te

Page 74 - Configuring HTTPS login

To do… Use the command… Remarks Enter system view system-view — Enter user interface view user-interface { first-num1 [ last-num1 ] | { aux | vty

Page 75

display commands. The switching operation is effective for the current login. After the user logs back in, the user privilege restores to the original

Page 76

To do… Use the command… Remarks Configure the password for user privilege level switch super password [ level user-level ] { simple | cipher } passw

Page 77 - Web login example

User interface authentication mode User privilege level switch authentication mode Information input for the first authentication mode Information inp

Page 78 - HTTPS login example

CAUTION: HP recommends that you use the default command level or modify the command level under the guidanceof professional staff. An improper change

Page 79

Login methods Login methods You can log in to the switch by using the following methods. Table 7 Login methods Login method Default state Logging in

Page 80 - Reference

Login method Default state NMS login By default, you cannot log in to a device through a network management system (NMS). To do so, log in to the de

Page 81 - NMS login

Contents CLI configuration····························································································································

Page 82 - NMS login example

VTY user interfaces. You can use the display user-interface command without any parameters to view supported user interfaces and their absolute numbe

Page 83 - 2. Configuration on the NMS

CLI login Overview The CLI enables you to interact with a device by typing text commands. At the CLI, you can instruct your device to perform a given

Page 84

The port properties of the hyper terminal must be the same as the default settings of the console port shown in the following table. Setting Default

Page 85 - User login control

Figure 5 Connection description Figure 6 Specify the serial port used to establish the connection 26

Page 86 - Telnet users

Figure 7 Set the properties of the serial port Step3 Turn on the device. You are prompted to press Enter if the device successfully completes the

Page 87

• none—Requires no username and password at the next login through the console port. This mode is insecure. • password—Requires password authentica

Page 88 - NMS users

By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login. For information

Page 89

By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login. For information

Page 90 - Logging off online web users

Configuring scheme authentication for console login Configuration prerequisites You have logged in to the device. By default, you can log in to the d

Page 91

To do… Use the command… Remarks Enable command accounting command accounting Optional • By default, command accounting is disabled. The accountin

Page 92 - FTP configuration

Telnet login authentication modes ····················································································································

Page 93 - Configuring the FTP client

To do… Use the command… Remarks Specify the service type for the local user service-type terminal Required By default, no service type is specifie

Page 94

Figure 11 Configuration page Configuring common settings for console login (optional) Follow these steps to configure common settings for console p

Page 95

To do… Use the command… Remarks Configure the data bits databits { 5 | 6 | 7 | 8 } Optional By default, the data bits of the console port is 8. Dat

Page 96

To do… Use the command… Remarks Set the idle-timeout timer idle-timeout minutes [ seconds ] Optional The default idle-timeout is 10 minutes. The sy

Page 97

This section includes these topics: • Telnet login authentication modes • Configuring none authentication for Telnet login • Configuring password

Page 98 - Configuring the FTP server

Authentication mode Configuration Remarks Configure the authentication scheme Configure a RADIUS/HWTACACS scheme Configure the AAA scheme used by the

Page 99

To do… Use the command… Remarks Configure common settings for VTY user interfaces — Optional See “Configuring common settings for VTY user interfac

Page 100 - Configuration procedure

To do… Use the command… Remarks Enter one or multiple VTY user interface views user-interface vty first-number [ last-number ] — Specify the passwo

Page 101 - 3. Upgrade the device

Configuring scheme authentication for Telnet login Configuration prerequisites You have logged in to the device. By default, you can log in to the de

Page 102

To do… Use the command… Remarks Enable command authorization command authorization Optional • By default, command authorization is not enabled. •

Page 103 - TFTP configuration

FTP operation·········································································································································

Page 104 - Configuring the TFTP client

To do… Use the command… Remarks Enable command accounting command accounting Optional • By default, command accounting is disabled. The accountin

Page 105

To do… Use the command… Remarks Specify the command level of the local user authorization-attribute level level Optional By default, the command le

Page 106

Figure 15 Configuration page Configuring common settings for VTY user interfaces (optional) Follow these steps to configure common settings for VTY

Page 107 - File management

To do… Use the command… Remarks Set the maximum number of lines on the next screen screen-length screen-length Optional By default, the next screen

Page 108 - Performing file operations

By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login. For information

Page 109

Object Requirements Configure the IP address of the VLAN interface, and make sure the SSH server and client can reach each other. SSH server Configur

Page 110 - Performing batch operations

To do… Use the command… Remarks Enable the current user interface to support SSH protocol inbound { all | ssh } Optional By default, Telnet and SSH

Page 111 - Example for file operations

To do… Use the command… Remarks Enter the deISP domain view fault e domain domain-namApply the specified AAA scheme to the domain hwtacacs-scheme-n

Page 112

• Reference the created HWTACACS scheme in the ISP domain. For more information, see the Security Configuration Guide. When users adopt the scheme m

Page 113 - Configuration file overview

Logging in through modems Introduction The administrator can use two modems to remotely maintain a switch through its Console port over the Public Sw

Page 114 - Introduction

Setting configuration rollback························································································································

Page 115 - Configuration rollback

Step2 Configuration on the administrator side The PC and the modem are correctly connected, the modem is connected to a telephone cable, and the tele

Page 116 - Configuration task list

Figure 20 Connection description Figure 21 Enter the phone number Figure 22 Dial the number 54

Page 117

Step6 Character string CONNECT9600 is displayed on the terminal. Then a prompt appears when you press Enter. Figure 23 Configuration page Step7 If

Page 118

and password on the remote authentication server. For more information about authentication modes and parameters, see the Security Configuration Guid

Page 119

To do… Use the command… Remarks Enter system view system-view — Enter one or more AUX user interface views user-interface aux first-number [ last

Page 120

To do… Use the command… Remarks Enter system view system-view — Enter one or more AUX user interface views user-interface aux first-number [ last

Page 121

Configuration procedure Follow these steps to configure scheme authentication for modem login: To do… Use the command… Remarks Enter system view s

Page 122 - Software upgrade methods

To do… Use the command… Remarks Optional • By default, command accounting is disabled. The accounting server does not record the commands executed

Page 123

To do… Use the command… Remarks Specify the service type for the local user service-type terminal Required By default, no service type is specifie

Page 124 - Basic concepts in hotfix

Figure 26 Configuration page Configuring common settings for modem login (optional) Follow these steps to configure common settings for modem login

Page 125 - Patch status

Diagnosing transceiver modules························································································································

Page 126 - ACTIVE state

To do… Use the command… Remarks Configure the data bits databits { 5 | 6 | 7 | 8 } Optional By default, the data bits is 8. Data bits is the number

Page 127 - Configuration prerequisites

To do… Use the command… Remarks Set the idle-timeout timer idle-timeout minutes [ seconds ] Optional The default idle-timeout is 10 minutes. The sy

Page 128 - One-step patch installation

To do… Use the command… Remarks Release a specified user interface free user-interface { num1 | { aux | vty } num2 } Available in user view Multipl

Page 129

Web login Web login overview The device provides a built-in web server that enables you to log in to the web interface of the device from a PC. Web l

Page 130 - Network requirement

To do… Use the command… Remarks Configure the HTTP service port number ip http port port-number Optional 80 by default. If you execute the command

Page 131 - 2. Configure Device

To do… Use the command… Remarks Configure PKI and SSL related features — Required By default, PKI and SSL are not configured. • For more informati

Page 132 - Hotfix configuration example

To do… Use the command… Remarks Associate the HTTPS service with a certificate attribute-based access control policy ip https certificate access-co

Page 133 - Device management

Displaying and maintaining web login To do… Use the command… Remarks Display information about web users display web users [ | { begin | exclude |

Page 134 - System time

Figure 28 Web login page # Type the user name, password, verify code, select English, and click Login. The homepage appears. After login, you can c

Page 135

Configuration procedure 1. Configure the device that acts as the HTTPS server # Configure a PKI entity, configure the common name of the entity as h

Page 136

CLI configuration What is CLI? The command line interface (CLI) enables you to interact with your device by typing text commands. At the CLI, you can

Page 137 - Configuring banners

# Enable the HTTPS service. [Device] ip https enable # Create a local user named usera, set the password to 123 for the user, and specify the Telne

Page 138

NMS login NMS login overview An NMS runs the SNMP client software. It offers a user-friendly interface to facilitate network management. An agent is

Page 139 - Rebooting the device

To do… Use the command… Remarks Add a user to the SNMP group snmp-agent usm-user v3 user-name group-name [ [ cipher ] authentication-mode { md5 | s

Page 140 - Scheduling jobs

# Enter system view. <Sysname> system-view # Enable the SNMP agent. [Sysname] snmp-agent # Configure an SNMP group. [Sysname] snmp-agent gro

Page 141 - Disabling Boot ROM access

Figure 32 iMC homepage Log in to the iMC and configure SNMP settings for the iMC to find the device. After the device is found, you can manage and

Page 142

User login control User login control methods The device provides the following login control methods. Login Through Login control methods ACL use

Page 143

To do… Use the command… Remarks Enter user interface view user-interface [ type ] first-number [ last-number ] — Use the ACL to control user login

Page 144

To do… Use the command… Remarks Create an Ethernet frame header ACL and enter its view acl number acl-number [ match-order { config | auto } ] Requ

Page 145

[Sysname] user-interface vty 0 4 [Sysname-ui-vty0-4] acl 2000 inbound Configuring source IP-based login control over NMS users You can log in to the

Page 146

To do… Use the command… Remarks Associate the user with the ACL snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number ] snmp-agent

Page 147 - Automatic configuration

Convention Description [ ] Square brackets enclose syntax choices (keywords or arguments) that are optional. { x | y | ... } Braces enclose a set of r

Page 148

Configuring source IP-based login control over web users You can log in to the web management page of the device through HTTP/HTTPS to remotely manag

Page 149 - Address acquisition process

Source IP-based login control over web users configuration example Network requirements As shown in Figure 35, configure the device to allow only web

Page 150 - File types

FTP configuration FTP overview Introduction to FTP The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server

Page 151 - TFTP request sending mode

Table 9 Configuration when the device serves as the FTP server Device Configuration Remarks Enable the FTP server function Disabled by default. You

Page 152

• If you use the ftp client source command and the ftp command to specify a source address respectively, the source address specified with the ftp

Page 153 - Support and other resources

Follow these steps to operate the directories on an FTP server: To do… Use the command… Remarks Display detailed information about a directory or f

Page 154 - Conventions

To do… Use the command… Remarks Set the file transfer mode to binary binary Optional ASCII by default. Set the data transmission mode to passive pa

Page 155 - Port numbering in examples

To do… Use the command… Remarks Terminate the connection to the FTP server without exiting FTP client view disconnect Optional Equal to the close c

Page 156

230 Logged in successfully # Set the file transfer mode to binary to transmit system software image file. [ftp] binary 200 Type set to I. # Download

Page 157

To do… Use the command… Remarks Use an ACL to control FTP clients’ access to the switch ftp server acl acl-number Optional By default, no ACL is us

Comments to this Manuals

No comments