Page 6
Port security ····················································································································································· 79 Overview ·················································································································································· 79 Port security settings ································································································································ 80 Port security features ······························································································································· 82 Secure MAC addresses ··························································································································· 83 Portal ································································································································································ 83 Portal authentication server ····················································································································· 84 Portal Web server ···································································································································· 85 ...
Page 7
PoE configuration example ···························································································································· 137 Network requirements ···························································································································· 137 Configuration procedure ························································································································· 138 Appendix A Managing the device from the CLI ··········································· 139 display poe pse ······································································································································ 140 initialize ·················································································································································· 141 ipsetup dhcp ··········································································································································· 142 ...
Overview This user guide provides the following information: Information Section How to log in to the Web interface for the first time. Logging in to the Web interface for the first time How to use the Web interface. Using the Web interface What features you can configure from the Web interface.
Logging in to the Web interface Log in to the Web interface through HTTP or HTTPS. Restrictions and guidelines To ensure a successful login, verify that your operating system and Web browser meet the requirements, and follow the guidelines in this section. Web browser requirements As a best practice, use one of the following Web browsers to log in: •...
Concurrent login users The Web interface allows a maximum of 32 concurrent accesses. If this limit is reached, login attempts will fail. Logging in to the Web interface for the first time IMPORTANT: As a best practice, change the login information and assign access permissions immediately after the first successful login for security purposes.
a. In the address bar, enter the IP address of the device. − HTTP access—Enter the address in the http://ip-address:port or ip-address:port format. − HTTPS access—Enter the address in the https://ip-address:port format. The ip-address argument represents the IP address of the device. The port argument represents the HTTP or HTTPS service port.
Using the Web interface The Web interface contains the following areas: Area Description Contains the following items: • Basic information, including the Hewlett Packard Enterprise logo, device name, and information about the current login user. • Basic management icons: (1) Banner and auxiliary area Admin icon —Click this icon to change the login password.
Types of webpages Webpages include feature, table, and configuration pages. This section provides basic information about these pages. For more information about using the icons and buttons on the pages, see "Icons buttons." Using a feature page As shown in Figure 2, a feature page contains information about a feature module, including its table entry statistics, features, and functions.
Figure 3 Sample table page Using a configuration page As shown in Figure 4, one configuration page contains all parameters for a configuration task. If a parameter must be configured on another page, the configuration page typically provides a link. You do not need to navigate to the destination page.
Figure 4 Sample configuration page Icons and buttons Table 2 describes icons and buttons you can use to configure and manage the device. Table 2 Icons and buttons Icon/button Icon/button Task name Help icons Help Obtain help information for a feature. Hint Obtain help information for a function or parameter.
Icon/button Icon/button Task name Click this icon, and then enter a combination of criteria to Advanced search perform an advanced search. Entry management icons Refresh Refresh table entries manually. • Add a new entry. • Confirm the addition of an entry and continue to add an additional entry.
Rebooting the device Reboot is required for some settings (for example, the stack setup) to take effect. To reboot the device: Save the configuration. Select Device > Maintenance > Reboot. On the reboot page, click the reboot button.
Feature navigator Menu items and icons available to you depend on the user roles you have. By default, you can use any user roles to display information. To configure features, you must have the network-admin user role. This chapter describes all menus available for the network-admin user role. The top-level menu includes Dashboard, Device, Network, Resources, QoS, Security, PoE, and Log.
About • Version information. • Electronic label. • Legal statement. Virtualization • Configure the following settings to set up an HPE OfficeConnect 1950 stack: Member ID. Priority. Domain ID. Stack port bindings. • Display the stack topology. Network menu Table 4 to navigate to the tasks you can perform from the Network menu.
Page 21
Menus Tasks • Display interfaces and their attributes, including: Interface status. IP address. Speed and duplex mode. Interfaces Interface description. • Change interface settings. • Delete logical interfaces. Link Aggregation Create, modify, or delete Layer 2 aggregation groups. • Set the statistics polling interval. •...
Page 22
Menus Tasks • Manage dynamic ARP entries and static ARP entries. • Configure ARP proxy. • Configure gratuitous ARP. • Configure ARP attack protection. • Configure IPv4 static domain name resolution. • Configure IPv4 dynamic domain name resolution. • Configure the DNS proxy. •...
Page 23
Menus Tasks • Display IPv4 and IPv6 static route entries. Static Routing • Create, modify, and delete IPv4 and IPv6 static route entries. • Create, modify, and delete IPv4 and IPv6 policies. • Configure interface PBR. Policy-Based Routing • Configure local PBR. Multicast •...
Menus Tasks • Enable or disable Telnet service. • Set the DSCP values for the device to use for outgoing IPv4 or IPv6 Telnet Telnet packets. • Specify Telnet access control ACLs. Configure the device to use the local clock as the reference clock. •...
QoS menu Table 6 to navigate to the tasks you can perform from the QoS menu. Table 6 QoS menu navigator Menus Tasks • Create, modify, or delete interface QoS policies. • Create, modify, or delete VLAN QoS policies. QoS Policies •...
Device management Settings Access the Settings page to change the device name, location, and system time. System time sources Correct system time is essential to network management and communication. Configure the system time correctly before you run the device on the network. The device can use the manually set system time, or obtain the UTC time from a time source on the network and calculate the system time.
Table 10 NTP/SNTP operating modes Mode Operating process Principle Application scenario A client sends a clock synchronization message to the NTP servers. Upon receiving the message, the servers automatically operate in server mode and send a reply. This mode is intended for A client can synchronize If the client is synchronized scenarios where devices...
The service type of an administrator can be SSH, Telnet, FTP, HTTP, HTTPS, PAD, or terminal. A terminal user can access the device through the console, Aux, or Async port. User account management A user account on the device manages attributes for users who log in to the device with the same username.
Password control Password control allows you to implement the following features: • Manage login and super password setup, expirations, and updates for device management users. • Control user login status based on predefined policies. Local users are divided into device management users and network access users. This feature applies only to device management users.
Page 31
Table 12 Password composition policy Password combination Minimum number of Minimum number of characters level character types for each type Level 1 Level 2 Level 3 Three Level 4 Four When a user sets or changes a password, the system checks if the password meets the combination requirement.
You can set the maximum account idle time for user accounts. When an account is idle for this period of time since the last successful login, the account becomes invalid. HPE OfficeConnect 1950 stacking (IRF) Intelligent Resilient Framework (IRF) is true stacking technology that creates a large virtual stack...
Stacking and stack are called IRF on the webpages and in online help. Stack member roles HPE OfficeConnect 1950 stacking uses two member roles: master and standby (also called subordinate). When devices form a stack, they elect a master to manage and control the stack. All the other members process services while backing up the master.
A stack merge occurs when two split virtual stacks reunite or when two independent stacks are united. Member priority Member priority determines the possibility of a member device to be elected the master. A member with higher priority is more likely to be elected the master. The default member priority is 1.
Network services features Link aggregation Ethernet link aggregation bundles multiple physical Ethernet links into one logical link, called an aggregate link. Link aggregation has the following benefits: • Increased bandwidth beyond the limits of any single link. In an aggregate link, traffic is distributed across the member ports.
Link aggregation modes An aggregation group operates in one of the following modes: • Static—Static aggregation is stable. An aggregation group in static mode is called a static aggregation group. The aggregation states of the member ports in a static aggregation group are not affected by the peer ports.
Page 37
Figure 5 Setting the aggregation state of a member port in a static aggregation group Aggregating links in dynamic mode Dynamic aggregation is implemented through IEEE 802.3ad Link Aggregation Control Protocol (LACP). LACP uses LACPDUs to exchange aggregation information between LACP-enabled devices. Each member port in an LACP-enabled aggregation group exchanges information with its peer.
Page 38
b. The system with the smaller system ID chooses the port with the smallest port ID as the reference port. A port ID contains a port priority and a port number. The lower the port priority, the smaller the port ID. −...
Meanwhile, the system with the higher system ID is aware of the aggregation state changes on the peer system. The system sets the aggregation state of local member ports the same as their peer ports. Storm control Storm control compares broadcast, multicast, and unknown unicast traffic regularly with their respective traffic thresholds on an Ethernet interface.
• Trunk—A trunk port can forward packets from multiple VLANs. Except packets from the port VLAN ID (PVID), packets sent out of a trunk port are VLAN-tagged. Assign a trunk port to the untagged port list of the PVID of the port, and to the tagged port lists of other VLANs. •...
Voice VLAN assignment modes A port can be assigned to a voice VLAN automatically or manually. Automatic mode When an IP phone is powered on, it sends out protocol packets. After receiving these protocol packets, the device uses the source MAC address of the protocol packets to match its OUI addresses.
• Blackhole entries—A blackhole entry is manually configured and never ages out. A blackhole entry is configured for filtering out frames with a specific source or destination MAC address. For example, to block all frames destined for or sourced from a user, you can configure the MAC address of the user as a blackhole MAC address entry.
• PVST—PVST allows every VLAN to have its own spanning tree, which increases usage of links and bandwidth. • MSTP—Defined in IEEE 802.1s. MSTP overcomes the limitations of STP and RSTP. It supports rapid network convergence and allows data flows of different VLANs to be forwarded along separate paths.
• Backup port—Serves as the backup port of a designated port. When the designated port is invalid, the backup port becomes the new designated port. A loop occurs when two ports of the same spanning tree device are connected, so the device blocks one of the ports. The blocked port acts as the backup.
overwhelming the network during times of frequent changes to local device information, LLDP uses the token bucket mechanism to rate limit LLDP frames. LLDP automatically enables the fast LLDP frame transmission mechanism in either of the following cases: • A new LLDP frame is received and carries device information new to the local device. •...
CDP compatibility CDP compatibility enables your device to receive and recognize CDP packets from a Cisco IP phone and respond with CDP packets. DHCP snooping DHCP snooping works between the DHCP client and server, or between the DHCP client and DHCP relay agent.
If a DHCP request Handling DHCP snooping… has… strategy Forwards the message after adding the Option 82 padded No Option 82 according to the configured padding format, padding content, and code type. IP address classes IP addressing uses a 32-bit address to identify each host on an IPv4 network. To make addresses easier to read, they are written in dotted decimal notation, each address being four octets in length.
For example, a Class B network without subnetting can accommodate 1022 more hosts than the same network subnetted into 512 subnets. • Without subnetting—65534 (2 – 2) hosts. (The two deducted addresses are the broadcast address, which has an all-one host ID, and the network address, which has an all-zero host ID.) •...
− Adds the interface that received the ARP reply to the short static ARP entry. − Uses the resolved short static ARP entry to forward IP packets. To communicate with a host by using a fixed IP-to-MAC mapping, configure a short static ARP entry on the device.
Page 50
ARP source suppression. ARP packet source MAC consistency check. ARP active acknowledgement. Source MAC-based ARP attack detection. Authorized ARP. • ARP scanning and fixed ARP. • The access device supports the following features: ARP packet rate limit. ARP gateway protection. ARP filtering.
Page 51
• Filter—Generates log messages and filters out subsequent ARP packets from that MAC address. You can exclude the MAC addresses of some gateways and servers from this detection. This feature does not inspect ARP packets from those devices even if they are attackers. Authorized ARP Authorized ARP entries are generated based on the DHCP clients' address leases on the DHCP server or dynamic client entries on the DHCP relay agent.
If you only enable ARP detection for a VLAN, ARP detection provides only the user validity check. Upon receiving an ARP packet from an ARP untrusted interface, the device matches the sender IP and MAC addresses with the following entries: Static IP source guard binding entries.
You can configure a domain name suffix list so that the resolver can use the list to supply the missing part of an incomplete name. For example, you can configure com as the suffix for aabbcc.com. The user only needs to enter aabbcc to obtain the IP address of aabbcc.com. The resolver adds the suffix and delimiter before passing the name to the DNS server.
A DDNS policy contains the DDNS server address, login ID, password, associated SSL client policy, and update time interval. After creating a DDNS policy, you can apply it to multiple interfaces to simplify DDNS configuration. DDNS is supported by only IPv4 DNS, and it is used to update the mappings between domain names and IPv4 addresses.
Format prefix Type IPv6 prefix ID Remarks (binary) It cannot be assigned to any node. Before acquiring a valid IPv6 address, a node fills this address Unspecified 00...0 (128 bits) ::/128 in the source address field of IPv6 address packets. The unspecified address cannot be used as a destination IPv6 address.
• Stateless address autoconfiguration—The IPv6 global unicast address is generated automatically according to the address prefix information contained in the RA message and the EUI-64 address-based interface identifier. • Stateful address autoconfiguration—Enables a host to acquire an IPv6 address from a DHCPv6 server.
The IPv6 Neighbor Discovery (ND) protocol uses ICMPv6 messages to provide the following functions: • Address resolution • Neighbor reachability detection • • Router/prefix discovery • Stateless address autoconfiguration • Redirection Table 13 describes the ICMPv6 messages used by ND. Table 13 ICMPv6 messages used by ND ICMPv6 message Type...
Page 58
You can enable an interface to send RA messages, specify the maximum and minimum sending intervals, and configure parameters in RA messages. The device sends RA messages at random intervals between the maximum and minimum intervals. The minimum interval should be less than or equal to 0.75 times the maximum interval.
ND proxy ND proxy enables a device to answer an NS message requesting the hardware address of a host on another network. With ND proxy, hosts in different broadcast domains can communicate with each other as they would on the same network. ND proxy includes common ND proxy and local ND proxy.
Port mirroring Port mirroring copies the packets passing through a port to the destination port that connects to a data monitoring device for packet analysis. The copies are called mirrored packets. Port mirroring includes the following terms: • Source port—Monitored port on the device. Packets of the monitored port will be copied and sent to the destination port.
A policy matches nodes in priority order against packets. If a packet matches the criteria on a node, it is processed by the action on the node. If the packet does not match the criteria on the node, it goes to the next node for a match. If the packet does not match the criteria on any node, it is forwarded according to the routing table.
Page 62
• Lease duration. • Gateway addresses. • Domain name suffix. • DNS server addresses. • WINS server addresses. • NetBIOS node type. • DHCP options. Before assigning an IP address, the DHCP server performs IP address conflict detection to verify that the IP address is not in use.
• Add options for which the vendor defines the contents, for example, Option 43. DHCP servers and clients can use vendor-specific options to exchange vendor-specific configuration information. • Add options for which the Web interface does not provide a dedicated configuration page. For example, you can use Option 4 to specify the time server address 1.1.1.1 for DHCP clients.
With this feature, the DHCP relay agent uses the following information to periodically send a DHCP-REQUEST message to the DHCP server: • The IP address of a relay entry. • The MAC address of the DHCP relay interface. The relay agent maintains the relay entries depending on what it receives from the DHCP server: •...
File Transfer Protocol (FTP) is an application layer protocol for transferring files from one host to another over an IP network. It uses TCP port 20 to transfer data and TCP port 21 to transfer control commands. The device can act as the FTP server. Telnet The device can act as a Telnet server to allow Telnet login.
OID and subtree A MIB stores variables called "nodes" or "objects" in a tree hierarchy and identifies each node with a unique OID. An OID is a dotted numeric string that uniquely identifies the path from the root node to a leaf node.
Page 67
If you grant read-only permission to the community, the NMS can only read the values of the objects in the MIB view. If you grant read-write permission to the community, the NMS can read and set the values of the objects in the MIB view. •...
Resources features Resource features are common resources that can be used by multiple features. For example, you can use an ACL both in a packet filter to filter traffic and in a QoS policy to match traffic. The Web interface provides access to the resource creation page for features that might use the resources.
The following ACL match orders are available: • config—Sorts ACL rules in ascending order of rule ID. A rule with a lower ID is matched before a rule with a higher ID. If you use this method, check the rules and their order carefully. •...
Automatic rule numbering and renumbering The ID automatically assigned to an ACL rule takes the nearest higher multiple of the numbering step to the current highest rule ID, starting with 0. For example, if the numbering step is 5 (the default), and there are five ACL rules numbered 0, 5, 9, 10, and 12, the newly defined rule is numbered 15.
The device manages both local asymmetric key pairs and peer public keys for data encryption, decryption, and digital signature. Managing local key pairs Generating local key pairs You can generate RSA, DSA, or ECDSA key pairs on the device. Distributing the public key of a local key pair You can distribute the public key of a local key pair to a peer device by using one of the following methods: •...
Public Key Infrastructure (PKI) is an asymmetric key infrastructure to encrypt and decrypt data for securing network services. PKI uses digital certificates to distribute and employ public keys, and provides network communication and e-commerce with security services such as user authentication, data confidentiality, and data integrity.
• CA—Certification authority that issues and manages certificates. A CA issues certificates, defines the certificate validity periods, and revokes certificates by publishing CRLs. • RA—Registration authority, which offloads the CA by processing enrollment requests. The RA accepts certificate requests, verifies user identity, and determines whether to forward the certificate requests to the CA.
Requesting certificates To request a certificate, a PKI entity must provide its identity information and public key to a CA. You can first generate the certificate request on the device, and then send the request to the CA by using an out-of-band method such as phone and email. Before you submit a certificate request, make sure the CA certificate exists in the PKI domain and a key pair is specified for the PKI domain.
Page 75
Table 18 Combinations of attribute-value pairs and operation keywords Operation FQDN/IP The DN contains the specified Any FQDN or IP address contains the specified attribute attribute value. value. The DN does not contain the None of the FQDNs or IP addresses contains the specified nctn specified attribute value.
QoS features QoS policies In data communications, Quality of Service (QoS) provides differentiated service guarantees for diversified traffic in terms of bandwidth, delay, jitter, and drop rate, all of which can affect QoS. By associating a traffic behavior with a traffic class in a QoS policy, you apply QoS actions in the traffic behavior to the traffic class.
SP queuing Figure 9 SP queuing SP queuing is designed for mission-critical applications that require preferential service to reduce the response delay when congestion occurs. SP queuing classifies eight queues on a port into eight classes, numbered 7 to 0 in descending priority order. SP queuing schedules the eight queues in the descending order of priority.
WRR queuing schedules all the queues in turn to ensure every queue is serviced. For example, a port provides eight output queues. WRR assigns each queue a weight value (represented by w7, w6, w5, w4, w3, w2, w1, or w0). The weight value of a queue decides the proportion of resources assigned to the queue.
WFQ is similar to WRR. On an interface with group-based WFQ queuing enabled, you can assign queues to the SP group. Queues in the SP group are scheduled with SP. The SP group has higher scheduling priority than the WFQ groups. The difference is that WFQ enables you to set guaranteed bandwidth that a WFQ queue can get during congestion.
Configuring the priority trust mode After you configure a priority trust mode for a port, the device maps the trusted priority in incoming packets to the target priority types and values according to the priority maps. The available priority trust modes include the following types: •...
Security features Packet filter Packet filter uses ACLs to filter incoming or outgoing packets on interfaces, VLANs, or globally. An interface permits packets that match permit statements to pass through, and denies packets that match deny statements. The default action applies to packets that do not match any ACL rules. IP source guard Overview IP source guard (IPSG) prevents spoofing attacks by using an IPSG binding table to match...
• Authentication server—Provides authentication services for the access device. The authentication server first authenticates 802.1X clients by using the data sent from the access device. Then, the server returns the authentication results to the access device to make access decisions. The authentication server is typically a RADIUS server. In a small LAN, you can use the access device as the authentication server.
Online user handshake The online user handshake feature checks the connectivity status of online 802.1X users. The access device sends handshake messages to online users at the handshake interval. If the device does not receive any responses from an online user after it has made the maximum handshake attempts, the device sets the user to offline state.
Guest VLAN The 802.1X guest VLAN on a port accommodates users who have not performed 802.1X authentication. Once a user in the guest VLAN passes 802.1X authentication, it is removed from the guest VLAN and can access authorized network resources. The access device handles VLANs on an 802.1X-enabled port based on its 802.1X access control method.
Authentication status VLAN manipulation If an 802.1X Auth-Fail VLAN has been configured, the PVID of A user in the 802.1X critical VLAN fails the port changes to the Auth-Fail VLAN ID, and all 802.1X users authentication for any other reasons on this port are moved to the Auth-Fail VLAN.
Silent MAC address information When a user fails MAC authentication, the device marks the user's MAC address as a silent MAC address, drops the packet, and starts a quiet timer. The device drops all subsequent packets from the silent MAC address within the quiet time. The quiet mechanism avoids repeated authentication during the quiet time.
Multi-VLAN mode The MAC authentication multi-VLAN mode prevents an authenticated online user from service interruption caused by VLAN changes on a port. When the port receives a packet sourced from the user in a VLAN that does not match the existing MAC-VLAN mapping, the device does not logs off the user or reauthenticates the user.
• The device fails to authorize the specified ACL or user profile to the user. • The server assigns a nonexistent ACL or user profile to the user. If this feature is disabled, the device does not log off users who fail ACL or user profile authorization. Aging timer for secure MAC addresses When secure MAC addresses are aged out, they are removed from the secure MAC address table.
Page 89
Features that can Purpose Security mode be triggered NTK/intrusion Perform MAC authentication: macAddressWithRadius protection macAddressOrUserLoginSecure macAddressOrUserLoginSecureExt Perform a combination of MAC NTK/intrusion authentication and 802.1X macAddressElseUserLoginSecure protection authentication: Else macAddressElseUserLoginSecureE • Control MAC address learning: autoLearn. A port in this mode can learn MAC addresses. The automatically learned MAC addresses are not added to the MAC address table as dynamic MAC address.
macAddressWithRadius: A port in this mode performs MAC authentication, and services multiple users. • Perform a combination of MAC authentication and 802.1X authentication: macAddressOrUserLoginSecure. This mode is the combination of the macAddressWithRadius and userLoginSecure modes. The mode allows one 802.1X authentication user and multiple MAC authentication users to log in.
Secure MAC addresses Secure MAC addresses are configured or learned in autoLearn mode. Secure MAC addresses include static, sticky, and dynamic secure MAC addresses. Aging mode for secure MAC addresses Secure MAC addresses can be aged out when you use one of the following aging modes: •...
• Supports multiple authentication modes. For example, re-DHCP authentication implements a flexible address assignment scheme and saves public IP addresses. Cross-subnet authentication can authenticate users who reside in a different subnet than the access device. A typical portal system consists of the following components: •...
If a user contained in the packet does not exist on the access device, the access device informs the portal authentication server to delete the user. If the user does not appear in any synchronization packet within a synchronization detection interval, the access device determines the user does not exist on the server and logs the user out.
Page 94
Client and local portal Web server interaction protocols HTTP and HTTPS can be used for interaction between an authentication client and a local portal Web server. If HTTP is used, there are potential security problems because HTTP packets are transferred in plain text. If HTTPS is used, secure data transmission is ensured because HTTP packets are secured by SSL.
Page 95
Post request attribute rules Observe the following requirements when editing a form of an authentication page: An authentication page can have multiple forms, but there must be one and only one form whose action is logon.cgi. Otherwise, user information cannot be sent to the local portal Web server.
See the contents in gray: <html> <head> <title>LogonSuccessed</title> <script type="text/javascript" language="javascript" src="pt_private.js"></script> </head> <body onload="pt_init();" onbeforeunload="return pt_unload();"> ..</body> </html> Portal-free rules A portal-free rule allows specified users to access specified external websites without portal authentication. • IP-based portal-free rules The matching items for an IP-based portal-free rule include the IP address and TCP/UDP port.
ARP and ND detections apply only to direct and re-DHCP portal authentication. ICMP detection applies to all portal authentication modes. If the device receives no packets from a portal user within the idle time, the device detects the user's online status as follows: •...
TACACS authentication, and the authorization information is included in the authorization response after successful authentication. You can configure backup methods to be used when the remote server is not available. The device supports the following accounting methods: • No accounting—The device does not perform accounting for the users. •...
Page 99
• Accounting-on—This feature enables the device to automatically send an accounting-on packet to the RADIUS server after a reboot. Upon receiving the accounting-on packet, the RADIUS server logs out all online users so they can log in again through the device. Without this feature, users cannot log in again after the reboot, because the RADIUS server considers them to be online.
Log features Log levels Logs are classified into eight severity levels from 0 through 7 in descending order. Table 21 Log levels Severit Level Description y value Emergency The system is unusable. For example, the system authorization has expired. Action must be taken immediately. For example, traffic on an interface exceeds Alert the upper limit.
Configuration examples Device maintenance examples System time configuration example Network requirements As shown in Figure • Configure the device to obtain the UTC time from the NTP server. • Configure NTP authentication on both the device and NTP server. Figure 12 Network diagram Configuration procedure Configure the NTP client: a.
Figure 13 Network diagram Configuration procedure Configure the VLAN and VLAN interface: a. From the navigation tree, select Network > Links > VLAN. b. Create VLAN 2. c. Access the details page for VLAN 2 to perform the following tasks: −...
Page 103
Figure 14 Network diagram IP network 1950 Stack XGE1/0/49 XGE1/0/49 XGE1/0/50 XGE1/0/50 (IRF-port1) (IRF-port2) Switch A Switch B Configuration procedure IMPORTANT: • When you connect two neighboring stack members, you must connect the physical interfaces of IRF-port 1 on one member to the physical interfaces of IRF-port 2 on the other. •...
c. Click the IRF port bindings link, and then access the details page for IRF-port 2 to assign XGE 1/0/49 and XGE 1/0/50 to IRF-port 2. d. Click the advanced link to perform the following tasks: − Set the domain ID to be the same as Switch A. The domain ID must be the same across stack member devices.
Verifying the configuration # Verify that Device B has synchronized to Device A, and the clock stratum level is 3 on Device B and 2 on Device A. (Details not shown.) SNMP configuration example Network requirements As shown in Figure 16, the NMS (1.1.1.2/24) uses SNMPv2c to manage the SNMP agent (1.1.1.1/24), and the agent automatically sends notifications to report events to the NMS.
Figure 17 Network diagram GE1/0/1 GE1/0/1 GE1/0/2 GE1/0/2 Link aggregation 10 Switch A Switch B GE1/0/3 GE1/0/3 GE1/0/4 GE1/0/4 VLAN 10 VLAN 10 Host A Host B Configuration procedure Configure Ethernet link aggregation on Switch A: a. From the navigation tree, select Network > Interfaces > Link Aggregation. b.
Figure 18 Network diagram Configuration procedure From the navigation tree, select Network > Interfaces > Isolation. Create an isolation group. Access the details page for the isolation group. Assign ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 to the isolation group. Verifying the configuration # Verify that Host A, Host B, and Host C cannot ping each other.
− Add GigabitEthernet 1/0/1 to the untagged port list (Host A cannot recognize VLAN tags). − Add GigabitEthernet 1/0/3 to the tagged port list (Switch B needs to identify the VLAN tags of packets). d. Access the details page for VLAN 200 to perform the following tasks: −...
b. Access the advanced settings page, and set the mode to security. c. Access the page for adding an OUI address, and add the OUI address 0011-2200-0000, the mask ffff-ff00-0000, and the description OUI address of IP phone A. Verifying the configuration View the OUI summary to verify that the OUI address 0011-2200-0000 has been added.
Page 110
Figure 22 Network diagram Permit: all VLAN GE1/0/3 GE1/0/3 Switch A Switch B GE1/0/1 GE1/0/1 Permit: VLAN 30 Permit: VLAN 10 GE1/0/1 GE1/0/1 Switch C Switch D Configuration procedure Configure VLANs: a. Configure VLANs on Switch A: − From the navigation tree, select Network > Links > VLAN. −...
Verifying the configuration # Verify that the port roles and port states in the spanning tree status are as expected. (Details not shown.) LLDP configuration example Network requirements As shown in Figure 23, configure LLDP on Switch A and Switch B to meet the following requirements: •...
• Record the client IP-MAC binding information in DHCP-REQUEST packets and in DHCP-ACK packets received by GigabitEthernet 1/0/1. • Save the bindings to the FTP server. Figure 24 Network diagram Configuration procedure Configure the DHCP server. (Details not shown.) Configure the FTP server: Enable the FTP service, and configure the login username and password.
Figure 25 Network diagram Configuration procedure Configure the VLAN and the VLAN interface: a. From the navigation tree, select Network > Links > VLAN. b. Create VLAN 10. c. Access the details page for VLAN 10 to perform the following tasks: −...
Configuration procedure Configure the VLAN and VLAN interface: a. From the navigation tree, select Network > Links > VLAN. b. Create VLAN 10. c. Access the details page for VLAN 10 to perform the following tasks: − Add GigabitEthernet 1/0/1 to the tagged port list. −...
a. From the navigation tree, select Network > IP > DNS. b. Configure the IP address of the DNS server as 2.1.1.2. c. On the advanced settings page, configure the domain name suffix as com. Verifying the configuration # Use the ping host command on the switch to verify the following items: •...
c. Access the details page for VLAN 10 to perform the following tasks: − Add GigabitEthernet 1/0/1 to the tagged port list. − Create VLAN-interface 10. − Assign the IP address 2.1.1.1/24 to VLAN-interface 10. On the switch, configure DDNS: a.
Configure an IPv6 address for VLAN-interface 10: a. From the navigation tree, select Network > IPv6 > IPv6. b. Access the details page for VLAN-interface 10 to perform the following tasks: − Configure the IPv6 address of the interface as 2001::. −...
− Set the minimum interval to 200 seconds for sending RA messages. − Set the router lifetime to 1800 seconds. Configure Switch A: a. From the navigation tree, select Network > Links > VLAN. b. Create VLAN 10. c. Access the details page for VLAN 10 to perform the following tasks: −...
Verifying the configuration # Verify that the server can monitor the incoming and outgoing traffic of the marketing department and the technical department. (Details not shown.) IPv4 static route configuration example Network requirements As shown in Figure 32, configure IPv4 static routes on the switches for the hosts to communicate with each other.
On Switch C, configure a default route: Set the destination address to 0.0.0.0. Set the mask length to 0. Set the next hop address to 1.1.5.5 (Switch B). Verifying the configuration # Verify that the hosts can ping each other. (Details not shown.) IPv4 local PBR configuration example Network requirements As shown in...
Page 121
• The network is a Layer 2-only network. • Host A and Host B are receivers of multicast group 224.1.1.1. • All host receivers run IGMPv2, and all switches run IGMPv2 snooping. Switch A (which is close to the multicast source) acts as the IGMP querier. Configure the switches to meet the following requirements: •...
a. From the navigation tree, select Network > Multicast > IGMP Snooping. b. Enable IGMP snooping for VLAN 1. c. Specify the IGMP snooping version as 2. d. Enable dropping unknown multicast data. Verifying the configuration Send IGMP reports from Host A and Host B to join the multicast group 224.1.1.1. Send multicast data from the source to the multicast group.
d. Enable dropping unknown IPv6 multicast data. e. Enable the switch to act as the MLD querier. Configure Switch B: a. From the navigation tree, select Network > Multicast > MLD Snooping. b. Enable MLD snooping for VLAN 1. c. Specify the MLD snooping version as 1. d.
Page 124
− Specify the pool name as pool1. − Specify the subnet as 10.10.1.0/24 for dynamic allocation. − Specify the gateway IP address as 10.10.1.1. g. Access the advanced settings page to perform the following tasks: − Configure the conflict detection feature to send a maximum of one ping packet. −...
Password authentication enabled Stelnet server configuration example Network requirements As shown in Figure 37, the switch acts as the Stelnet server and uses password authentication. The username (client) and password (aabbcc) of the client are saved on the switch. Establish an Stelnet connection between the host and the switch, so the client can log in to the switch to configure and manage the switch as a network administrator.
To establish a connection to the Stelnet server: Launch PuTTY.exe to enter the interface. In the Host Name (or IP address) field, enter the IP address 192.168.1.40 of the Stelnet server. Click Open to connect to the server. If the connection is successfully established, the system notifies you to enter the username and password.
− Create IPv4 ACL 2002, and add a rule to permit packets with source IP address 192.168.2.0 and mask 0.0.0.255. − Configure the ACL as a match criterion of a class, and specify the associated behavior to mark the matched packets with 802.1p priority 1. f.
Page 128
Figure 39 Network diagram Configuration procedure From the navigation tree, select Security > Packet Filter > Packet Filter. Create a packet filter policy: a. Select VLAN-interface 10. b. Select the outbound application direction. c. Select the IPv4 ACL type for packet filter. Create an advanced IPv4 ACL and configure the following rules in the order they are described: Protocol Action...
Static IPv4 source guard configuration example Network requirements As shown in Figure 40, all hosts use static IP addresses. Configure static IPv4 source guard entries on Device A and Device B to meet the following requirements: • GigabitEthernet 1/0/2 of Device A allows only IP packets from Host C to pass. •...
Repeat step 1 and 2 on Device B to verify that the static IPv4 source guard entries are configured successfully. 802.1X RADIUS authentication configuration example Network requirements As shown in Figure 41, configure the switch to meet the following requirements: •...
e. Configure the switch to not include domain names in the usernames sent to the RADIUS server. Configure an ISP domain on the switch: a. From the navigation tree, select Security > Authentication > ISP Domains. b. Add ISP domain dm1X, and set the domain state to Active. c.
a. From the navigation tree, select Security > Authentication > Local Users. b. Add user account dotuser and set the password to 12345. c. Set the service type to LAN access. Configure the ISP domain: a. From the navigation tree, select Security > Authentication > ISP Domains. b.
Page 133
Figure 43 Network diagram RADIUS server 10.1.1.1/24 GE1/0/1 GE1/0/2 Vlan-int2 Vlan-int3 192.168.1.1/24 10.1.1.10/24 Internet Host Switch 192.168.1.2/24 Configuration procedure Configure IP addresses for the interfaces, as shown in Figure 43. (Details not shown.) Configure a RADIUS scheme on the switch: a.
a. Add a user account on the server. (Details not shown.) b. Configure the authentication, authorization, and accounting settings. (Details not shown.) Verifying the configuration From the navigation tree, select Security > Authentication > RADIUS. Verify the configuration of RADIUS scheme macauth. From the navigation tree, select Security >...
Page 135
Configure a RADIUS scheme on the switch: a. From the navigation tree, select Security > Authentication > RADIUS. b. Add RADIUS scheme portsec. c. Configure the primary authentication server: − Set the IP address to 10.1.1.1. − Set the authentication port number to 1812. −...
Direct portal authentication configuration example Network requirements As shown in Figure 45, the host is directly connected to the switch (the access device). The host is assigned a public IP address either manually or through DHCP. A portal server acts as both a portal authentication server portal...
Page 137
d. Configure the ISP domain to use RADIUS scheme rs1 for authentication, authorization, and accounting of portal users. e. Click the Advanced settings icon on the ISP Domain page. f. Specify dm1 as the default ISP domain. If a user enters the username without the ISP domain name at login, the authentication and accounting methods of the default domain are used for the user.
Re-DHCP portal authentication configuration example Network requirements As shown in Figure 46, the host is directly connected to the switch (the access device). The host obtains an IP address through the DHCP server. A portal server acts as both a portal authentication server and a portal Web server.
Page 139
b. Add ISP domain dm1, and set the domain state to Active. c. Set the access service to Portal. d. Configure the ISP domain to use RADIUS scheme rs1 for authentication, authorization, and accounting of portal users. e. Click the Advanced settings icon on the ISP Domain page.
Configure the RADIUS server: a. Add a user account on the server. (Details not shown.) b. Configure the authentication, authorization, and accounting settings. (Details not shown.) Verifying the configuration From the navigation tree, select Security > Authentication > RADIUS. Verify the configuration of RADIUS scheme rs1. From the navigation tree, select Security >...
Page 141
− Set the IP address to 192.168.0.112. − Set the accounting port number to 1813. − Set the shared key to radius. − Set the server state to Active. e. Configure the switch to not include domain names in the usernames sent to the RADIUS server.
Verifying the configuration From the navigation tree, select Security > Authentication > RADIUS. Verify the configuration of RADIUS scheme rs1. From the navigation tree, select Security > Authentication > ISP Domains. Verify the configuration of ISP domain dm1. Use the configured user account to pass portal authentication. From the navigation tree, select Security >...
Page 143
g. Enable the session-control feature. Configure an ISP domain on the switch: a. From the navigation tree, select Security > Authentication > ISP Domains. b. Add ISP domain dm1, and set the domain state to Active. c. Set the access service to Portal. d.
Verify that the number of online users is not 0 on VLAN-interface 100. AAA for SSH users by a TACACS server configuration example Network requirements As shown in Figure 49, configure the switch to meet the following requirements: • Use the TACACS server for SSH user authentication, authorization, and accounting. •...
− In advanced settings, configure the switch to exclude domain names in the user names sent to the TACACS server. − Configure an ISP domain on the switch: − From the navigation tree, select Security > Authentication > ISP Domains. −...
Configuration procedure From the navigation tree, select PoE > PoE. Enable PoE for GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2, set the power supply priority to critical. Enable PoE for GigabitEthernet 1/0/3 and set the maximum PoE power for the interface to 9000 milliwatts.
Appendix A Managing the device from the Commands are available for you to perform basic device management when the Web interface is not available. To manage the device from the CLI, access the device through the console port or Telnet. You are placed in user view immediately after you log in to the CLI.
Command Description upgrade { tftp-server | ipv6 ipv6-tftp-server } bootrom bootrom-filename upgrade { tftp-server | ipv6 ipv6-tftp-server } Downloads the specified file from a TFTP server and runtime boot boot-package system specify the file as the file to be used at the next startup. If system-package [ feature the device is a stack member device, the setting of this feature-package&<1-30>]...
PSE Hardware Version : 57633 Legacy PD Detection : Disabled Power Utilization Threshold : 80 PD Power Policy : Disabled PD Disconnect-Detection Mode : AC Table 23 Command output Field Description PSE ID ID of the PSE. Slot No. Slot number of the PSE. SSlot No.
Usage guidelines This command deletes the next-startup configuration file from the storage medium, and then reboots the device with the factory-default configuration. Make sure you understand the impact on the network when you use this command. Examples # Initialize the device. <Sysname>...
Views User view Predefined user roles network-admin Parameters ip-address: Specifies an IPv4 address for the interface, in dotted decimal notation. mask-length: Specifies the subnet mask length, the number of consecutive 1s in the mask. The value range for this argument is 1 to 31. mask: Specifies the subnet mask in dotted decimal notation.
default-gateway ipv6-gateway-address: Specifies the IPv6 address of the default gateway. If you specify this option, the command not only assigns an IPv6 gateway address to the interface, but also specifies a default route for the device. For this option to take effect, make sure the ipv6-gateway-address setting is in the same segment with the ipv6-address setting.
Related commands ipsetup ipv6 address password Use password to modify the login password for a user. Syntax password Views User view Predefined user roles network-admin Examples # Modify the login password for user aaa. <Sysname> password Change password for user: aaa Old password: Enter new password: Confirm:...
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms --- Ping statistics for 1.1.2.2 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms The output shows that IP address 1.1.2.2 is reachable and the echo replies are all returned from the destination.
Syntax poe update { full | refresh } filename [ pse pse-id ] Views User view Predefined user roles network-admin Parameters full: Upgrades the PSE firmware in full mode. refresh: Upgrades the PSE firmware in refresh mode. filename: Specifies the name of the upgrade file, a case-sensitive string of 1 to 64 characters. The specified file must be in the root directory of the file system of the device.
Syntax reboot [ slot slot-number ] [ force ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies a stack member device by its member ID. If you do not specify a member ID, this command reboots all member devices in the stack. force: Reboots the device immediately without performing software or hard disk check.
This command is not available in Release 3111P02. The device regularly checks transceiver modules for their vendor names. If a transceiver module does not have a vendor name or the vendor name is not HPE, the device repeatedly outputs traps and log messages.
Transceiver module source alarm is disabled by default. If you want to view the traps and log messages, execute the undo transceiver phony-alarm-disable command. Examples # Disable transceiver module source alarm. <Sysname> system-view [Sysname] transceiver phony-alarm-disable upgrade Use upgrade to download the specified file from a TFTP server and specify the file as the file to be used at the next startup.
Page 161
Verifying server file... Downloading file all.ipe from remote TFTP server, please wait................Done. Verifying the file flash:/all.ipe on slot 1....Done. HPE OfficeConnect 1950-24G-2SFP+-2XGT-PoE+ images in IPE: boot.bin system.bin This command will set the main startup software images. Continue? [Y/N]:y Add images to slot 1.
Do you want to delete flash:/all.ipe now? [Y/N]:y # Download files boot.bin and system.bin from the root directory of the TFTP server and use these files at the next startup. <Sysname>upgrade 192.168.8.2 runtime boot boot.bin system system.bin The file flash:/boot.bin already exists.Overwrite?[Y/N]y Verifying server file...
Page 163
Warning: Extended CLI mode is intended for developers to test the system. Before using commands in extended CLI mode, contact the Technical Support and make sure you know the potential impact on the device and the network.
Document conventions and icons Conventions This section describes the conventions used in the documentation. Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown.
Convention Description An alert that provides helpful information. TIP: Network topology icons Convention Description Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: www.hpe.com/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: www.hpe.com/support/hpesc Information to collect •...
For more information and device support details, go to the following website: www.hpe.com/info/insightremotesupport/docs Documentation feedback Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title,...
Page 168
part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page.
Page 177
node portal authentication post request rules, PBR apply clause, parameter PBR if-match clause, IPv6 RA message parameter, PBR policy, password PBR-Track collaboration, SSH Secure Telnet server configuration (password authentication-enabled), overview, policy, numbering Track collaboration, ACL rule numbering, performing saving configuration, online Web basic tasks, 802.1X online user handshake,...
Page 178
portal authentication server, configuring ND, portal authentication server detection, configuring network services, portal Web server, configuring NTP, portal authentication configuring PoE, authenticated user redirection, configuring port isolation, direct configuration (local portal Web configuring port mirroring, server), configuring QoS, file name rules, configuring RADIUS-based MAC local portal Web server page authentication,...
Need help?
Do you have a question about the OfficeConnect 1950 Series and is the answer not in the manual?
Questions and answers