Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							9 
    Using the command history function 
    The system can automatically save successfully executed commands to the command history buffer for 
    the current user interface. You can view them and execute them again, or set the maximum number of 
    commands that can be saved in the command history buffer. 
    A command is saved to the command history buffer in the exact format as it was entered. For example, 
    if you enter an incomplete command, the command saved in the command history buffer is also 
    incomplete; if you enter a command by using a co mmand keyword alias, the command saved in the 
    command history buffer also uses the alias. 
    If you enter a command in the same format repeated ly in succession, the system buffers the command 
    only once. If you enter a command repeatedly in di fferent formats, the system buffers each command 
    format. For example,  display cu and display current-configuration  are buffered as two entries but 
    successive repetitions of  display cu create only one entry in the buffer. 
    By default, the command history buffer can save up to 10 commands for each user. To set the capacity 
    of the command history buffer for the current user interface, use the  history-command max-size 
    command. 
    Viewing history commands 
    You can use arrow keys to access history command s in Windows 200x and Windows XP Terminal or 
    Telnet. In Windows 9x HyperTerminal, the arrow keys are invalid, and you must use  Ctrl+P and Ctrl+N  
    instead. 
    To view command history, use one of the following methods:  
     
    Task Command 
    Display all commands in the command history 
    buffer.  display history-command [ | 
    { begin |  exclude | include  } 
    regular-expression  ] 
    Display the previous history  command.  Up arrow key or  Ctrl+P 
    Display the next history co mmand.  Down arrow key or  Ctrl+N 
     
    Setting the command history buffer size for user interfaces  
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enter user interface view.  user-interface { 
    first-num1 
    [ last-num1  ] | { aux |  vty } 
    first-num2 [ last-num2  ] } N/A 
    3.
      Set the maximum number of 
    commands that can be saved 
    in the command history 
    buffer.  history-command
     max-size  
    size-value   Optional. 
    By default, the command history 
    buffer can save up to 10 
    commands. 
      
    						
    							10 
    Controlling the CLI output 
    This section describes the CLI output control features that help you quickly identify the desired output. 
    Pausing between screens of output 
    If the output being displayed is more than will fit on one screen, the system automatically pauses after 
    displaying a screen. By default, up to 24 lines can be displayed on a screen. To change the screen length, 
    use the  screen-length  screen-length  command. For more information about this command, see 
    Fundamentals Command Reference . To control output, use keys in Table 5. 
    Table 5  Keys for controlling output 
    Ke
    ys Function 
    Space   Displays the next screen. 
    Enter  Displays the next line. 
    Ctrl+C  Stops the display and canc els the command execution. 
     Displays the previous page. 
     Displays the next page. 
     
    To display all output at one time and refresh the scre en continuously until the last screen is displayed:  
    Task Command Remarks 
    Disable pausing between screens 
    of output for the current session. screen-length disable The default for a session depends on the setting 
    of the
     screen-length  command in user interface 
    view. The default of the  screen-length command 
    is pausing between screens of output and 
    displaying up to 24 lines on a screen. 
    This command is executed in user view, and 
    takes effect only for the current session. When 
    you relog in to the device, the default is restored. 
     
     
    Filtering the output from a display command 
    You can use one of the following methods to filter the output from a  display command: 
    •   Specify the  | {  begin  | exclude  | include  } regular-expression  option at the end of the command. 
    •   When the system pauses after displaying a screen of output, enter a forward slash (/), minus sign 
    (-), or plus sign (+) plus a regular expression to filter subsequent output. The forward slash equals the 
    keyword  begin, the minus sign equals the keyword  exclude, and the plus sign equals the keyword 
    include . 
    The following definitions apply to the  begin, exclude , and include  keywords: 
    •   begin —Displays the first line that matches the specified regular expression and all lines that follow. 
    •   exclude —Displays all lines that do not match the specified regular expression. 
    •   include —Displays all lines that match the specified regular expression. 
    A regular expression is a case-sensitive string of 1  to 256 characters that supports the special characters 
    in  Tabl e  6.  
    						
    							11 
    Table 6 Special characters supported in a regular expression 
    Character Meanin
    g Remarks 
    ^string  Starting sign. Matches a line that 
    starts with 
    string.  For example, regular expr
    ession ^user matches a 
    line beginning with user, not Auser. 
    string$  Ending sign. Matches a line that 
    ends with 
    string.  For example, regular expression user$ only 
    matches a line ending with user, not userA. 
    . Matches any single character, such 
    as a single character, a special 
    character, and a blank. 
    For example, .s matches both as and bs. 
    * Matches the preceding character or 
    character group zero or multiple 
    times.  For example, zo* matches z and zoo; 
    (zo)* matches zo and zozo.
     
    + Matches the preceding character or 
    character group one or multiple 
    times   For example, zo+ matches zo and zoo, but 
    not z.
     
    |  Matches the preceding or 
    succeeding character string  For example, def|int only matches a character 
    string containing def or int. 
    _ I f  i t  i s  a t  t h e  b e g i n n i n g  o r  t h e  e n d  o f  a  
    regular expression, it
     equals ^ or $. 
    In other cases, it equals comma, 
    space, round bracket, or curly 
    bracket.  For example, a_b matches a b or a(b; _ab 
    only matches a line starting with ab; ab_ only 
    matches a line ending with ab. 
    - 
    It connects two values (the smaller 
    one before it and the bigger one 
    after it) to indicate a range together 
    with [ ].  For example, 1-9 means 1 to 9 (inclusive); a-h 
    means a to h (inclusive). 
    [ ] 
    Matches a single character 
    contained within the brackets.  For example, [16A] matches a string containing 
    any character among 1, 6, and A; [1-36A] matches 
    a string containing any character among 1, 2, 3, 6, 
    and A (- is a hyphen). 
    ] can be matched as a common character only 
    when it is put at the beginning of characters within 
    the brackets, for example [ ]
    string]. There is no such 
    limit on [. 
    ( )  A character group. It is usually used 
    with + or *.  For example, (123A) means a character group 
    123A; 408(12)+ matches 40812 or 
    408121212. But it does not match 408. 
    \index Repeats the character string 
    specified by the index. A character 
    string refers to the string within () 
    before \. 
    index refers to the 
    sequence number (starting from 1 
    from left to right) of the character 
    group before \. If only one character 
    group appears before \,  index can 
    only be 1; if n character groups 
    appear before  index, index  can be 
    any integer from 1 to n.  For example, (
    string)\1 repeats  string, and a 
    matching string must contain  stringstring. 
    (string1 )(string2 )\2 repeats  string2, and a 
    matching string must contain  string1string2string2. 
    (string1 )(string2 )\1\2 repeats  string1 and string2 
    respectively, and a  matching string must contain 
    string1string2string1string2.   
    						
    							12 
    Character Meaning Remarks 
    [^] Matches a single character not 
    contained within the brackets.  For example, [^16A] means to match a string 
    containing any character except 1, 6 or A, and the 
    matching string can also contain 1, 6 or A, but 
    cannot contain only these three characters. For 
    example, [^16A] matches abc and m16, but 
    not 1, 16, or 16A. 
    \ matches word undo and 
    string abcdo. 
    \bcharacter2 Matches character1character2. 
    character1
     can be any character 
    except number, letter or underline, 
    and \b equals [^A-Za-z0-9_].  For example, \ba matches -a with - being
     
    character1,  and a being  character2, but it does 
    not match 2a or ba . 
    \Bcharacter  Matches a string containing 
    character
    , and no space is allowed 
    before  character.   For example, \Bt matches t in install, but not 
    t in big top. 
    character1\w Matches character1character2. 
    character2
     must be a number, letter, 
    or underline, and \ w equals 
    [A-Za-z0-9_].  For example, v\w matches 
    vlan (v is  
    character1  and l is character2 ) and ser vice ( i 
    is  character2 ).  
    \W Equals  \b.  For example, \Wa matches -a, with - being
     
    character1,  and a being  character2, but does not  
    match 2a or ba . 
      Escape character. If a special 
    character listed in this table follows 
    \, the specific meaning of the 
    character is removed.  For example, \\ matches a string containing \, 
    \^ matches a string containing ^, and \\b 
    matches a string containing \b. 
     
    The following are several regular expression examples: 
    # Use |
     begin  user-interface in the  display current-configuration  command to match the first line of 
    output that contains user-interface to the last line of output. 
     display current-configuration | begin user-interface 
    user-interface aux 0 
    user-interface vty 0 15 
     authentication-mode none 
     user privilege level 3 
    # 
    return 
    # Use | exclude Direct in the  display ip routing-table command to filter out direct routes and display only 
    the non -direct routes. 
     display ip routing-table | exclude Direct 
    Routing Tables: Public 
     
    Destination/Mask    Proto  Pre  Cost         NextHop         Interface 
     
    1.1.1.0/24          Static 60   0            192.168.0.0     Vlan1  
    						
    							13 
    # Use | include Vlan in the display ip routing-table command to filter in route entries that contain  Vlan. 
     display ip routing-table | include Vlan 
    Routing Tables: Public 
     
    Destination/Mask    Proto  Pre  Cost         NextHop         Interface 
     
    192.168.1.0/24      Direct 0    0            192.168.1.42    Vlan999 
    Configuring user privilege and command levels 
    To avoid unauthorized access, the device defines  the user privilege levels and command levels in Tabl e  
    7
    . User privilege levels correspond to command levels. A user who has been logged in with a specific 
    privilege level can use only the commands at that level or lower levels. 
    All commands are categorized into four levels: visit,  monitor, system, and manage, and are identified 
    from low to high, respectively by 0 through 3. 
    Table 7  Command levels and user privilege levels 
    Level Privile
    ge Default set of commands 
    0 Visit  Includes commands for network diagnosis 
    and commands for accessing an external 
    device. Configuration of commands at this level cannot survive a device restart. Upon 
    device restart, the commands at this leve l are restored to the default settings. 
    Commands at this level include  ping, tracert,  telnet and  ssh2. 
    1 Monitor  Includes commands for system maintenance 
    and service fault diagnosis. Commands at 
    this level are not saved after being configured . After the device is restarted, the commands 
    at this level are restored to the default settings. 
    Commands at this level include  debugging, terminal, refresh, and send . 
    2 System  Includes service configuration commands, including routing configuration commands and 
    commands for configuring services at different network levels. 
    By default, commands at this 
    level include all configuration commands except for those at 
    manage level. 
    3 Manage  Includes commands that influence the basi
    c operation of the system and commands for 
    configuring system support modules. 
    By default, commands at this level involve the configuration commands of file system, FTP, 
    TFTP, Xmodem download, user management, leve l setting, and parameter settings within 
    a system (which are not defined by any protocols or  RFCs). 
     
    Configuring a user privilege level 
    If the authentication mode on a user interface is  scheme, configure a user privilege level for users who 
    access the interface by using the AAA module or directly on the user interface. For SSH users who use 
    public-key authentication, the user privilege level configured directly on the user interface always takes 
    effect. For other users, the user privilege level configured in the AAA module has priority over the one 
    configured directly on the user interface. 
    If the authentication mode on a user interface is none or password, configure the user privilege level 
    directly on the user interface.  
    						
    							14 
    For more information about user login authentication, see Logging in to the CLI. For more information 
    a
    bout AAA and SSH, see  Security Configuration Guide .  
    Configuring a user privilege level for users by using the AAA module 
     
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enter user interface view.  user-interface { 
    first-num1 
    [ last-num1  ] | { aux |  vty } 
    first-num2 [ last-num2  ] }  N/A 
    3.
      Specify the scheme 
    authentication mode.  authentication-mode
     scheme   By default, the authentication 
    mode for VTY users is 
    password, 
    and no authentication is needed 
    for AUX users. 
    4.   Return to system view. 
    quit  N/A 
    5.  Configure the authentication 
    mode for SSH users as  
    password .  For more information, see Security 
    Configuration Guide.  This task is required only for SSH 
    users who are required to provide 
    their usernames and passwords for 
    authentication.
     
    6.  Configure the user privilege 
    level by using the AAA 
    module. 
    • To use local authentication: 
    a.  Use the  local-user 
    command to create a 
    local user and enter local 
    user view. 
    b.  Use the  level keyword in 
    the 
    authorization-attribute 
    command to configure the 
    user privilege level. 
    •  To use remote authentication 
    (RADIUS or HWTACACS): 
    Configure the user privilege 
    level on the authentication 
    server  User either approach. 
    For local authentication, if you do 
    not configure the user privilege 
    level, the user privilege level is 0. 
    For remote authentication, if you 
    do not configure the user privilege 
    level, the user privilege level 
    depends on the default 
    configuration of the authentication 
    server. 
    For more information about the 
    local-user and 
    authorization-attribute
     commands, 
    see  Security Command Reference .
     
     
    For example: 
    # Configure the device to use local authentication for Telnet users on VTY 1 and set the user privilege 
    level to 3. 
     system-view 
    [Sysname] user-interface vty 1 
    [Sysname-ui-vty1] authentication-mode scheme 
    [Sysname-ui-vty1] quit 
    [Sysname] local-user test 
    [Sysname-luser-test] password simple 123 
    [Sysname-luser-test] service-type telnet 
    When users Telnet to the device through VTY 1, they must enter username  test and password  12 3 4 5 6 7 8. 
    After passing the authentication, the users can only use level-0 commands of level 0. 
    # Assign commands of levels 0 through 3 to the users.  
    						
    							15 
    [Sysname-luser-test] authorization-attribute level 3 
    Configuring the user privilege level directly on a user interface 
    To configure the user privilege level directly on a user interface that uses the scheme authentication mode:  
    Step Command Remarks 
    1.  Configure the authentication 
    type for SSH users as 
    publickey .  For more information, see Security 
    Configuration Guide
    . Required only for SSH users who 
    use public-key authentication. 
    2.
      Enter system view. 
    system-view  N/A 
    3.  Enter user interface view.  user-interface { 
    first-num1 
    [ last-num1  ] | vty first-num2 
    [ last-num2  ] }  N/A 
    4.
      Enable the scheme 
    authentication mode.  authentication-mode
     scheme    By default, the authentication 
    mode for VTY users is
     password, 
    and no authentication is needed 
    for AUX users. 
    5.   Configure the user privilege 
    level.   user privilege level
     level   By default, the user privilege level 
    for users logged in through the 
    AUX user interface is 3, and that 
    for users logged in through the 
    other user interfaces is 0.
     
     
    To configure the user privilege level directly on a user interface that uses the  none or password  
    authentication mode: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter user interface view.  user-interface { 
    first-num1 
    [ last-num1  ] | { aux |  vty } 
    first-num2 [ last-num2  ] }  N/A 
    3.
      Configure the authentication 
    mode for any user who uses 
    the current user interface to 
    log in to the device.  authentication-mode
     { none | 
    password  }  Optional. 
    By default, the authentication 
    mode for VTY user interfaces is
     
    password , and no authentication is 
    needed for AUX users. 
    4.   Configure the privilege level 
    of users logged in through the 
    current user interface.  user privilege level
     level   Optional. 
    By default, the user privilege level 
    for users logged in through the 
    AUX user interface is 3, and that 
    for users logged in through the 
    other user interfaces is 0.
     
     
    For example: 
    # Display the commands a Telnet user can use by default after login.  
     ? 
    User view commands: 
      display  Display current system information  
    						
    							16 
      ping     Ping function 
      quit     Exit from current command view 
      rsh      Establish one RSH connection 
      ssh2     Establish a secure shell client connection 
      super    Set the current user priority level 
      telnet   Establish one TELNET connection 
      tftp     Open TFTP connection 
      tracert  Trace route function 
    # Configure the device to perform no authentication for Telnet users, and to authorize authenticated 
    Telnet users to use level-0 and level-1 commands. (Use no authentication mode only in a secure network 
    environment.) 
     system-view 
    [Sysname] user-interface vty 0 15 
    [Sysname-ui-vty0-15] authentication-mode none 
    [Sysname-ui-vty0-15] user privilege level 1 
    # Display the commands a Telnet user can use after login. Because the user privilege level is 1, a Telnet 
    user can use more commands now. 
     ? 
    User view commands: 
      debugging      Enable system debugging functions 
      dialer         Dialer disconnect 
      display        Display current system information 
      ping           Ping function 
      quit           Exit from current command view 
      refresh        Do soft reset 
      reset          Reset operation 
      rsh            Establish one RSH connection 
      screen-length  Specify the lines displayed on one screen 
      send           Send information to other user terminal interface 
      ssh2           Establish a secure shell client connection 
      super          Set the current user priority level 
      telnet         Establish one TELNET connection 
      terminal       Set the terminal line characteristics 
      tftp           Open TFTP connection 
      tracert        Trace route function 
      undo           Cancel current setting 
    # Configure the device to perform password authentication for Telnet users, and to authorize 
    authenticated Telnet users to use the commands of privilege levels 0, 1, and 2. 
     system-view 
    [Sysname] user-interface vty 0 15 
    [Sysname-ui-vty0-15] authentication-mode password 
    [Sysname-ui-vty0-15] set authentication password simple 123 
    [Sysname-ui-vty0-15] user privilege level 2 
    After the configuration is complete, when users Telnet to the device, they must enter the password 
    12 3 4 5 6 7 8. After passing authentication, they can use commands of levels 0, 1, and 2.  
    						
    							17 
    Switching the user privilege level 
    Users can switch to a different user privilege level without logging out and terminating the current 
    connection. After the privilege level switching, users can continue to manage the device without 
    relogging in, but the commands they can execute have changed. For example, with the user privilege 
    level 3, a user can configure system parameters. After switching to user privilege level 0, the user can 
    execute only basic commands like  ping and  tracert  and use a few  display commands. The switching 
    operation is effective for the current login. After the user relogs in, the user privilege restores to the 
    original level. 
    To avoid problems, HP recommends that administrators log in with a lower privilege level to view switch 
    operating parameters, and switch to a higher level temporarily only when they must maintain the device. 
    When an administrator must leave for a while or as k someone else to manage the device temporarily, 
    they can switch to a lower privilege level before they leave to restrict the operation by others. 
    Configuring the authentication parameters for user privilege level switching 
    A user can switch to a privilege level equal to or lower than the current one unconditionally and is not 
    required to enter a password (if any). 
    For security, a user is required to enter a password  (if any) to switch to a higher privilege level. The 
    authentication falls into one of the following categories: 
     
    Keywords  Authentication 
    mode Description 
    local  Local password 
    authentication 
    only (local-only)
     The device authenticates a user by using the privilege level 
    switching password entered by the user. 
    To use this mode, you must set the password for privilege level 
    switching by using the super password 
    command. 
    scheme Remote AAA 
    authentication 
    through 
    HWTACACS or 
    RADIUS
      The device sends the username and password for privilege level 
    switching to the HWTACACS or RADIUS server for remote 
    authentication. 
    To use this mode, you must perform the following configuration 
    tasks: •
     Configure the required HWTACACS or RADIUS schemes and 
    configure the ISP domain to use the schemes for users. For more 
    information, see  Security Configuration Guide . 
    • Add user accounts and specify the user passwords on the 
    HWTACACS or RADIUS server. 
    local scheme  Local password 
    authentication first 
    and then remote 
    AAA 
    authentication The device authenticates a user by
     using the local password first, 
    and if no password for privilege level switching is set, for the user 
    logged in to the AUX user interface, the privilege level is switched 
    directly; for VTY users, AAA authentication is performed. 
    scheme local  Remote AAA 
    authentication first 
    and then local 
    password 
    authentication
     AAA authentication is performed first, and if the remote 
    HWTACACS or RADIUS server does not respond or AAA 
    configuration on the device is invalid, the local password 
    authentication is performed. 
     
    To configure the authentication parameters for a user privilege level:   
    						
    							18 
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Set the authentication mode 
    for user privilege level 
    switching.  super authentication-mode 
    { local 
    |  scheme  } *   Optional. 
    By default, local-only 
    authentication is used. 
    3.
      Configure the password for a 
    user privilege level.  super password 
    [ level user-level  ] 
    {  cipher  | simple }  password  Required for loca
    l authentication. 
    By default, a privilege level has no 
    password. 
    If no user privilege level is specified 
    when you configure the command, 
    the user privilege level defaults to 
    3.  
     
    If local-only authentication is used, an AUX user inte rface user (a user logged in through the console port) 
    can switch to a higher privilege level even if the privilege level has not been assigned a password. 
    Switching to a higher user privilege level 
    Before you switch to a higher user privilege level,  obtain the required authentication data as described 
    in  Tabl e  8 .  
    T
    
    he privilege level switching fails after three consecutive unsuccessful password attempts. 
    To switch the user privilege level, perform the following task in user view: 
     
    Task Command Remarks 
    Switch the user privilege level.  super [ level ]  When logging in to the device, a 
    user has a user privilege level, 
    which depends on user interface or 
    authentication user level.
     
     
    Table 8 Information required for user privilege level switching 
    User interface 
    authentication 
    mode  User privilege level 
    switching 
    authentication 
    mode  Information required for 
    the first authentication 
    mode 
    Information required for the 
    second authentication mode 
    none/password local 
    Password configured on the 
    device with the 
    super 
    password  command for the 
    privilege level  N/A local 
    scheme  Password configured on the 
    device with the 
    super 
    password  command for the 
    privilege level  Username and password 
    configured on the AAA server for 
    the privilege level 
    scheme 
    Username and password for 
    the privilege level  
    N/A 
    scheme
     local    Username and password for 
    the privilege level   Local user privilege level 
    switching password  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide