Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 386 
    SAVI configuration in DHCPv6+SLAAC address 
    assignment scenario 
    Network requirements 
    Figure 142 Network diagram 
     
     
    As shown in Figure 142, Switch B connects to the DHCPv6 server through interface GigabitEthernet 
    1/0/1 and connects to the DHCPv6 client through interface GigabitEthernet 1/0/3. Host A and Host B 
    access Gateway (Switch A) through Switch B. Interfaces GigabitEthernet 1/0/1 through GigabitEthernet 
    1/0/5 on Switch B belong to VLAN 2. The hosts  can obtain IP addresses through DHCPv6 or SLAAC. 
    Configure SAVI on Switch B to permit only packets from addresses assigned through DHCPv6 and the 
    bound addresses assigned through SLAAC.  
    Configuration considerations 
    Configure Switch B as follows: 
    •   Enable SAVI. 
    •   Enable DHCPv6 snooping. For more information about DHCPv6 snooping, see  Layer 3—IP 
    Services Configuration Guide . 
    •   Enable global unicast address ND snooping and link-local address ND snooping. For more 
    information about ND snooping, see  Layer 3—IP Services Configuration Guide . 
    •   Enable ND detection in VLAN 2 to check the ND packets arrived on the ports. For more information 
    about ND detection, see  Configuring ND attack defense .
      
    •   Configure a static IPv6 source guard binding entry on each interface connected to a host. This step 
    i s  o p t io n a l.  I f  t h i s  s te p  i s  no t  p e r fo rm e d,  SAV I  d o es not check packets against static binding entries. 
    For more information about static IPv6  source guard binding entries, see Configuring IP source 
    guar
    
    d . 
    •   Configure dynamic IPv6 source guard binding on the interfaces connected to the hosts. For more 
    information about dynamic IPv6 source guard binding, see  Configuring IP source guard.
      
    Packet check principles 
    Switch B checks DHCPv6 protocol packets from DHCP v6 clients against link-local address ND snooping 
    entries; checks ND protocol packets  against ND snooping entries, DHCP v6 snooping entries, and static  
    						
    							 387 
    binding entries; and checks the IPv6 data packets from the hosts against dynamic binding entries 
    (including ND snooping entries and DHCPv6 snooping entries) applied on the interfaces connected to 
    the hosts and against static binding entries. The items to be examined include MAC address, IPv6 
    address, VLAN information, and ingress port. 
    Configuration procedure 
    # Enable SAVI. 
     system-view 
    [SwitchB] ipv6 savi strict 
    # Enable IPv6. 
    [SwitchB] ipv6 
    # Enable DHCPv6 snooping. 
    [SwitchB] ipv6 dhcp snooping enable 
    # Assign interfaces GigabitEthernet 1/0/1 through GigabitEthernet 1/0/5 to VLAN 2. 
    [SwitchB] vlan 2 
    [SwitchB-vlan2] port gigabitethernet 1/0/1 gigabitethernet 1/0/2 gigabitethernet 1/0/3 
    gigabitethernet 1/0/4 gigabitethernet 1/0/5 
    # Enable DHCPv6 snooping in VLAN 2. 
    [SwitchB-vlan2] ipv6 dhcp snooping vlan enable 
    [SwitchB] quit 
    # Configure interface GigabitEthernet 1/0/1 as a DHCPv6 snooping trusted port. 
    [SwitchB] interface gigabitethernet 1/0/1 
    [SwitchB-GigabitEthernet1/0/1] ipv6 dhcp snooping trust 
    [SwitchB-GigabitEthernet1/0/1] quit 
    # Enable ND snooping and ND detection. 
    [SwitchB] ipv6 nd snooping enable link-local 
    [SwitchB] ipv6 nd snooping enable global 
    [SwitchB] vlan 2 
    [SwitchB-vlan2] ipv6 nd snooping enable 
    [SwitchB-vlan2] ipv6 nd detection enable 
    [SwitchB-vlan2] quit 
    # Configure interface GigabitEthernet 1/0/2 as an ND detection trusted port. 
    [SwitchB] interface gigabitethernet 1/0/2 
    [SwitchB-GigabitEthernet1/0/2] ipv6 nd detection trust 
    [SwitchB-GigabitEthernet1/0/2] quit 
    # Configure the dynamic IPv6 source guard binding function on downlink ports GigabitEthernet 1/0/3 
    through GigabitEthernet 1/0/5. 
    [SwitchB] interface gigabitethernet 1/0/3 
    [SwitchB-GigabitEthernet1/0/3] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/3] quit 
    [SwitchB] interface gigabitethernet 1/0/4 
    [SwitchB-GigabitEthernet1/0/4] ipv6 verify source ipv6-address mac-addre\
    ss 
    [SwitchB-GigabitEthernet1/0/4] quit 
    [SwitchB] interface gigabitethernet 1/0/5 
    [SwitchB-GigabitEthernet1/0/5] ipv6 verify source ipv6-address mac-addre\
    ss  
    						
    							 388 
    Configuring blacklist 
    Overview 
    The blacklist feature is an attack prevention mechanism that filters packets based on the source IP address. 
    Compared with ACL-based packet filtering, the blacklist  feature is easier to configure and fast in filtering 
    packets sourced from particular IP addresses.  
    The device can dynamically add and remove blacklist entries by cooperating with the login user 
    authentication feature. When the device detects that a user tried to use FTP, Telnet, SSH, SSL, or web to 
    log in to the device for a specific number of times but failed to log in, it considers the user an invalid user 
    and automatically blacklists the user’s IP address to fi lter subsequent packets sourced from that IP address. 
    This function can effectively prevent users from cracking passwords by repeatedly trying to log in.  
    The device always uses the login failure threshold of 6 and sets the aging time of a dynamic blacklist 
    entry to 10 minutes. These two settings are not configurable. User login failure reasons include wrong 
    username, wrong password, and wrong verification code (for web users).  
    The device also supports adding and removing blacklis t entries manually. Manually configured blacklist 
    entries fall into two categories: pe rmanent and non-permanent. A perm anent blacklist entry is always 
    present unless being removed manually, whereas a no n-permanent blacklist entry has a limited lifetime 
    depending on your configuration. When the lifeti me of a non-permanent entry expires, the device 
    removes the entry from the blacklist, allowing the packets of the IP address defined by the entry to pass 
    through.  
    Configuring the blacklist feature 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enable the blacklist 
    feature.  blacklist enable
     Disabled  by default. 
    3.  Add a blacklist entry.  blacklist ip source-ip-address
     
    [ timeout  minutes ]  Optional. 
    To add a permanent en
    try, do not specify 
    the  timeout  minutes option. 
     
    Displaying and maintaining the blacklist 
     
    Task Command  Remarks 
    Display blacklist 
    information. display blacklist
     { all | ip source-ip-address [ slot 
    slot-number  ] | slot slot-number  } [ | { begin |  exclude | 
    include  } regular-expression ]   Available in any view 
      
    						
    							 389 
    Blacklist configuration example 
    Network requirements 
    As shown in Figure 143, Ho st A, Host B, and Host C are internal users, and external user Host D is 
    considered an attacker. 
    Configure Device to always filter packets from Host  D, and to prevent internal users from guessing 
    passwords. 
    Figure 143  Network diagram 
     
     
    Configuration procedure 
    # Assign IP addresses to the interfaces of Device. (Details not shown.) 
    # Enable the blacklist feature. 
     system-view 
    [Device] blacklist enable 
    # Add the IP address of Host D 5.5.5.5 to the blacklist. Do not specify any aging time to make the entry 
    never age out. 
    [Device] blacklist ip 5.5.5.5 
    Verifying the configuration 
    If Host C tries to log in to Device through web for si x times but fails to log in, the device blacklists Host 
    C. Use the display blacklist all  command to view all added blacklist entries.  
    [Device] display blacklist all 
                        Blacklist information 
    ------------------------------------------------------------------------\
    ------ 
    Blacklist                               : enabled 
    Blacklist items                         : 2 
    ------------------------------------------------------------------------\
    ------ 
    IP              Type   Aging started       Aging finished      Dropped p\
    ackets 
                           YYYY/MM/DD hh:mm:ss YYYY/MM/DD hh:mm:ss 
    5.5.5.5         manual 2011/04/09 16:02:20 Never               0 
    192.168.1.4     manual 2011/04/09 16:02:26 2011/04/09 16:12:26 0 
    Internet
    Device
    Host C (Web user)
    Vlan-int2
    Vlan-int1
    Host A Host B
    Attacker
    Host D5.5.5.5/24
    202.1.0.1/16
    192.168.1.1/16
    192.168.1.4/16 
    						
    							 390 
    Host D and Host C are on the blacklist. Host C will stay on the list for 10 minutes, and will then be able 
    to try to log in again. The entry for Host D will never age out. When you do not consider Host D an 
    attacker anymore, you can use the undo blacklist ip 5.5.5.5 command to remove the entry.  
    						
    							 391 
    Index 
    A B C D E H I L M N O P R S T U  
    A 
    AAA configuration considerations and task list,15 
    AAA co
    
    nfiguration examples, 50 
    AAA o
    
    verview, 1 
    A
    
    pplying a QoS policy, 228 
    AR
    
    P attack protection configuration task list, 351 
    B 
    Ba
    
    sic configuration for MAC authentication, 118  
    Blac
    
    klist configuration example, 389 
    C 
    C
    
    onfiguration prerequisites, 111 
    C
    
    onfiguration prerequisites, 92 
    C
    
    onfiguration prerequisites, 141 
    Co
    
    nfiguration task list, 335 
    Co
    
    nfiguration task list, 118  
    Co
    
    nfiguration task list, 326 
    Co
    
    nfiguration task list, 208 
    Co
    
    nfiguration task list, 245 
    C
    
    onfiguring a free IP, 111 
    C
    
    onfiguring a MAC authentication critical VLAN, 121 
    C
    
    onfiguring a MAC authentication guest VLAN, 12 0 
    C
    
    onfiguring a NAS ID-VLAN binding, 47 
    C
    
    onfiguring a PKI domain, 258 
    C
    
    onfiguring a switch as a RADIUS server, 48 
    C
    
    onfiguring AAA methods for ISP domains, 40 
    C
    
    onfiguring AAA schemes, 16 
    C
    
    onfiguring an 802.1X critical VLAN, 10 2 
    C
    
    onfiguring an 802.1X guest VLAN, 10 0 
    C
    
    onfiguring an access control policy, 26 4 
    C
    
    onfiguring an Auth-Fail VLAN, 101 
    Co
    
    nfiguring an entity DN, 257 
    C
    
    onfiguring an SSL client policy, 329 
    C
    
    onfiguring an SSL server policy, 326 
    C
    
    onfiguring ARP active acknowledgement, 358 
    C
    
    onfiguring ARP automatic scanning and fixed 
    ARP, 366  C
     onfiguring ARP defense against IP packet 
    attacks, 352 
    Co
    
    nfiguring ARP detection, 359 
    C
    
    onfiguring ARP filtering, 368 
    C
    
    onfiguring ARP gateway protection, 367 
    C
    
    onfiguring ARP packet rate limit, 355 
    C
    
    onfiguring ARP packet source MAC address 
    consistency check, 358 
    C
    
    onfiguring global SAVI, 381 
    Co
    
    nfiguring HABP, 241 
    C
    
    onfiguring IPsec for IPv6 routing protocols, 278 
    Co
    
    nfiguring password control, 233 
    C
    
    onfiguring PKI certificate verification, 262 
    C
    
    onfiguring port security features, 211 
    C
    
    onfiguring portal detection functions, 15 7 
    C
    
    onfiguring portal stateful failover (available only on 
    the HP 5500 EI series), 15 5 
    C
    
    onfiguring RADIUS related attributes,15 3  
    C
    
    onfiguring secure MAC addresses, 212 
    C
    
    onfiguring source MAC address based ARP attack 
    detection, 356 
    C
    
    onfiguring the authentication trigger function,97  
    C
    
    onfiguring the blacklist feature, 388 
    C
    
    onfiguring the IPv4 source guard function, 336 
    C
    
    onfiguring the IPv6 source guard function, 338 
    C
    
    onfiguring the local portal server, 14 3 
    C
    
    onfiguring the ND detection function, 372 
    C
    
    onfiguring the online user handshake function,96  
    C
    
    onfiguring the quiet timer, 99 
    C
    
    onfiguring the redirect URL, 112  
    C
    
    onfiguring the switch as an SCP server, 321 
    C
    
    onfiguring the switch as an SFTP client, 311 
    C
    
    onfiguring the switch as an SFTP server, 31 0 
    C
    
    onfiguring the switch as an SSH client, 294 
    C
    
    onfiguring the switch as an SSH server, 289 
    C
    
    onfiguring the switch as the SCP client, 321 
    C
    
    onfiguring triple authentication, 19 6 
    Co
    
    nfiguring URPF, 379  
    						
    							 392 
    Controlled/uncontrolled port and port authorization 
    status,78 
    C
    
    ontrolling access of portal users, 14 9 
    Cr
    
    eating a local asymmetric key pair, 246 
    Cr
    
    eating a user profile, 227 
    D 
    D
    
    eleting a certificate, 263 
    D
    
    estroying a local asymmetric key pair, 248 
    D
    
    estroying a local RSA key pair, 263 
    Displa
    
    ying and maintaining 802.1X, 10 3 
    Dis
    
    playing and maintaining AAA, 50 
    Displa
    
    ying and maintaining EAD fast deployment, 112  
    Displa
    
    ying and maintaining HABP, 242 
    Displa
    
    ying and maintaining IP source guard, 341 
    Displa
    
    ying and maintaining IPsec, 281 
    Displa
    
    ying and maintaining MAC authentication, 12 2 
    Displa
    
    ying and maintaining password control, 236 
    Displa
    
    ying and maintaining PKI, 26 4 
    Displa
    
    ying and maintaining port security, 214 
    Displa
    
    ying and maintaining portal, 16 0 
    Displa
    
    ying and maintaining public keys,249  
    Displa
    
    ying and maintaining SSH,296  
    Displa
    
    ying and maintaining SSL,330  
    Displa
    
    ying and maintaining TCP attack protection, 332 
    Displa
    
    ying and maintaining the blacklist, 388 
    Displa
    
    ying and maintaining user profiles, 229 
    Displa
    
    ying or exporting the local host public key, 246 
    E 
    E
    
    AD fast deployment configuration example, 113  
    Ena
    
    bling 802.1X, 93 
    Ena
    
    bling a user profile, 228 
    Ena
    
    bling EAP relay or EAP termination, 93 
    Ena
    
    bling port security, 209 
    Ena
    
    bling portal authentication, 14 7 
    Ena
    
    bling source MAC consistency check for ND 
    packets, 372 
    E
    
    nabling the periodic online user re-authentication 
    function, 99 
    Ena
    
    bling the SYN Cookie feature, 332 
    H 
    HP i
    
    mplementation of 802.1X, 87 
    HABP c
    
    onfiguration example, 242 
    HABP o
    
    verview,240   I 
    I
    
    gnoring authorization information from the server,
    214 
    Initi
    
    ating 802.1X authentication, 81 
    I
    
    P source guard configuration examples, 341 
    I
    
    Psec for RIPng configuration example, 281 
    L 
    L
    
    ogging off portal users, 16 0 
    M 
    MA
    
    C authentication configuration examples, 12 2 
    MA
    
    C authentication overview,1 16 
    N 
    ND detec
    
    tion configuration example, 374 
    O 
    Ov
    
    erview, 245 
    Ov
    
    erview, 388 
    Ov
    
    erview, 321 
    Ov
    
    erview, 12 9 
    Ov
    
    erview, 254 
    Ov
    
    erview, 332 
    Ov
    
    erview, 19 5 
    Ov
    
    erview, 371 
    Ov
    
    erview, 351 
    Ov
    
    erview, 31 0 
    Ov
    
    erview, 205 
    Ov
    
    erview, 325 
    Ov
    
    erview, 286 
    Ov
    
    erview, 334 
    Ov
    
    erview, 275 
    Ov
    
    erview, 111 
    P 
    P
    
    assword control configuration example, 237 
    P
    
    assword control configuration task list,232  
    Pa
    
    s swo rd  c o n t ro l  ove r view, 230 
    PK
    
    I configuration examples, 265 
    PK
    
    I configuration task list, 256 
    P
    
    ort security configuration examples, 215 
    P
    
    ortal configuration examples, 161 
    P
    
    ortal configuration task list, 14 0 
    P
    
    ublic key configuration examples, 249 
    R 
    R
    
    etrieving a certificate manually, 261  
    						
    							 393 
    S 
    SAVI configuration in DHCPv6+SLAAC address 
    assignment scenario,386 
    S
    
    AVI configuration in DHCPv6-only address 
    assignment scenario, 382 
    S
    
    AVI configuration in SLAAC-only address assignment 
    scenario, 384 
    SA
    
    VI over view, 381 
    S
    
    etting port securitys limit on the number of MAC 
    addresses on a port, 209 
    S
    
    etting the 802.1X authentication timeout timers, 96 
    S
    
    etting the EAD rule timer, 112  
    S
    
    etting the maximum number of authentication request 
    attempts, 96 
    S
    
    etting the maximum number of concurrent 802.1X 
    users on a port, 95 
    S
    
    etting the port authorization state, 94 
    S
    
    etting the port security mode, 210 
    SFT
    
    P client configuration example, 314 
    SFT
    
    P server configuration example, 318 
    S
    
    pecifying a MAC authentication domain,12 0  
    S
    
    pecifying a mandatory authentication domain on a 
    port, 98 
    S
    
    pecifying a source IP address for outgoing portal 
    packets, 15 4 
    S
    
    pecifying an access control method, 95 
    S
    
    pecifying an Auth-Fail VLAN for portal 
    authentication, 15 2  S
     pecifying an auto redirection URL for authenticated 
    portal users, 15 6 
    S
    
    pecifying supported domain name delimiters, 10 3 
    S
    
    pecifying the device ID used in stateful failover 
    mode, 48 
    S
    
    pecifying the peer public key on the local device, 248 
    S
    
    pecifying the portal server, 14 2 
    S
    
    SH client configuration examples, 304 
    S
    
    SH server configuration examples, 297 
    Submit
    
    ting a PKI certificate request, 259 
    T 
    T
    
    earing down user connections, 47 
    T
    
    riple authentication configuration examples, 19 7 
    T
    
    roubleshooting AAA, 76 
    T
    
    roubleshooting EAD fast deployment, 115  
    T
    
    roubleshooting IP source guard, 350 
    Tr
    
    ou b l es ho o ti n g  P KI, 273 
    T
    
    roubleshooting port security, 224 
    T
    
    roubleshooting portal, 19 3 
    Tr
    
    ou b l es ho o ti n g  SS L, 330 
    U 
    UR
    
    PF configuration example, 379 
    UR
    
    PF overview, 376 
    U
    
    ser profile configuration task list, 227 
    U
    
    ser profile overview, 227 
    U
    
    sing MAC authentication with other features, 117  
      
    						
    							i 
    Contents 
    High availability overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  1 
    Availability requirements ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ········· 1 
    Availability evaluation ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ··········· 1 
    High availability technologies ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ····· 2 
    Fault detection technologies ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ················ 2 
    Protection switchover technologies ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··········· 3 
    Configuring Ethernet OAM ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ················· 5 
    Ethernet OAM overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ······ 5 
    Major functions of Ethernet OAM ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ········· 5 
    Ethernet OAMPDUs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
     5 
    How Ethernet OAM works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············ 6 
    Standards and protocols ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ················ 8 
    Ethernet OAM configura tion task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
     8 
    Configuring basic Ethernet OAM functions  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  9 
    Configuring the Ethernet OAM connection detection timers ··················\
    ··················\
    ··················\
    ················ ··················\
     9 
    Configuring link  monitoring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ··· 10 
    Configuring errored symb ol event detection ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
     10 
    Configuring errored fr ame event detection ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    · 10 
    Configuring errored frame  period event detection ··················\
    ··················\
    ··················\
    ··················\
    ······ ·············· 10 
    Configuring errored frame  seconds event detection ··················\
    ··················\
    ··················\
    ··················\
    ····· ············ 11 
    Configuring Ethernet  OAM remote loopback ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ····· 11 
    Enabling Ethernet OA M remote loopback ··················\
    ··················\
    ··················\
    ··················\
    ················· ················ 11 
    Rejecting the Ethernet OAM remote l oopback request from a remote port ··················\
    ··················\
    ················  12 
    Displaying and maintaining Ethernet OAM configuration ··················\
    ··················\
    ··················\
    ··················\
    · ··············· 13 
    Ethernet OAM configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··········· 13 
    Configuring CFD ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ····· 16 
    CFD overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ··········· 16 
    Basic concepts in CFD ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··············· 16 
    CFD functions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ···· 18 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·············· 20 
    CFD configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ····· 20 
    Configuring basic CFD settings ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
     21 
    Enabling CFD ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ········  21 
    Configuring the CFD protocol version ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  21 
    Configuring service instances ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··········· 22 
    Configuring MEPs  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·  22 
    Configuring MIP generation rules ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  23 
    Configuring CFD functions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ··· 24 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 24 
    Configuring CC on MEPs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··········· 24 
    Configuring LB on MEPs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············· 25 
    Configuring LT on MEPs  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  25 
    Configuring AIS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ·· 26 
    Configuring LM ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    ·· 26 
    Configuring one-way DM ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··········· 26 
    Configuring two-way DM ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··········· 27 
    Configuring TST ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ·· 27 
    Displaying and maintaining CFD ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··············· 28  
    						
    							ii 
    CFD configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    · 29 
    Configuring DLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ····· 35 
    DLDP overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ···············  35 
    Background ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··························\
    ··················\
    ···· 35 
    How DLDP works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ················· 36 
    DLDP configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ····· 42 
    Configuring the duplex mode and speed of an Ethernet interface  ··················\
    ··················\
    ··················\
    ··················\
    ··· 42 
    Enabling DLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··········· 43 
    Setting DLDP mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ········  43 
    Setting the interval to send advertisement packets ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ······· 43 
    Setting the delaydown timer ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ·· 44 
    Setting the port shutdown mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 44 
    Configuring DLDP authentication  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····  45 
    Resetting DLDP state ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··················\
    ········· 45 
    Displaying and maintaining DLDP  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  46 
    DLDP configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
     46 
    Automatically shutting down  unidirectional links ··················\
    ··················\
    ··················\
    ··················\
    ······ ················· 46 
    Manually shutting down  unidirectional links ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    · 50 
    Troubleshooting DLDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··················\
    ······ 53 
    Configuring RRPP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ····· 54 
    RRPP overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··········· 54 
    Background ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ···· 54 
    Basic concepts in RRPP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··············· 54 
    RRPPDUS ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ················  56 
    RRPP timers ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·························\
    ··················\
    ······ 57 
    How RRPP works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ···  57 
    Typical RRPP networking ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  59 
    Protocols and standards ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·············· 62 
    RRPP configuration task list··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ····· 62 
    Creating an RRPP domain ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·· 63 
    Configuring control VLANs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ·· 63 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 63 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 63 
    Configuring protected VLANs  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  64 
    Configuring RRPP rings ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ······ 65 
    Configuring RRPP ports ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··············· 65 
    Configuring RRPP nodes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············· 66 
    Activating an RRPP domain  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  67 
    Configuring RRPP timers ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ····· 68 
    Configuring an RRPP ring group ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················ 68 
    Configuration restrictio ns and guidelines ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ···· 68 
    Configuration  procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 69 
    Displaying and ma intaining RRPP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··············· 69 
    RRPP configuration examples  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  69 
    Single ring configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ······· 69 
    Intersecting ring configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  72 
    Dual homed rings configuration example ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
     77 
    Intersecting-ring load balancing configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··········· 87 
    Troubleshooting ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ··········· 96 
    Configuring Smart Link ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ·· 97 
    Smart Link overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ········ 97 
    Background ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
    ···· 97 
    Terminology ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
    ···· 98  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide