Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 228 
         VRID           : 1               Adver Timer  : 1 
         Admin Status   : Up              State        : Master 
         Config Pri     : 110             Running Pri  : 110 
         Preempt Mode   : Yes             Delay Time   : 0 
         Auth Type      : None 
         Virtual IP     : 10.1.1.10 
         Virtual MAC    : 0000-5e00-0101 
         Master IP      : 10.1.1.1 
       VRRP Track Information: 
         Track Object   : 1               State : Positive   Pri Reduced : 3\
    0 
    # Display detailed information about VRRP group 1 on Switch B. 
    [SwitchB-Vlan-interface2] display vrrp verbose 
     IPv4 Standby Information: 
         Run Mode       : Standard 
         Run Method     : Virtual MAC 
     Total number of virtual routers : 1 
       Interface Vlan-interface2 
         VRID           : 1               Adver Timer  : 1 
         Admin Status   : Up              State        : Backup 
         Config Pri     : 100             Running Pri  : 100 
         Preempt Mode   : Yes             Delay Time   : 0 
         Become Master  : 2200ms left 
         Auth Type      : None 
         Virtual IP     : 10.1.1.10 
         Master IP      : 10.1.1.1 
    The output shows that in VRRP group 1, Switch A is the master, and Switch B is a backup. Packets 
    from Host A to Host B are forwarded through Switch A. 
    # Shut down the uplink interface VLAN-interface 3 on Switch A. 
    [SwitchA-Vlan-interface2] interface vlan-interface 3 
    [SwitchA-Vlan-interface3] shutdown 
    After shutting down the uplink interface on Switch  A, you can still successfully ping Host B on Host 
    A. Use the display vrrp  command to view information about VRRP group 1. 
    # After shutting down the uplink interface on Sw itch A, display detailed information about VRRP 
    group 1 on Switch A. 
    [SwitchA-Vlan-interface3] display vrrp verbose 
     IPv4 Standby Information: 
         Run Mode       : Standard 
         Run Method     : Virtual MAC 
     Total number of virtual routers : 1 
       Interface Vlan-interface2 
         VRID           : 1               Adver Timer  : 1 
         Admin Status   : Up              State        : Backup 
         Config Pri     : 110             Running Pri  : 80 
         Preempt Mode   : Yes             Delay Time   : 0 
         Become Master  : 2200ms left 
         Auth Type      : None 
         Virtual IP     : 10.1.1.10 
         Master IP      : 10.1.1.2  
    						
    							 229 
       VRRP Track Information: 
         Track Object   : 1               State : Negative   Pri Reduced : 3\
    0 
    # After shutting down the uplink interface on Switch A, display detailed information about VRRP 
    group 1 on Switch B. 
    [SwitchB-Vlan-interface2] display vrrp verbose 
     IPv4 Standby Information: 
         Run Mode       : Standard 
         Run Method     : Virtual MAC 
     Total number of virtual routers : 1 
       Interface Vlan-interface2 
         VRID           : 1               Adver Timer  : 1 
         Admin Status   : Up              State        : Master 
         Config Pri     : 100             Running Pri  : 100 
         Preempt Mode   : Yes             Delay Time   : 0 
         Auth Type      : None 
         Virtual IP     : 10.1.1.10 
         Virtual MAC    : 0000-5e00-0101 
         Master IP      : 10.1.1.2 
    The output shows that when the uplink interface on  Switch A is shut down, the priority of Switch A 
    decreases to 80. Switch A becomes the backup,  and Switch B becomes the master. Packets from 
    Host A to Host B are forwarded through Switch B.  
    						
    							 230 
    Index 
    A B C D E H I M R S T V  
    A 
    Activating an RRPP domain,67 
    As
    
    sociating the track module with a detection 
    module, 202 
    As
    
    sociating the track module with an application 
    module, 204 
    A
    
    vailability evaluation, 1 
    A
    
    vailability requirements, 1 
    B 
    BFD o
    
    verview, 19 3 
    C 
    CFD c
    
    onfiguration example, 29 
    CFD conf
    
    iguration task list, 20 
    CFD o
    
    verview, 16 
    C
    
    onfiguration guidelines, 19 2 
    C
    
    onfiguring a Smart Link device,10 0  
    C
    
    onfiguring an associated device,10 4  
    C
    
    onfiguring an RRPP ring group, 68 
    Co
    
    nfiguring basic CFD settings, 21 
    C
    
    onfiguring basic Ethernet OAM functions, 9 
    C
    
    onfiguring BFD basic functions, 19 8 
    C
    
    onfiguring CFD functions, 24 
    Co
    
    nfiguring control VLANs, 63 
    C
    
    onfiguring DLDP authentication,45  
    C
    
    onfiguring Ethernet OAM remote loopback, 11 
    C
    
    onfiguring link monitoring, 10 
    C
    
    onfiguring Monitor Link, 12 0 
    C
    
    onfiguring protected VLANs, 64 
    C
    
    onfiguring RRPP rings, 65 
    Co
    
    nfiguring RRPP timers, 68 
    C
    
    onfiguring the backup VLAN, 19 0 
    C
    
    onfiguring the duplex mode and speed of an Ethernet 
    interface, 42 
    C
    
    onfiguring the Ethernet OAM connection detection 
    timers, 9 
    Co
    
    nfiguring VRRP for IPv4, 13 6 
    Co
    
    nfiguring VRRP for IPv6, 14 3  Cr
     eating an RRPP domain,
    63 
    D 
    Displa
    
    ying and maintaining BFD, 19 9 
    Displa
    
    ying and maintaining CFD, 28 
    Displa
    
    ying and maintaining DLDP, 46 
    Displa
    
    ying and maintaining Ethernet OAM 
    configuration, 13 
    Displa
    
    ying and maintaining Monitor Link, 121 
    Displa
    
    ying and maintaining RRPP, 69 
    Displa
    
    ying and maintaining Smart Link, 10 4 
    Displa
    
    ying and maintaining stateful failover, 191 
    Displa
    
    ying and maintaining track entries, 208 
    D
    
    LDP configuration examples, 46 
    DLDP co
    
    nfiguration task list, 42 
    DLDP o
    
    verview, 35 
    E 
    E
    
    nabling DLDP, 43 
    Ena
    
    bling stateful failover, 19 0 
    Ether
    
    net OAM configuration example, 13 
    Ether
    
    net OAM configuration task list, 8 
    Ether
    
    net OAM overview, 5 
    H 
    H
    
    igh availability technologies, 2 
    I 
    In
    
    troduction to stateful failover configuration, 18 9 
    I
    
    Pv4-based VRRP configuration examples, 14 8 
    I
    
    Pv6 -based VRRP configuration examples, 16 7 
    M 
    Monit
    
    or Link configuration example, 121 
    Mo
    
    nitor Link overview, 119  
    R 
    R
    
    esetting DLDP state, 45 
    R
    
    RPP configuration examples,69  
    RRP
    
    P configuration task list, 62 
    RR
    
    PP overview, 54  
    						
    							 231 
    S 
    Setting DLDP mode,43 
    S
    
    etting the delaydown timer, 44 
    S
    
    etting the interval to send advertisement packets, 43 
    S
    
    etting the port shutdown mode, 44 
    Smar
    
    t Link configuration examples, 10 5 
    Smar
    
    t Link configuration task list, 10 0 
    Smar
    
    t Link overview, 97 
    S
    
    tateful failover configuration example, 191 
    St
    
    ateful failover overview, 18 8 
    T  T
    
    rack configuration examples,
    208 
    T
    
    rack configuration task list,201  
    Tr
    
    ack  ove r view, 200 
    Tr
    
    ou b l es ho o ti n g, 96 
    T
    
    roubleshooting DLDP, 53 
    T
    
    roubleshooting VRRP, 18 7 
    V 
    VR
    
    RP load balancing mode, 131 
    VRRP o
    
    verview, 12 5 
    VR
    
    RP standard protocol mode, 12 6 
      
    						
    							 
    i  
    Contents 
    Using ping, tracert, an d system debugging ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ········ 1 
    Ping ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ··················\
      1 
    Using a ping command to test network connectivity ··················\
    ··················\
    ··················\
    ··················\
    ···················· 1 
    Ping example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ······ 1 
    Tracert ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ··················\
    ··· 3 
    Prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ········· 4 
    Using a tracert command to identify  failed or all nodes in a path ··················\
    ··················\
    ··················\
    ······· ········ 5 
    System debugging ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    ·········· 5 
    Debugging information control switches··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ····· 5 
    Debugging a feat ure module ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ············ 6 
    Ping and tracert example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
    ······· 7 
    Configuring NTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ······· 8 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ·········  8 
    NTP application ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····················\
    ··················\
    ····· 8 
    NTP advantages ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    ··· 8 
    How NTP works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ··· 9 
    NTP message format ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··············· 10 
    Operation modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················· 11 
    NTP configuration task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  13 
    Configuring NTP operation modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············· 13 
    Configuring the clie nt/server mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ······ 14 
    Configuring the symmetric peers mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ·· 14 
    Configuring the broadcast mode  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  15 
    Configuring the multicast mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········· 16 
    Configuring option al parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ················ 17 
    Specifying the source inte rface for NTP messages ··················\
    ··················\
    ··················\
    ··················\
    ······ ·············· 17 
    Disabling an interface from  receiving NTP messages ··················\
    ··················\
    ··················\
    ··················\
    ···· ··········· 17 
    Configuring the allowed maximum  number of dynamic sessions ··················\
    ··················\
    ··················\
    ··············  18 
    Configuring the DSCP value for NTP messages  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······  18 
    Configuring access-control rights ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
     18 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ············· 19 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 19 
    Configuring NTP authentication ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 19 
    Configuring NTP authentication  in client/server mode ··················\
    ··················\
    ··················\
    ··················\
    ·· ··········· 19 
    Displaying and maintaining NTP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··············· 21 
    NTP configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    · 21 
    Configuring the client/server mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ······ 21 
    Configuring the NTP symmetric mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ·· 22 
    Configuring NTP broadcast mode  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  24 
    Configuring NTP multicast mode ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ······· 25 
    Configuring NTP client/server  mode with authentication ··················\
    ··················\
    ··················\
    ··················\
     ········· 28 
    Configuring NTP broadcast mo de with authentication ··················\
    ··················\
    ··················\
    ··················\
    ···· ········· 29 
    Configuring the information center ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ············· 33 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  33 
    Classification of system information ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ········ 34 
    System informat ion levels ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ·············· 34 
    System information channels  and output destinations ··················\
    ··················\
    ··················\
    ··················\
    ··· ············ 34 
    Outputting system inform ation by source module ··················\
    ··················\
    ··················\
    ··················\
    ········ ·············· 35  
    						
    							 
    ii  
    Default output rules of  system information ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ···· 35 
    System informat ion format ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ············· 36 
    Information center conf iguration task list ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··············· 39 
    Outputting system inform ation to the console ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········· 40 
    Configuring a system informatio n output rule for the console ··················\
    ··················\
    ··················\
    ············ ········ 40 
    Enabling system information output to the console  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  40 
    Outputting system information to the monitor terminal ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··· 41 
    Configuring a system information outp ut rule for the monitor terminal ··················\
    ··················\
    ··················\
    ··· ·· 41 
    Enabling system information outp ut to the monitor terminal ··················\
    ··················\
    ··················\
    ·············· ········· 42 
    Outputting system inform ation to a log host ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ·········· 42 
    Outputting system informat ion to the trap buffer ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········ 43 
    Outputting system information to the log buffer  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  43 
    Outputting system information to the SNMP module ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    · 44 
    Outputting system information to the Web interface  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········  45 
    Saving security logs into the security log file ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ············· 45 
    Saving security logs into the security log file  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  46 
    Managing the security log file ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··········· 47 
    Configuring synchronous  information output ··················\
    ··················\
    ··················\
    ··················\
    ············ ················· 49 
    Disabling an interface from generating  link up/down logging information ··················\
    ··················\
    ··················\
    · ···· 49 
    Displaying and maintaining information center ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ······ 50 
    Information center conf iguration examples ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·········· 50 
    Outputting log informatio n to a UNIX log host ··················\
    ··················\
    ··················\
    ··················\
    ········· ················· 50 
    Outputting log information to a Linux log host  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  51 
    Outputting log information to the console ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··· 53 
    Saving security logs into the security log file  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  54 
    Configuring SNMP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ····  57 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  57 
    SNMP framework ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······················\
    ················ 57 
    MIB and view-based  MIB access control ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    · 57 
    SNMP operations ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ················· 58 
    SNMP protocol versions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············· 58 
    SNMP configuration task list  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  58 
    Configuring SNMP basic parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··········· 58 
    Configuring SNMPv3  basic parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
     58 
    Configuring SNMPv1 or SNMPv2c basic parameters  ··················\
    ··················\
    ··················\
    ··················\
    ·············· 60 
    Switching the NM-specific interface index format ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  62 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ·············· 62 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 62 
    Configuring SNMP logging ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ··················\
     63 
    Configuring SNMP traps ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··················\
    ··· 63 
    Enabling SNMP traps ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ·············· 63 
    Configuring the SNMP agent to send traps  to a host ··················\
    ··················\
    ··················\
    ··················\
    ···· ··········· 64 
    Displaying and ma intaining SNMP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············ 65 
    SNMP configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················ 66 
    SNMPv1/SNMPv2c configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ············ 66 
    SNMPv3 configuration example··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ····· 67 
    SNMP logging config uration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    · 69 
    Configuring RMON ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
    · 71 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ······  71 
    Working mechanism ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·············· 71 
    RMON groups ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ··················\
     71 
    Configuring the RMON statistics function ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··········· 73 
    Configuring the RMON Ethernet statistics function  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  73  
    						
    							 
    iii  
    Configuring the RMON histor y statistics function ··················\
    ··················\
    ··················\
    ··················\
    ······ ················ 73 
    Configuring the RMON  alarm function ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ·········· 74 
    Displaying and ma intaining RMON ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··········· 75 
    Ethernet statistics grou p configuration example ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ········ 76 
    History group config uration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ············· 76 
    Alarm group configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ············· 78 
    Configuring port mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
     81 
    Introduction to port mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ···· 81 
    Terminologies of port mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ·········· 81 
    Port mirroring classificati on and implementation ··················\
    ··················\
    ··················\
    ··················\
    ······ ················· 82 
    Configuring local  port mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
     84 
    Local port mirroring conf iguration task list ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ····· 84 
    Creating a local mirroring group ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ········ 84 
    Configuring source ports for  the local mirroring group ··················\
    ··················\
    ··················\
    ··················\
     ············ 84 
    Configuring the monitor port  for the local mirroring group ··················\
    ··················\
    ··················\
    ··················\
    ······  85 
    Using the remote probe VLAN to enable local mi rroring to support multiple monitor ports ··················\
    ·······  86 
    Configuring Layer 2 remote port mirroring ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·········· 87 
    Layer 2 remote port mirroring  configuration task list ··················\
    ··················\
    ··················\
    ··················\
    · ··············· 87 
    Configuring a remote source gr oup (on the source device) ··················\
    ··················\
    ··················\
    ················ ······· 88 
    Configuring a remote destination group (on the destination device) ··················\
    ··················\
    ··················\
    ······ ·· 90 
    Displaying and maintaining port mirroring  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  92 
    Port mirroring configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  92 
    Local port mirroring configuration example ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    · 92 
    Local port mirroring with multiple  monitor ports configuration example  ··················\
    ··················\
    ··················\
    ··· 93 
    Layer 2 remote port mirroring configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··· ··········· 94 
    Configuring tra ffic mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··················\
     97 
    Introduction to traffic mirroring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ···· 97 
    Traffic mirroring configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ················· 97 
    Configuring match criteria ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    ···· 97 
    Configuring traffic mirrori ng of different types ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··········· 98 
    Mirroring traffic to a port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················ 98 
    Mirroring traffic to the CPU ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ·············· 98 
    Configuring a QoS policy  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  98 
    Applying a QoS policy ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··················\
    ···· 99 
    Apply a QoS policy to a port ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ·········· 99 
    Apply a QoS policy  to a VLAN ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ······· 99 
    Apply a QoS poli cy globally ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ········ 100 
    Apply a QoS policy to the control plane  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  100 
    Displaying and maintaining traffic mirroring ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········ 100 
    Traffic mirroring configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··········· 101 
    Traffic mirroring configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·· 101 
    Configuring NQA ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
     103 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  103 
    NQA features ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ························\
    ··················\
     103 
    NQA concepts ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 105 
    NQA probe operation procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ·· 106 
    NQA configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    · 106 
    Configuring the NQA server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ················ 107 
    Enabling the NQA client ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ·· 107 
    Creating an NQA test group ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ················ 108 
    Configuring an NQA test group ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ············· 108 
    Configuring ICMP echo tests  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
      108 
    Configuring DHCP tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············ 109  
    						
    							 
    iv  
    Configuring  DNS tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ············· 110 
    Configuring FTP tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ················ 111 
    Configuring HTTP tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ·············· 112 
    Configuring UDP jitter tests  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  112 
    Configuring SNMP tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ··········· 114 
    Configuring TCP tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ··············· 115 
    Configuring UDP echo tests  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  116 
    Configuring voice tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·············· 116 
    Configuring DLSw tests ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ············· 118 
    Configuring the collabo ration function ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ············ 119 
    Configuring threshold monitoring  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·  120 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 120 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 120 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 120 
    Configuring the NQA statisti cs collection function ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ····· 122 
    Configuring the history re cords saving function ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ······ 122 
    Configuring optional parameter s for an NQA test group ··················\
    ··················\
    ··················\
    ··················\
    · ·············· 123 
    Configuring a schedule fo r an NQA test group ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··· 124 
    Configuration prerequisites ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··········· 124 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 125 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 125 
    Displaying and ma intaining NQA ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··········· 125 
    NQA configuration examples ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ·············· 126 
    ICMP echo test conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    · 126 
    DHCP test configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········  127 
    DNS test configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ······ 129 
    FTP test configura tion example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ········ 130 
    HTTP test configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  131 
    UDP jitter test configuration example ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ····· 132 
    SNMP test config uration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ···· 135 
    TCP test configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ······· 136 
    UDP echo test conf iguration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ·· 137 
    Voice test config uration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ······ 139 
    DLSw test configuration example  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  141 
    NQA collaboration configuration example··················\
    ··················\
    ··················\
    ··················\
    ················ ·············· 143 
    Configurin g sFlow ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··················\
    ·· 146 
    sFlow overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··················\
    ········· 146 
    Introduction to sFlow ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ················ 146 
    sFlow operation ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
     147 
    Configuring sFlow ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ··················\
    ······· 147 
    Configuring the sFlow agen t and sFlow collector ··················\
    ··················\
    ··················\
    ··················\
    ······· ············· 147 
    Configuring flow  sampling ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ·········· 148 
    Configuring counter sampling  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  148 
    Displaying and maintaining sFlow ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ············· 148 
    sFlow configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 149 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  149 
    Troubleshooting sFlow configuration ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ············ 150 
    Configuring IPC ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ···· 151 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  151 
    Node ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ··  151 
    Link ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ································\
    ··················\
    ·········· 151 
    Channel ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
    ····· 151 
    Packet sending modes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ············ 152  
    						
    							 
    v  
    Enabling IPC performa nce statistics ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    · ··················\
    ·············· 152 
    Displaying and maintaining IPC  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  153 
    Configuring PoE ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ··················\
    ··· 154 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  154 
    Protocol specification ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ················ 154 
    PoE configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ··················\
    ···· 155 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 155 
    Enabling PoE ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
    ·········· 156 
    Enabling PoE for a PoE interface ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ······· 156 
    Detecting PDs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ···············  157 
    Enabling the PSE to detect nonstandard PDs ··················\
    ··················\
    ··················\
    ··················\
    ············ ··············· 157 
    Configuring a PD disconnection detection mode ··················\
    ··················\
    ··················\
    ··················\
    ········· ··········· 157 
    Configuring th e PoE power ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
     157 
    Configuring the maximum  PoE interface power ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··········· 157 
    Configuring PoE power management  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  158 
    Configuring PoE interface power management ··················\
    ··················\
    ··················\
    ··················\
    ············ ··········· 158 
    Configuring the PoE mo nitoring function ··················\
    ··················\
    ··················\
    ··················\
    ··············· ··················\
    ·········· 159 
    Configuring PSE po wer monitoring ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··· 159 
    Monitoring PD  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·····  159 
    Configuring PoE interface through PoE profile ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ······ 159 
    Configuration  guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 160 
    Configuring PoE profile ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ············· 160 
    Applying PoE profile ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··············· 160 
    Upgrading PSE processing  software in service ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ···· 161 
    Configuration  guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 161 
    Displaying and maintaining PoE ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ·············· 161 
    PoE configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ··················\
     162 
    Troubleshooting PoE ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················· ··················\
    ··················\
    ····· 163 
    Setting the priority of a PoE  interface to critical fails ··················\
    ··················\
    ··················\
    ··················\
    ···············  163 
    Applying a PoE profile to a PoE interface fails ··················\
    ··················\
    ··················\
    ··················\
    ······· ················· 163 
    Configuring an AC input unde r-voltage threshold fails ··················\
    ··················\
    ··················\
    ··················\
    · ·········· 164 
    Configuring cluste r management ·················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ········· 165 
    Overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ··················\
    ····  165 
    Roles in a cluster ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···················\
    ·  165 
    How a cluster works ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  166 
    Cluster management configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···  169 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 169 
    Configuring the management switch ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··· ··················\
    ·········· 170 
    Enabling NDP globally and for specific ports ··················\
    ··················\
    ··················\
    ··················\
    ·········· ················ 170 
    Configuring NDP parameters ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ······ 171 
    Enabling NTDP globally an d for specific ports ··················\
    ··················\
    ··················\
    ··················\
    ········· ··············· 171 
    Configuring NTDP parameters  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···············  172 
    Manually collecting topology information ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
     172 
    Enabling the cluster function ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··········· 173 
    Establishing a cluster  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·············  173 
    Enabling management VLAN auto-negotiation ··················\
    ··················\
    ··················\
    ··················\
    ············· ··········· 174 
    Configuring communication between the management switch and the member switches within a cluster
     ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
     ··················\
    ··················\
    ············ 174
     
    Configuring cluster management protocol packets ··················\
    ··················\
    ··················\
    ··················\
    ······· ·········· 175 
    Cluster member management ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
    ····· 176 
    Configuring the me mber switches ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ············· 177 
    Enabling NDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ··················\
     177 
    Enabling NTDP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ················· 177  
    						
    							 
    vi  
    Manually collecting to pology information ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
     177 
    Enabling the cluster function ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······· ··················\
    ··········· 177 
    Deleting a member switch from a cluster  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················  177 
    Configuring access between the management switch and its me mber switches ··················\
    ··················\
    ·············· 177 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 177 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 178 
    Adding a candidate sw itch to a cluster ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··········· 178 
    Configuring advanced cluste r management functions ··················\
    ··················\
    ··················\
    ··················\
    ····· ················ 178 
    Configuring topology management ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    · 178 
    Configuring interact ion for a cluster ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  179 
    SNMP configuration synchronization function ··················\
    ··················\
    ··················\
    ··················\
    ··········· ·············· 180 
    Configuring web user ac counts in batches ··················\
    ··················\
    ··················\
    ··················\
    ·············· ················ 181 
    Displaying and maintainin g cluster management ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    · 181 
    Cluster management co nfiguration example ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ···· 182 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  182 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 183 
    Configuring CWMP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 186 
    Hardware compatibility  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·················  186 
    CWMP overview ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·······················\
    ··················\
    ····· 186 
    CWMP network framework  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··  186 
    Basic CWMP functions ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ················ ··················\
    ··········· 187 
    CWMP mechanism ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···· ··················\
    ··········· 188 
    CWMP configura tion tasks ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ················· 191 
    Configuring the DHCP server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ········ 191 
    Configuring the  DNS server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········· 192 
    Configuring the ACS server ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ········· 192 
    Configuring CPEs ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ················ 192 
    Enabling CWMP ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ··················\
    ····· 192 
    Configuring the ACS attributes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······ ··················\
    ················· 193 
    Configuring the ACS URL ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ·········· 193 
    Configuring the ACS us ername and password ··················\
    ··················\
    ··················\
    ··················\
    ············· ·········· 193 
    Configuring CPE attributes ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ··················\
    ·· 194 
    Configuring the CPE username and password ··················\
    ··················\
    ··················\
    ··················\
    ············· ··········· 194 
    Configuring the CWMP  connection interface ··················\
    ··················\
    ··················\
    ··················\
    ············· ············· 194 
    Sending Inform messages  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·····  195 
    Configuring the maximum number of attempts made to retry a connection ··················\
    ··················\
    ·············  195 
    Configuring the close-wait timer of the CPE ··················\
    ··················\
    ··················\
    ··················\
    ··········· ··················\
     195 
    Configuring the CPE working mode  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ······  196 
    Specifying an SSL client policy for HTTPS connection to ACS ··················\
    ··················\
    ··················\
    ············· ···· 196 
    Displaying and maintaining CWMP  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··············  197 
    CWMP configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········· ··················\
    ············· 197 
    Configuration guidelines ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············ ··················\
    ············ 197 
    Network requirements  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  197 
    Configuration procedure ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··········· 198 
    Configuring a stack (available  only on the HP 5500  SI) ··················\
    ··················\
    ··················\
    ··················\
    ·············  206 
    Stack configuration task list ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ···········  206 
    Configuring the master device of a stack ··················\
    ··················\
    ··················\
    ··················\
    ·············· ··················\
    ·········· 206 
    Configuring a private IP a ddress pool for the stack ··················\
    ··················\
    ··················\
    ··················\
    ··· ············· 207 
    Configuring stack ports  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·········  207 
    Creating a stack ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ·· ··················\
    ··················\
     207 
    Configuring the stack ports of a member device  ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············  207 
    Logging in to the CLI of a member from the master ··················\
    ··················\
    ··················\
    ··················\
    ····· ··················\
    ·· 208 
    Displaying and maintainin g stack configuration ··················\
    ··················\
    ··················\
    ··················\
    ········ ··················\
    ···· 208  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide