Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 50 
    Displaying and maintaining information center 
     
    Task Command Remarks 
    Display the information about 
    information channels. display channel [ channel
    -number  | 
    channel- name ] [  | { begin  | exclude | include  } 
    regular-expression  ]  Available in any view 
    Display the information about each 
    output destination.  display info-center [ |
     { begin | exclude  | 
    include  } regular-expression ]  Available in any view 
    Display the state of the log buffer 
    and the log information recorded. display logbuffer
     [ reverse ] [ level severity  | 
    size  buffersize  | slot slot-number  ] * [ | { begin  | 
    exclude  | include  } regular-expression  ] Available in any view 
    Display a summary of the log 
    buffer.  display logbuffer summary 
    [ level  severity  | slot  
    slot-number  ] * [ | { begin | exclude  | include } 
    regular-expression  ]  Available in any view 
    Display the state of the trap buffer 
    and the trap information recorded.  display trapbuffer [ reverse
     ] [ size  buffersize  ] 
    [ |  { begin |  exclude | include } 
    regular-expression  ]   Available in any view 
    Reset the log buffer. 
    reset logbuffer  Available in user view 
    Reset the trap buffer. reset trapbuffer  Available in user view 
     
    Information center configuration examples 
    Outputting log information to a UNIX log host 
    Network requirements 
    Configure the device to send ARP and IP log information that has a severity level of at least informational 
    to the UNIX log host at 1.2.0.1/16. 
    Figure 18 Network diagram 
     
     
    Configuration procedure 
    Before the configuration, make sure that the device and the log host can reach each other.  
    1. Configure the device: 
    # Enable the information center. 
     system-view 
    [Sysname] info-center enable 
    # Specify the host 1.2.0.1/16 as the log host. Use channel  loghost to output log information 
    (optional,  loghost by default), and use  local4 as the logging facility. 
    [Sysname] info-center loghost 1.2.0.1 channel loghost facility local4 
    # Disable the output of log, trap, and debu gging information of all modules on channel  loghost.  
    						
    							 51 
    [Sysname] info-center source default channel loghost debug state off log\
     state off 
    trap state off 
    To avoid outputting unnecessary information, disable the output of log, trap, and debugging 
    information on the specified channel ( loghost in this example) before you configure an output rule. 
    # Configure an output rule to outp ut to the log host ARP and IP log information that has a severity 
    level of at least informational . (The source modules that are allowed to output information depend 
    on the switch model.) 
    [Sysname] info-center source arp channel loghost log level informational\
     state on 
    [Sysname] info-center source ip channel loghost log level informational \
    state on 
    2.  Configure the log host: 
    The following configurations were performed on  SunOS 4.0 which has similar configurations to 
    the UNIX operating systems implemented by other vendors. 
    a.  Log in to the log host as a root user. 
    b. Create a subdirectory named  Device in directory  /var/log/, and then create file  info.log in the 
    Device  directory to save logs from  Device. 
    # mkdir /var/log/Device 
    # touch /var/log/Device/info.log 
    c. Edit the file  /etc/syslog.conf  and add the following contents. 
    # Device configuration messages 
    local4.info    /var/log/Device/info.log 
    In this configuration,  local4 is the name of the logging facility  that the log host uses to receive 
    logs. info  is the information level. The UNIX system records the log information that has a 
    severity of at least  informational to the file  /var/log/Device/info.log . 
     
     NOTE: 
    Be aware of the following issues while editing the file  /etc/syslog.conf: 
    •   Comments must be on a separate line and must begin with a pound sign (#). 
    •   No redundant spaces are allowed after the file name. 
    •   The logging facility name and the information level specified in the  /etc/syslog.conf file must be 
    identical to those configured on the device using the  info-center loghost  and info-center source  
    commands. Otherwise the log information might not be output properly to the log host. 
     
    d.  Display the process ID of  syslogd, kill the  syslogd process and then restart syslogd  using the –r 
    option to make the modified  configuration take effect. 
    # ps -ae | grep syslogd 
    147 
    # kill -HUP 147 
    # syslogd -r & 
    Now, the system can record log information into the log file. 
    Outputting log information to a Linux log host 
    Network requirements 
    Configure the device to send log information that has a severity level of at least informational to the Linux 
    log host at 1.2.0.1/16.  
    						
    							 52 
    Figure 19 Network diagram 
     
     
    Configuration procedure 
    Before the configuration, make sure that the device and the PC can reach each other. 
    1. Configure the device: 
    # Enable the information center. 
     system-view 
    [Sysname] info-center enable 
    # Specify the host 1.2.0.1/16 as the log host. Use the channel  loghost to output log information 
    (optional,  loghost by default), and use  local5 as the logging facility. 
    [Sysname] info-center loghost 1.2.0.1 channel loghost facility local5 
    # Disable the output of log, trap, and debu gging information of all modules on channel  loghost. 
    [Sysname] info-center source default channel loghost debug state off log\
     state off 
    trap state off 
    To avoid outputting unnecessary information, di sable the output of log, trap, and debugging 
    information on the specified channel ( loghost in this example) before you configure an output rule. 
    # Configure an output rule to output to the log host the log information that has a severity level of 
    at least  informational . 
    [Sysname] info-center source default channel loghost log level informati\
    onal state 
    on 
    2. Configure the log host: 
    a. Log in to the log host as a root user. 
    b. Create a subdirectory named  Device in directory  /var/log/, and create file  info.log in the 
    Device  directory to save logs of  Device. 
    # mkdir /var/log/Device 
    # touch /var/log/Device/info.log 
    c. Edit the file  /etc/syslog.conf  and add the following contents. 
    # Device configuration messages 
    local5.info    /var/log/Device/info.log 
    In this configuration, local5  is the name of the logging facility that the log host uses to receive lo\
    gs. 
    The information level is  info. The Linux system records the log information that has a severity level 
    of at least  informational  to the file /var/log/Device/info.log . 
     
     NOTE: 
    Be aware of the following issues while editing the file  /etc/syslog.conf: 
    •   Comments must be on a separate line and must begin with a pound sign (#). 
    •   No redundant spaces are allowed after the file name. 
    •   The logging facility name and the information level specified in the  /etc/syslog.conf file must be 
    identical to those configured on the device using the  info-center loghost  and info-center source  
    commands. Otherwise the log information may not be output properly to the log host. 
      
    						
    							 53 
    d.
     
    Display the process ID of syslogd , kill the syslogd process, and restart  syslogd using the  -r 
    option to make the modified  configuration take effect. 
    # ps -ae | grep syslogd 
    147 
    # kill -9 147 
    # syslogd -r & 
    Make sure that the syslogd process is started with the -r option on the Linux log host. 
    Now, the system can record log information into the log file. 
    Outputting log information to the console  
    Network requirements 
    Configure the device to send ARP and IP log informatio n that has a severity level of at least Informational 
    to the console. 
    Figure 20  Network diagram 
     
     
    Configuration procedure 
    # Enable the information center. 
     system-view 
    [Sysname] info-center enable 
    # Use channel console to output log information to the console. (This step is optional because it is the 
    default setting). 
    [Sysname] info-center console channel console 
    # Disable the output of log, trap, and debugging information of all modules on channel  console. 
    [Sysname] info-center source default channel console debug state off log\
     state off trap 
    state off 
    To avoid outputting unnecessary information, disable  the output of log, trap, and debugging information 
    of all modules on the specified channel ( console in this example), and then configure the output rule as 
    needed. 
    # Configure an output rule to output to the console ARP and IP log information that has a severity level 
    of at least  informational . (The source modules that are allowed to output information depend on the 
    switch model.) 
    [Sysname] info-center source arp channel console log level informational\
     state on 
    [Sysname] info-center source ip channel console log level informational \
    state on 
    [Sysname] quit 
    # Enable the display of log information on a terminal . (Optional, this function is enabled by default.) 
     terminal monitor 
    Info: Current terminal monitor is on. 
     terminal logging 
    Info: Current terminal logging is on.  
    						
    							 54 
    Now, if the ARP and IP modules generate log information, the information center automatically sends the 
    log information to the console. 
    Saving security logs into the security log file 
    Network requirements 
    •   Save security logs into the security log file  Flash:/securitylog/seclog.log every one hour. 
    •   Only the security log administrator can view the contents of the security log file. No other users 
    cannot view, copy, or rename the security log file. 
    Figure 21  Network diagram 
     
     
     
    Configuration considerations 
    The configuration in this example includes two parts: 
    1.  Log in to the device as the system administrator: 
    {  Enable saving the securit y logs into the securit y log file and set the saving inter val to one hour. 
    { Create a local user seclog  with the password 12 312 312 312 3 , and authorize this user as the 
    security log administrator. That is, use the  authorization-attribute command to set the user 
    privilege level to 3 and specify the user role as security audit. In addition, specify the service 
    types that the user can use by using  service-type. 
    { Set the authentication mode to  scheme for the user logging in to the device, and make sure that 
    only the local user that has passed the AAA local authentication can view and perform 
    operations on the security log file. 
    2.  Log in to the device as the security log administrator: 
    {  Set the directory for saving the security log file to  Flash:/securitylog/seclog.log. 
    { View the contents of the security log file to learn the security status of the device. 
    Configuration procedure 
    1. Configuration performed by the system administrator: 
    # Enable saving security logs into the security lo g file and set the saving interval to one hour. 
     system-view 
    System
    administrator
    ConsoleDevice
    IP network
    Security log 
    administrator
    FTP Server192.168.1.2/24
    1.1.1.1/24 192.168.1.1/24 
    						
    							 55 
    [Sysname] info-center security-logfile enable 
    [Sysname] info-center security-logfile frequency 3600 
    # Create a local user seclog, and configure the password for the user as  123123123123. 
    [Sysname] local-user seclog 
    New local user added. 
    [Sysname-luser-seclog] password simple 123123123123 
    # Authorize the user to mana ge the security log file. 
    [Sysname-luser-seclog] authorization-attribute level 3 user-role securit\
    y-audit 
    # Authorize the user to use SSH, Telnet, and terminal services. 
    [Sysname-luser-seclog] service-type ssh telnet terminal 
    [Sysname-luser-seclog] quit 
    # According to the network plan, the user logs in  to the device through SSH or Telnet, so configure 
    the authentication mode of  the VTY user interface as scheme. 
    [Sysname] display user-interface vty ? 
      INTEGER Specify one user terminal interface 
    The output shows that the device supports sixteen VTY user interfaces, which are numbered 0 
    through 15. 
    [Sysname] user-interface vty 0 15 
    [Sysname-ui-vty0-15] authentication-mode scheme 
    [Sysname-ui-vty0-15] quit 
    2. Configuration performed by th e security log administrator: 
    # Log in to the device as user  seclog. 
    C:/> telnet 1.1.1.1 
    ************************************************************************\
    ****** 
    * Copyright (c) 2010-2012 Hewlett-Packard Development Company, L.P.   \
           * 
    * Without the owners prior written consent,                            \
         * 
    * no decompiling or reverse-engineering shall be allowed.               \
         * 
    ************************************************************************\
    ****** 
     
     
    Login authentication 
     
     
    Username:seclog 
    Password: 
     
    # Display the summary of the security log file. 
     display security-logfile summary 
      Security-log is enabled. 
      Security-log file size quota: 1MB 
      Security-log file directory: flash:/seclog 
      Alarm-threshold: 80% 
      Current usage: 0% 
      Writing frequency: 1 hour 0 min 0 sec 
    The output shows that the directory fo r saving the security log file is flash:/seclog. 
    # Change the directory where the security log file is saved to  Flash:/securitylog.  
    						
    							 56 
     mkdir securitylog 
    . 
    %Created dir flash:/securitylog. 
     info-center security-logfile switch-directory flash:/securityl\
    og/ 
    # Display the contents of the security log file buffer. 
     display security-logfile buffer 
    %@175 Nov  2 17:02:53:766 2011 Sysname SHELL/4/LOGOUT: 
     Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2: logout from Console 
    %@176 Nov  2 17:02:53:766 2011 Sysname SHELL/5/SHELL_LOGOUT:Console logg\
    ed out from 
    aux0. 
    The content of other logs is not shown. 
    The preceding information indicates that there is st ill new content in the buffer that has not been 
    saved into the security log file. 
    # Manually save the contents of the security  log file buffer into the security log file. 
     security-logfile save 
    Info: Save all the contents in the security log buffer into file 
    flash:/securitylog/seclog.log successfully. 
    # Display the contents of the security log file. 
     more securitylog/seclog.log 
    %@157 Nov  2 16:12:01:750 2011 Sysname SHELL/4/LOGIN: 
     Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console 
    %@158 Nov  2 16:12:01:750 2011 Sysname SHELL/5/SHELL_LOGIN:Console logge\
    d in from 
    aux0. 
    The content of other logs is not shown.   
    						
    							 57 
    Configuring SNMP 
    T h i s  c h a p t e r  p r o vi d e s  a n  o v e r v i e w  o f  t h e  S i m p l e  N e t w o r k  M a n a g e m e n t  P r o t o c o l  ( S N M P )  a n d  g u i d e s  yo u  
    through the configuration procedure. 
    Overview 
    SNMP is an Internet standard protocol widely used for a management station to access and operate the 
    devices on a network, regardless of their vendors, ph ysical characteristics and interconnect technologies. 
    SNMP enables network administrators to read and set the variables on managed devices for state 
    monitoring, troubleshooting, statistics co llection, and other management purposes. 
    SNMP framework 
    The SNMP framework comprises the following elements: 
    •  SNMP manager —Works on an NMS to monitor and manage the SNMP-capable devices in the 
    network. 
    •   SNMP agent —Works on a managed device to receive and handle requests from the NMS, and 
    send traps to the NMS when some events, su ch as an interface state change, occur. 
    •   Management Information Base (MIB) —Specifies the variables (for example, interface status and 
    CPU usage) maintained by the SNMP agen t for the SNMP manager to read and set. 
    Figure 22  Relationship between an NMS, agent and MIB 
     
     
    MIB and view-based MIB access control 
    A MIB stores variables called nodes or objects in a tree hierarchy and identifies each node with a 
    u n iqu e  O I D.  An  O I D  i s  a  s t ri n g  of  nu m b e rs  t h a t  d e sc ribes the path from the root node to a leaf node. For 
    example, object B in  Figure 23 is u
     niquely identified by the OID {1.2.1.1}. 
    Figure 23  MIB tree 
     
      
    						
    							 58 
    A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and 
    is identified by a view name. The MIB objects included in the MIB view are accessible while those 
    excluded from the MIB view are inaccessible.  
    A MIB view can have multiple view records each identified by a  view-name oid-tree pair. 
    You control access to the MIB by assigning MIB views to SNMP groups or communities. 
    SNMP operations 
    SNMP provides the following basic operations: 
    •   Get—The NMS retrieves SNMP object nodes in an agent MIB. 
    •   Set—The NMS modifies the value of an object node in an agent MIB. 
    •   Notifications —Includes traps and informs. SNMP agent sends traps or informs to report events to 
    the NMS. The difference between these two types of notification is that informs require 
    acknowledgement but traps do not. The device supports only traps. 
    SNMP protocol versions 
    HP supports SNMPv1, SNMPv2c, and SNMPv3. An NMS and an SNMP agent must use the same 
    SNMP version to communicate with each other. 
    •   SNMPv1 —Uses community names for authentication. To access an SNMP agent, an NMS must use 
    the same community name as set on the SNMP agen t. If the community name used by the NMS is 
    different from that set on the agent, the NMS cann ot establish an SNMP session to access the agent 
    or receive traps from the agent. 
    •   SNMPv2c —Uses community names for authentication. SNMPv2c is compatible with SNMPv1, but 
    supports more operation modes, data types, and error codes. 
    •   SNMPv3 —Uses a user-based security model (USM) to secure SNMP communication. You can 
    configure authentication and privacy mechanisms  to authenticate and encrypt SNMP packets for 
    integrity, authenticity, and confidentiality. 
    SNMP configuration task list 
     
    Task Remarks 
    Configuring SNMP basic parameters  Required 
    Switching the NM-specific interface index Optional 
    Configuring SNMP logging  Optional 
    Configuring SNMP traps Optional 
     
    Configuring SNMP basic parameters 
    SNMPv3 differs from SNMPv1 and SNMPv2c in many ways. Their configuration procedures are 
    described in separate sections. 
    Configuring SNMPv3 basic parameters   
    						
    							 59 
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enable the SNMP agent. 
    snmp-agent  Optional. 
    By default, the SNMP agent is 
    disabled. 
    You can also enable the SNMP 
    agent by using any command that 
    begins with snmp-agent except the 
    snmp-agent calculate-password
     
    and  snmp-agent ifmib long-ifindex 
    enable  commands. 
    3.  Configure system information 
    for the SNMP agent.  snmp-agent sys-info
     { contact 
    sys-contact |  location sys-location  
    |  version  { all  | {  v1  | v2c  | 
    v3  }*  } }  Optional. 
    By default, the contact information 
    is 
    Hewlett-Packard Development 
    Company, L.P , the location 
    information is null, and the 
    protocol version is  SNMPv3. 
    4.  Configure the local engine ID.  snmp-agent local-engineid
     
    engineid   Optional. 
    The default local engine ID is the 
    company ID plus the device ID. 
    After you change the local engine 
    ID, the existing SNMPv3 users 
    become invalid, and you must 
    re-create the SNMPv3 users. 
    5.
      Create or update a MIB view.  snmp-agent mib-view
     { excluded | 
    included  } view -name  oid -tree 
    [ mask  mask-value  ]  Optional. 
    By default, the MIB view 
    ViewDefault is predefined and its 
    OID is 1. 
    Each 
    view-name oid-tree  pair 
    represents a view record. If you 
    specify the same record with 
    different MIB subtree masks 
    multiple times, the last 
    configuration takes effect. Except 
    the four subtrees in the default MIB 
    view, you can create up to 16 
    unique MIB view records. 
    6.   Configure an SNMPv3 group.  snmp-agent group
     v3  group-name  
    [  authentication  | privacy  ] 
    [ read-view  read-view ] 
    [ write-view  write-view ] 
    [ notify-view  notify-view  ] [ acl 
    acl-number  | acl ipv6 
    ipv6-acl-number  ] *  By default, no SNMP group exists. 
    7.
      Convert a plaintext key to a 
    ciphertext (encrypted) key.  snmp-agent calculate-password
     
    plain-password  mode { 3desmd5  | 
    3dessha  | md5  | sha } 
    {  local-engineid | 
    specified-engineid  engineid }  Optional.  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide