Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 49 
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enter AUX user 
    interface view.  user-interface aux 
    first-number  
    [ last-number  ]  N/A 
    3.
      Enable scheme 
    authentication.  authentication-mode
     scheme  Whether local, RADIUS, or HWTACACS 
    authentication is adopted depends on 
    the configured AAA scheme. 
    By default, no authentication is 
    performed for modem dial-in users. 
    4.
      Enable command 
    authorization.  command authorization  Optional. 
    By default, command authorization is 
    disabled. The commands available for a 
    user only depend on the user privilege 
    level.  
    If command authorization is enabled, a 
    command is available only if the user has 
    the commensurate user privilege level 
    and is authorized to use the command by 
    the AAA scheme. 
    5.
      Enable command 
    accounting.  command accounting  Optional. 
    By default, command accounting is 
    disabled. The accounting server does not 
    record the commands executed by users.
     
    Command accounting allows the 
    HWTACACS server to record all 
    executed commands that are supported 
    by the device, regardless of the 
    command execution result. This function 
    helps control and monitor user behaviors 
    on the device. If command accounting is 
    enabled and command authorization is 
    not enabled, every executed command is 
    recorded on the HWTACACS server. If 
    both command accounting and 
    command authorization are enabled, 
    only the authorized and executed 
    commands are recorded on the 
    HWTACACS server. 
    6.
      Exit to system view. 
    quit  N/A  
    						
    							 50 
    Step Command Remarks 
    7.  Apply an AAA 
    authentication scheme 
    to the intended 
    domain.  1.
      Enter the ISP domain view:   
    domain  domain-name   
    2.   Apply the specified AAA 
    scheme to the domain:  
    authentication default  
    {  hwtacacs-scheme  
    hwtacacs-scheme -name  
    [ local ] |  local | none  |  
    radius-scheme  
    radius-scheme -name  [ local ] } 
     
    3.  Exit to system view:  
    quit   Optional. 
    By default, local authentication is used. 
     
    For local authentication, configure local 
    user accounts.  
    For RADIUS or HWTACACS 
    authentication, configure the RADIUS or 
    HWTACACS scheme on the device and 
    configure authentication settings 
    (including the username and password) 
    on the server.  
    For more information about AAA 
    configuration, see 
    Security Configuration 
    Guide . 
    8.  Create a local user 
    and enter local user 
    view.  local-user 
    user-name  By default, no local user exists. 
    9.  Set a password for the 
    local user.  password
     { cipher | simple  } 
    password   By default, no password is set. 
    10.
     Specify the command 
    level of the local user.  authorization-attribute level 
    level Optional. 
    By default, the command level is 0. 
    11.
     Specify terminal 
    service for the local 
    user.  service-type
     terminal    By default, no service type is specified. 
    12. Configure common 
    settings for the AUX 
    user interfaces.  See 
    Configuring common settings 
    for modem di al-in (optional) . Optional. 
     
    The next time you attempt to dial in to the device, you must provide the configured username and 
    password, as shown in 
    Figure 26.  
    						
    							 51 
    Figure 26 Scheme authentication interface for modem dial-in users 
     
     
    Configuring common settings for modem dial-in (optional)  
     CAUTION: 
    To avoid packet loss, make sure the speed of the cons
    ole port is lower than the transmission rate of the 
    modem. 
     
    Some common settings configured for an AUX user in terface take effect immediately and can interrupt 
    the login session. To save you the trouble of repeat ed re-logins, use a login method different from AUX 
    login to log in to the device before you change AUX user interface settings.  
    After the configuration is complete, change the termin al settings on the configuration terminal and make 
    sure they are the same as the settings on the device. 
    To configure common AUX user interface  settings for modem dial-in accesses: 
     
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Enable copyright information 
    display.  copyright-info
     enable  By default, copyright information 
    display is enabled. 
    3.
      Enter one or more AUX user 
    interface views.  user-interface aux 
    first-number  
    [ last-number  ]  N/A 
    4.
      Configure the baud rate. 
    speed speed-value  By default, the baud rate is 9600 
    bps. 
    5.
      Configure the parity check 
    mode.  parity { even
     | none  | odd  }  The default setting is 
    none, namely, 
    no parity check.  
    						
    							 52 
    Step Command Remarks 
    6.  Configure the number of stop 
    bits.  stopbits 
    { 1  |  1.5  | 2 }  The default is 1. 
    Stop bits indicate the end of a 
    character. The more the bits, the 
    slower the transmission. 
    7.
      Configure the number of data 
    bits in each character.  databits
     { 7  | 8  }  By default, the number of data bits in 
    each character is 8. 
    The setting depends on the 
    character coding type. For example, 
    you can set it to 7 if standard ASCII 
    characters are to be sent, and set it 
    to 8 if extended ASCII characters 
    are to be sent. 
    8.
      Define a shortcut key for 
    starting a session.  activation-key 
    character  By default, press 
    Enter to start a 
    session. 
    9.   Define a shortcut key for 
    terminating tasks.  escape-key
     { default | character } By default, press Ctrl+C  to terminate 
    a task. 
    10.  Configure the flow control 
    mode.  flow-control 
    { hardware |  none | 
    software }   By default , the flow control mode is 
    none
    . 
    The device supports only the  none 
    mode. 
    11.  Specify the terminal display 
    type.  terminal type 
    { ansi | vt100  } By default, the terminal display type 
    is ANSI. 
    The device supports two terminal 
    display types: ANSI and VT100. HP 
    recommends setting the display type 
    to VT100 for both the device and the 
    client. If the device and the client use 
    different display types or both use 
    the ANSI display type, when the 
    total number of characters of a 
    command line exceeds 80, the 
    screen display on the terminal might 
    be abnormal. For example, the 
    cursor might be displayed at a 
    wrong place. 
    12.
     Configure the user privilege 
    level for login users.  user privilege level 
    level  3 by default. 
    13. Set the maximum number of 
    lines to be displayed on a 
    screen.  screen-length 
    screen-length By default, a screen displays 24 
    lines at most. 
    A value of 0 disables the function. 
    14.
     Set the size of the command 
    history buffer.  history-command max-size 
    value By default, the buffer saves 10 
    history commands at most.  
    						
    							 53 
    Step Command Remarks 
    15. Set the idle-timeout timer. 
    idle-timeout minutes [  seconds  ]   The default idle-timeout is 10 
    minutes. The system automatically 
    terminates the user’s connection if 
    there is no information interaction 
    between the device and the user 
    within the idle-timeout time. 
    Setting idle-timeout to 0 disables the 
    timer. 
     
    Displaying and maintaining CLI login 
     
    Task Command Remarks 
    Display information about the user 
    interfaces that are being used. 
    display users
     [ | { begin |  exclude 
    |  include  } regular-expression  ] Available in any view. 
    Display information about all user 
    interfaces the device supports.  display users all
     [ | { begin | 
    exclude  | include  } 
    regular-expression  ]  Available in any view. 
    Display user interface information.  display user-interface
     [ num1  | 
    {  aux  | vty  } num2  ] [ summary  ] [ | 
    {  begin |  exclude  | include  } 
    regular-expression  ] Available in any view. 
    Display the configuration of the 
    device when it serves as a Telnet 
    client.  display telnet client configuration 
    [ | 
    { begin |  exclude | include  } 
    regular-expression  ]  Available in any view. 
    Release a user interface. 
    free user-interface
     {  num1  | { aux  | 
    vty  } num2  }  Available in user view. 
    Multiple users can log in to the 
    system to simultaneously configure 
    the device. You can execute the 
    command to release the 
    connections established on the 
    specified user interfaces. 
    You cannot use this command to 
    release the connection you are 
    using. 
    Lock the current user interface. 
    lock  Available in user view. 
    By default, the current user 
    interface is not locked. 
    Send messages to the specified 
    user interfaces. 
    send 
    { all  | num1 | { aux  | vty  } 
    num2 }   Available in user view.  
    						
    							 54 
    Logging in to the Web interface 
    The device provides a built-in Web server for you to configure the device through a Web browser. Web 
    login is by default disabled.  
    To enable Web login, log in via the console port, and perform the following configuration tasks: 
    •  Enable HTTP or HTTPS service. 
    •   Configure the IP address of a Layer 3 interface, and make sure the interface and the configuration 
    terminal can reach each other. 
    •   Configure a local user account for Web login. 
    The device supports HTTP 1.0 and HTTPS for transferring webpage data across the Internet. 
    HTTPS uses SSL to encrypt data between the client an d the server for data integrity and security, and is 
    more secure than HTTP. You can define a certificate attribute-based access control policy to allow only 
    legal clients to access the device. 
    HTTP login and HTTPS login are separate login methods. To use HTTPS login, you do not need to 
    configure HTTP login. 
    Table 17 shows the basic Web login configuration requirements. 
    Table 17  Basic web login configuration requirements 
    Ob
    ject Requirements 
    Device   Configure an IP address for a Layer 3 interface.  
    Configuring routes to make sure the inte
    rface and the PC can reach each other. 
    Perform either or both of the following task: 
    •  Configuring HTTP login 
    • Configuring HTTPS login  
    PC   Install a Web browser. 
    Obtain the IP address of the device’s Layer 3 interface. 
     
    Configuring HTTP login 
     
    Step Command Remarks 
    1.
      Enter system view. 
    system-view N/A 
    2.  Enable the HTTP service. 
    ip http enable  By default, HTTP service is 
    enabled.
     
    3.  Configure the HTTP service 
    port number.  ip http port
     port-number   Optional. 
    The default HTTP service port is 80. 
    If you execute the command 
    multiple times, the last one takes 
    effect.   
    						
    							 55 
    Step Command Remarks 
    4.  Associate the HTTP service 
    with an ACL.  ip http acl
     acl-number   Optional. 
    By default, the HTTP service is not 
    associated with any ACL. 
    Associating the HTTP service with 
    an ACL enables the device to allow 
    only clients permitted by the ACL to 
    access the device. 
    5.
      Create a local user and enter 
    local user view.  local-user 
    user-name  By default, no local user is 
    configured.  
    6.
      Configure a password for the 
    local user.  password
     { cipher |  simple } 
    password   By default, no password is 
    configured for the local user. 
    7.
      Specify the command level of 
    the local user.  authorization-attribute level 
    level No command level is configured 
    for the local user. 
    8.
      Specify the Telnet service type 
    for the local user.  service-type
     web  By default, no service type is 
    configured for the local user.  
    9.
      Exit to system view. 
    quit  N/A 
    10. Set the DSCP value for IP to 
    use for HTTP packets. 
    • For IPv4: 
    ip http dscp  dscp-value 
    • For IPv6: 
    ipv6 http dscp  dscp-value Optional. 
    The default is as follows: •
     16 for IPv4. 
    • 0 for IPv6. 
    11.  Create a VLAN interface and 
    enter its view.  interface vlan-interface 
    vlan-interface-id
      If the VLAN interface already 
    exists, the command enters its 
    view. 
    12.
     Assign an IP address and 
    subnet mask to the interface.  ip
     address  ip-address  { mask | 
    mask-length }   By default, no IP address is 
    assigned to the interface.  
     
    Configuring HTTPS login 
     
    Step Command Remarks 
    1.
      Enter system view. 
    system-view N/A 
    2.  Associate the HTTPS 
    service with an SSL server 
    policy.  ip https ssl-server-policy
     
    policy-name   By default, the HTTPS service is not 
    associated with any SSL server policy, 
    and the device uses a self-signed 
    certificate for authentication.  
    If you disable the 
    HTTPS service, the 
    system automatically de-associates the 
    HTTPS service from the SSL service 
    policy. Before re-enabling the HTTPS 
    service, associate th e HTTPS service with 
    an SSL server policy first. 
    If the HTTPS service has been enabled, 
    any changes to the SSL server policy 
    associated with the HTTP service that is 
    enabled do not take effect.    
    						
    							 56 
    Step Command Remarks 
    3.  Enable the HTTPS service. 
    ip https enable  By default, HTTPS is disabled. 
    Enabling the HTTPS service triggers an 
    SSL handshake negotiation process. 
    During the process, if the local certificate 
    of the device exists, the SSL negotiation 
    succeeds, and the HTTPS service can be 
    started properly. If no local certificate 
    exists, a certificate application process 
    will be triggered by the SSL negotiation. 
    Because the application process takes 
    much time, the SSL negotiation often fails 
    and the HTTPS service cannot be started 
    normally. In that case, execute the 
    ip 
    https enable  command multiple times to 
    start the HTTPS service.  
    4.  Associate the HTTPS 
    service with a certificate 
    attribute-based access 
    control policy.  ip https certificate 
    access-control-policy 
    policy-name
      Optional. 
    By default, the HTTPS service is not 
    associated with any certificate-based 
    attribute access control policy. 
    Associating the HTTPS service with a 
    certificate-based attribute access control 
    policy enables the device to control the 
    access rights of clients. 
    You must configure the client-verify 
    enable
     command in the associated SSL 
    server policy. If not, no clients can log in 
    to the device. 
    The associated SSL server policy must 
    contain at least one  permit rule. 
    Otherwise, no clients can log in to the 
    device.  
    For more information about certificate 
    attribute-based access control policies, 
    see  Security Configuration Guide . 
    5.   Specify the HTTPS service 
    port number.  ip https port 
    port-number Optional. 
    The default HTTPS service port is 443.
     
    6.  Associate the HTTPS 
    service with an ACL.  ip https acl 
    acl-number  By default, the HTTPS service is not 
    associated with any ACL. 
    Associating the HTTPS service with an 
    ACL enables the device to allow only 
    clients permitted by the ACL to access 
    the device. 
    7.
      Create a local user and 
    enter local user view.  local-user 
    user-name  By default, no local user is configured.  
    8.  Configure a password for 
    the local user.  password
     { cipher |  simple } 
    password   By default, no password is configured 
    for the local user.  
    9.
      Specify the command 
    level of the local user.  authorization-attribute level 
    level By default, no command level is 
    configured for the local user.   
    						
    							 57 
    Step Command Remarks 
    10. Specify the Web service 
    type for the local user.  service-type
     web  By default, no service type is configured 
    for the local user. 
    11.
     Exit to system view. 
    quit  N/A 
    12. Create a VLAN interface 
    and enter its view.  interface vlan-interface 
    vlan-interface-id
      If the VLAN interface already exists, the 
    command enters its view. 
    You could replace this VLAN interface 
    with any other Layer 3 interface as 
    appropriate.  
    13.
     Assign an IP address and 
    subnet mask to the 
    interface.  ip
     address  ip-address  { mask | 
    mask-length }   By default, no IP address is assigned to 
    the interface.  
     
    For more information about SSL and PKI, see 
    Security Configuration Guide. 
    Displaying and maintaining Web login 
     
    Task Command Remarks 
    Display information about Web 
    users.  display web users
     [ | { begin | 
    exclude  | include  } 
    regular-expression  ]  Available in any view
     
    Display HTTP state information.  display ip http
     [ | { begin |  exclude 
    |  include  } regular-expression  ]  Available in any view
     
    Display HTTPS state information.  display ip https
     [ | { begin | 
    exclude  | include  } 
    regular-expression  ]  Available in any view
     
     
    HTTP login configuration example 
    Network requirements 
    As shown in Figure 27, configure the device to allow the PC to log in over the IP network by using HTTP. 
    Figure 27  Network diagram 
     
     
    Configuration procedure 
    1. Configure the device: 
    # Create VLAN 999, and add GigabitEthernet 1/0/1  (the interface connected to the PC) to VLAN 
    999. 
     system-view  
    						
    							 58 
    [Sysname] vlan 999 
    [Sysname-vlan999] port GigabitEthernet 1/0/1 
    [Sysname-vlan999] quit 
    # Assign the IP address 192.168.0.58 and the subnet mask 255.255.255.0 to VLAN-interface 
    999. 
    [Sysname] interface vlan-interface 999 
    [Sysname-VLAN-interface999] ip address 192.168.0.58 255.255.255.0 
    [Sysname-VLAN-interface999] quit 
    # Create a local user named  admin, and set the password to  admin for the user. Specify the Web 
    service type for the local user, and set  the command level to 3 for this user.  
    [Sysname] local-user admin 
    [Sysname-luser-admin] service-type web 
    [Sysname-luser-admin] authorization-attribute level 3 
    [Sysname-luser-admin] password simple admin 
    2. Verify the configuration: 
    # On the PC, run the Web browser. Enter the IP  address of the device in the address bar. The Web 
    login page appears, as shown in  Figure 28. 
    Figure 28  Web login page 
     
     
    # Enter the user name, password, verify code, select English, and click  Login. The homepage 
    appears. After login, you can configure devi ce settings through the Web interface.   
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide