Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							HP 5500 EI & 5500 SI Switch Series 
    Configuration Guides 
     
     
     
    Software version: Release 2215 
    Document version: 6W100-20120428 
      
    						
    							 
    Legal and notice information 
    © Copyright 2012 Hewlett-Packard Development Company, L.P.  
    No part of this documentation may be reproduced or transmitted in any form or by any means without 
    prior written consent of Hewlett-Pa ckard Development Company, L.P. 
    The information contained herein is  subject to change without notice.  
    HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS 
    MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 
    AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Pa ckard shall not be liable for errors contained 
    herein or for incidental or consequential damages  in connection with the furnishing, performance, or 
    use of this material.  
    The only warranties for HP products and services  are set forth in the express warranty statements 
    accompanying such products and services. Nothing  herein should be construed as constituting an 
    additional warranty. HP shall not be liable for tech nical or editorial errors or omissions contained 
    herein.  
    						
    							About the HP 5500 EI & 5500 SI configuration 
    guides-Release 2215 
    The HP 5500 EI & 5500 SI configuration guides describe the software features for the HP 5500 EI & 
    5500 SI Switch Series, software release train 2215, and guide you through the software configuration 
    procedures. These configuration guides also provide configuration examples to help you apply the 
    software features to different network scenarios. 
     
    Configuration guide Content 
    01 Fundamentals 
    Configuration Guide Describes how to use the command line interface of the switch, log in to and set 
    up the switch. This guide includes:  
    •
     CLI (command line interface overview and how to use the CLI) 
    • Login methods 
    • CLI login 
    • We b  l o g i n  
    • NMS login 
    • User login control 
    • FTP  
    • TFTP  
    • File system management  
    • Configuration file management 
    • Software upgrade  
    • ISSU  
    • ISSU configuration example 
    • Device management  
    • Automatic configuration 
    02 IRF Configuration Guide  Describes the HP proprietar
    y IRF technology, IRF fabric setup and configuration 
    procedure, restrictions and guidelines,  and IRF fabric configuration procedure. 
    03 Layer 2 – LAN Switching 
    Configuration Guide Covers Layer 2 technologies and features used on a LAN switched network, 
    including VLAN technology, port isolation, and spanning tree. You can use 
    these features to divide broadcast domain
    s, remove Layer 2 loops, isolate users 
    within a VLAN, re-mark VLAN tags, impl ement VLAN VPNs over the Internet, 
    and so on. This guide includes: 
    •  Ethernet interface 
    • Loopback and null interfaces 
    • Bulking configuring interfaces 
    • MAC address table 
    • MAC Information 
    • Ethernet link aggregation 
    • Po r t  i s o l a t i o n   
    • Spanning tree 
    • BPDU tunneling 
    • VLAN  
    						
    							Configuration guide Content 
    • Super VLAN 
    • Isolate-user-VLAN 
    • Voic e  V L A N  
    • GVRP 
    • QinQ 
    • VLAN mapping 
    • LLDP 
    • Service loopback group 
    • MVRP 
    04 Layer 3 – IP Services 
    Configuration Guide  Describes IP addressing (including static and dynamic IPv4 and IPv6 address 
    assignment), IRDP, UDP helper, DNS, ne
    twork performance optimization, ARP, 
    and interoperation between IPv4 and IPv6. This guide includes:   
    •  ARP 
    • Gratuitous ARP 
    • Proxy ARP 
    • ARP snooping  
    • IP addressing 
    • DHCP overview 
    • DHCP server 
    • DHCP relay agent  
    • DHCP client  
    • DHCP snooping 
    • BOOTP client 
    • IPv4 DNS 
    • IRDP  
    • IP performance optimization 
    • UDP helper 
    • IPv6 basics 
    • DHCPv6 overview 
    • DHCPv6 server 
    • DHCPv6 relay agent 
    • DHCPv6 client 
    • DHCPv6 snooping 
    • IPv6 DNS 
    • Tunneling 
    05 Layer 3 – IP Routing 
    Configuration Guide  Covers the routing technologies for IPv4 and IPv6 networks of different sizes, 
    route filtering, route contro
    l, and policy based routing. This guide includes:  
    • IP routing basics 
    • Static routing 
    • RIP 
    • OSPF 
    • IS-IS 
    • BGP 
    • IPv6 static routing 
    • RIPng 
    • OSPFv3 
    • IPv6 IS-IS 
    • IPv6 BGP  
    						
    							Configuration guide Content 
    • Routing policy 
    • Po l i c y - b a s e d  ro u t i n g  
    • MCE  
    • IPv6 MCE  
    06 IP Multicast 
    Configuration Guide  Covers Layer 3 IPv4 multicast protocols (IGMP, PIM, MSDP, and MBGP), Layer 
    3 IPv6 multicast protocols (MLD, IPv6 PIM, and IPv6 MBGP), Layer 2 IPv4 
    multicast protocols (IGMP snooping, PI
    M snooping, and multicast VLAN), and 
    Layer 2 IPv6 multicast protocols (MLD snooping, IPv6 PIM snooping, and IPv6 
    multicast VLAN). This guide includes:   
    • Mulitcast overview 
    • IGMP snooping 
    • PIM snooping 
    • Multicast VLAN 
    • Multicast routing and forwarding 
    • IGMP 
    • PIM 
    • MSDP 
    • MBGP 
    • MLD snooping 
    • IPv6 PIM snooping 
    • IPv6 multicast VLAN 
    • IPv6 multicast routing and forwarding 
    • MLD 
    • IPv6 PIM 
    • IPv6 MBGP 
    07 ACL and QoS 
    Configuration Guide  Describes how to classify traffic with 
    ACLs, and allocate network resources and 
    manage congestions with QoS technolo gies to improve network performance 
    and network use efficiency. You can use ACLs to help other function modules 
    (such as QoS and IP routing) classify or  filter traffic. This guide includes:  
    • ACL  
    • QoS overview 
    • QoS configuration approaches 
    • Priority mapping  
    • Traffic policing, traffic shaping, and line rate  
    • Congestion management  
    • Congestion avoidance  
    • Traffic filtering  
    • Priority marking  
    • Traffic redirecting  
    • Class-based accounting  
    • Data buffer  
    • Appendix  
    						
    							Configuration guide Content 
    08 Security Configuration 
    Guide Covers security features. The major secu
    rity features available on the switch 
    include identity authentication ( AAA), access security (802.1X, MAC 
    authentication, portal, and port security),  secure management (SSH), and attack 
    protection (IP source guard, ARP atta ck protection, and URPF). This guide 
    includes:  
    •  AAA 
    • 802.1X fundamentals 
    • 802.1X 
    • EAD fast deployment 
    • MAC authentication 
    • Po r t a l  
    • Triple authentication 
    • Po r t  s e cu ri t y  
    • User profile 
    • Password control  
    • HABP 
    • Public key 
    • PKI 
    • IPsec 
    • SSH2.0 
    • SFTP 
    • SCP 
    • SSL 
    • TCP attack protection 
    • IP source guard 
    • ARP attack protection 
    • ND attack defense 
    • URPF 
    • SAVI 
    • Blacklist  
    09 High Availability 
    Configuration Guide  Describes high availability 
    technologies and features av ailable on the switch for 
    failure detection and failover. Failure detection technologies focus on fault 
    detection and isolation. Failover techno logies focus on network recovery. This 
    guide includes:  
    •  High availability overview 
    • Ethernet OAM  
    • CFD  
    • DLDP  
    • RRPP  
    • Smart Link  
    • Monitor Link  
    • VRRP  
    • Stateful failover  
    • BFD  
    • Tra ck    
    						
    							Configuration guide Content 
    10 Network Management 
    and Monitoring 
    Configuration Guide Describes features that help you ma
    nage and monitor your network, for 
    example, manage system events, sample  packets, assess network performance, 
    synchronize the clock for all devices with  the clock in the network, supply power 
    for attached devices by using PoE, and test network connectivity. This guide 
    includes: 
    •  System maintenance and debugging 
    • NTP 
    • Information center 
    • SNMP 
    • RMON 
    • Port mirroring 
    • Tra f fic  m i rro ri n g  
    • NQA 
    • sFlow 
    • IPC 
    • Po E  
    • Cluster managementCWMP 
    • Stack 
      
    						
    							i 
    Contents 
    Using the CLI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··········· 1 
    Logging in to the CLI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ············ 1 
    Command conventions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ······ 1 
    Using the undo form of a command ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··············· 2 
    CLI views ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ··················\
    · 2 
    Entering system view from user view  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  3 
    Returning to the upper-level view from any view ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    · 3 
    Returning to user view  from any other view ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ···· 4 
    Accessing the CLI  online help ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    ····· 4 
    Entering a command ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ········  5 
    Editing a command line ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  5 
    Entering a STRING type value for an argument··················\
    ··················\
    ··················\
    ··················\
    ··········· ················· 5 
    Abbreviating commands··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ·············· 6 
    Configuring and using co mmand keyword aliases ··················\
    ··················\
    ··················\
    ··················\
    ········· ············· 6 
    Configuring and  using hotkeys ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ············ 6 
    Enabling redisplaying entered- but-not-submitted commands ··················\
    ··················\
    ··················\
    ················ ········· 8 
    Understanding command- line error messages ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ········ 8 
    Using the command hi story function ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················· 9 
    Viewing history commands ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············· 9 
    Setting the command history buffe r size for user interfaces ··················\
    ··················\
    ··················\
    ············· ············· 9 
    Controlling the  CLI output ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    ······ 10 
    Pausing between screens of output ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······ 10 
    Filtering the output fr om a display command ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
     10 
    Configuring user privileg e and command levels ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ····· 13 
    Configuring a user  privilege level ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ········· 13 
    Switching the user  privilege level ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ·········· 17 
    Changing the leve l of a command ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ····· 19 
    Saving the running  configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················· 19 
    Displaying and maintaining CLI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 19 
    Login overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    ······· 21 
    Login methods at a glance ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ··· 21 
    User interfaces ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ············· 22 
    User interface assignment ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  22 
    User interface numbering ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············· 22 
    Logging in to the CLI ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ····· 23 
    Logging in through the console port for the first time  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  23 
    Configuring console login control settings ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  25 
    Configuring none authentication for console login ··················\
    ··················\
    ··················\
    ··················\
    ····· ·············· 26 
    Configuring password authenti cation for console login ··················\
    ··················\
    ··················\
    ··················\
    · ·········· 27 
    Configuring scheme authenti cation for console login ··················\
    ··················\
    ··················\
    ··················\
    ··· ············ 28 
    Configuring common console lo gin settings (optional) ··················\
    ··················\
    ··················\
    ··················\
    ·· ··········· 30 
    Logging in through Telnet  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  32 
    Configuring none authentication for Telnet login ··················\
    ··················\
    ··················\
    ··················\
    ······ ················ 33 
    Configuring password authenti cation for Telnet login ··················\
    ··················\
    ··················\
    ··················\
    ·· ············ 34 
    Configuring scheme authenti cation for Telnet login ··················\
    ··················\
    ··················\
    ··················\
    ···· ·············· 35 
    Configuring common settings for VTY user interfaces (optional)  ··················\
    ··················\
    ··················\
    ················ 37 
    Using the device to log in to a Telnet server ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··· 39 
    Setting the DSCP value for IP to  use for outgoing Telnet packets ··················\
    ··················\
    ··················\
    ········ ······ 40  
    						
    							ii 
    Logging in through SSH ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ···· 40 
    Configuring the SSH server on the device ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  40 
    Using the device as an SSH client to log in to the SSH server ··················\
    ··················\
    ··················\
    ··········· ········ 43 
    Modem dial-in through the console port  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  43 
    Setting up the configuration environment ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··· 44 
    Configuring none authentication for mode m dial-in ··················\
    ··················\
    ··················\
    ··················\
    ····· ············· 47 
    Configuring password authentication for modem dial-in  ··················\
    ··················\
    ··················\
    ··················\
    ·········· 47 
    Configuring scheme authentication for modem dial-in  ··················\
    ··················\
    ··················\
    ··················\
    ·············· 48 
    Configuring common settings for modem dial-in (optional)  ··················\
    ··················\
    ··················\
    ··················\
    ······ 51 
    Displaying and maintaining CLI login ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ············· 53 
    Logging in to the Web inte rface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ·············· 54 
    Configuring HTTP login ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ····· 54 
    Configuring HTTPS login ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 55 
    Displaying and maintaining Web login ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ·········· 57 
    HTTP login configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··············· 57 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  57 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 57 
    HTTPS login configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ·············· 59 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  59 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 59 
    Logging in through NMS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ················· 61 
    Configuring SNMP login ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ··· 61 
    Prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ······ 61 
    Configuring SNMPv3 settings ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ········· 61 
    Configuring SNMPv1 or SNMPv2c settings  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  62 
    NMS login example··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ····· 63 
    Network requirements ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  63 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 63 
    Controlling user logins ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ···· 65 
    Controlling Telnet logins ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ······· 65 
    Configuring source IP-based Telnet login control  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  65 
    Configuring source/destination IP-based Telnet login control  ··················\
    ··················\
    ··················\
    ··················\
    ·· 66 
    Configuring source MAC-based Telnet login control ··················\
    ··················\
    ··················\
    ··················\
    ····· ··········· 66 
    Telnet login control co nfiguration example ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·· 66 
    Configuring source IP-based  SNMP login control ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ···· 67 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 67 
    SNMP login control configuration example ··················\
    ··················\
    ··················\
    ··················\
    ·············· ················· 68 
    Configuring Web  login control ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ················· 69 
    Configuring source IP-bas ed Web login control ··················\
    ··················\
    ··················\
    ··················\
    ········· ··············· 69 
    Logging off online Web users ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ·········· 69 
    Web login control configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  69 
    Configuring FTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ······· 71 
    Using the device as an FTP client ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
     71 
    Establishing an FTP connection ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ·········· 71 
    Setting the DSCP value for IP to use for outgoing FTP packets  ··················\
    ··················\
    ··················\
    ··················\
    · 72 
    Managing directories on the FTP server ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··· 73 
    Working with the files on the FTP server  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·  73 
    Switching to another user account ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······· 74 
    Maintaining and troublesho oting the FTP connection ··················\
    ··················\
    ··················\
    ··················\
    ···· ··········· 74 
    Terminating the FT P connection ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········· 74 
    FTP client configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········· 75 
    Using the device as an FTP server  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  76  
    						
    							iii 
    Configuring basic parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··························\
    ········· 76 
    Configuring authenticati on and authorization ··················\
    ··················\
    ··················\
    ··················\
    ·········· ················· 77 
    FTP server configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  78 
    Displaying and maintaining FTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  80 
    Configuring TFTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ······ 81 
    Prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··············· 81 
    Using the device as a TFTP client ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
     81 
    Displaying and maintain ing the TFTP client ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·········· 82 
    TFTP client config uration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················· 82 
    Managing the file system ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
     84 
    Managing files ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    ··········· 84 
    Displaying file information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ·············· 85 
    Displaying file contents ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ················· 85 
    Renaming a file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·····  85 
    Copying a file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······················\
    ··················\
    ···· 85 
    Moving a file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·········  86 
    Deleting/restoring a file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ················ 86 
    Emptying the recycle bin ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 86 
    Managing directories ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··················\
    ······ 86 
    Displaying directory information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········· 86 
    Displaying the current working directory  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      87 
    Changing the current working directory ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··· 87 
    Creating a directory ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
     87 
    Removing a directory ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ················ 87 
    Managing storage media ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    · 87 
    Managing storage medium space  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  87 
    Performing batch operations ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  88 
    Setting the file system operation mode ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ·············· 88 
    File system manage ment examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············· 88 
    Managing configuration files ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ················ 90 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  90 
    Configuration types ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
     90 
    Configuration file format and content ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ······ 91 
    Coexistence of multiple  configuration files ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ···· 91 
    Startup with a configuration file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··········· 91 
    Saving the running  configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················· 91 
    Enabling configuration  file auto-update ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ····· 92 
    Saving running configuration in fast mode or safe mode  ··················\
    ··················\
    ··················\
    ··················\
    ········· 92 
    Configuring configuration rollback ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 93 
    Configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
     93 
    Configuring configuratio n archive parameters ··················\
    ··················\
    ··················\
    ··················\
    ·········· ················ 93 
    Enabling automatic configuration archiving  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  95 
    Manually archiving running configuration ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    · 95 
    Performing config uration rollback ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ········ 95 
    Specifying a configuration file for the next startup  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  96 
    Backing up the next-startup configuration file to a TFTP server ··················\
    ··················\
    ··················\
    ········· ··················\
     96 
    Deleting the next-startup  configuration file ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ·············· 97 
    Restoring the next-startup configura tion file from a TFTP server ··················\
    ··················\
    ··················\
    ········ ··················\
     97 
    Displaying and maintainin g a configuration file ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ······· 98 
    Upgrading software ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
    ··· 99 
    Software upgrade methods ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    · 99 
    Upgrading software through a system  reboot ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ···· 100  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide