hit counter script
HP 830 Series Configuration Manual
HP 830 Series Configuration Manual

HP 830 Series Configuration Manual

Poe+ unified wired-wlan switch
Hide thumbs Also See for 830 Series:
Table of Contents

Advertisement

HP 830 Series PoE+ Unified Wired-WLAN
Switch and HP 10500/7500 20G Unified
Wired-WLAN Module
Fundamentals Configuration Guide
Part number: 5998-3904
Software version:
3308P29(HP 830 Series PoE+ Unified Wired-WLAN Switch)
2308P29 (HP 10500/7500 20G Unified Wired-WLAN
Module)
Document version: 6W102-20131112

Advertisement

Table of Contents
loading

Summary of Contents for HP 830 Series

  • Page 1 HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Fundamentals Configuration Guide Part number: 5998-3904 Software version: 3308P29(HP 830 Series PoE+ Unified Wired-WLAN Switch) 2308P29 (HP 10500/7500 20G Unified Wired-WLAN Module) Document version: 6W102-20131112...
  • Page 2 The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an...
  • Page 3: Table Of Contents

    Contents Using the CLI ································································································································································ 1   Command conventions ····················································································································································· 1   Using the undo form of a command ······························································································································· 2   CLI views ············································································································································································ 2   Entering system view from user view ······················································································································ 3   Returning to the upper-level view from any view ·································································································· 3  ...
  • Page 4 Displaying and maintaining CLI login ························································································································· 40   Logging in to the Web interface ······························································································································· 42   Configuring HTTP login ················································································································································· 42   Configuring HTTPS login ··············································································································································· 43   Displaying and maintaining Web login ······················································································································ 45   Web login configuration examples ······························································································································ 45  ...
  • Page 5 Managing files ······························································································································································· 73   Displaying file information ··································································································································· 74   Displaying the contents of a file ··························································································································· 74   Renaming a file ······················································································································································ 74   Copying a file ························································································································································ 74   Moving a file ·························································································································································· 74   Deleting/restoring a file ······································································································································· 75  ...
  • Page 6 Clearing unused 16-bit interface indexes ·················································································································· 116   Displaying and maintaining device management ···································································································· 117   Support and other resources ·································································································································· 119   Contacting HP ······························································································································································ 119   Subscription service ············································································································································ 119   Related information ······················································································································································ 119   Documents ···························································································································································· 119  ...
  • Page 7: Using The Cli

    Using the CLI At the command-line interface (CLI), you can enter text commands to configure, manage, and monitor your device. Figure 1 CLI example You can use a variety of methods to log in to the CLI. For example, you can log in through the console port, or by using Telnet or SSH.
  • Page 8: Using The Undo Form Of A Command

    You are placed in user view immediately after you are logged in to the CLI. The user view prompt is <Device-name>, where the Device-name argument, representing the device hostname, defaults to HP and can be changed by using the sysname command. In user view, you can perform basic operations, including display, debug, file management, FTP, Telnet, clock setting, and reboot.
  • Page 9: Entering System View From User View

    Figure 3 CLI view hierarchy Entering system view from user view Task Command Enter system view from user view. system-view Returning to the upper-level view from any view Task Command Return to the upper-level view from any view. quit Executing the quit command in user view terminates your connection to the device. In public key code view, use the public-key-code end command to return to the upper-level view (public key view).
  • Page 10: Accessing The Cli Online Help

    Accessing the CLI online help The CLI online help is context sensitive. You can enter a question mark at any prompt or in any position of a command to display all available options. To access the CLI online help, use one of the following methods: Enter a question mark at a view prompt to display the first keyword of every command available in •...
  • Page 11: Entering A Command

    Entering a command When you enter a command, you can use keys or hotkeys to edit the command line, or use abbreviated keywords or keyword aliases. Editing a command line Use the keys listed in Table 2 or the hotkeys listed in Table 3 to edit a command line.
  • Page 12: Configuring And Using Hotkeys

    If you press Tab after entering part of an alias, the keyword is displayed. • • If a string you entered partially matches a keyword and an alias, the command indicated by the alias is executed. To execute the command indicated by the keyword, enter the complete keyword. If you enter a string that partially matches multiple aliases, the system prompts you to select a •...
  • Page 13: Enabling Redisplaying Entered-But-Not-Submitted Commands

    Table 3 System-reserved hotkeys Hotkey Function Ctrl+A Moves the cursor to the beginning of a line. Ctrl+B Moves the cursor one character to the left. Stops the current command. Ctrl+C Ctrl+D Deletes the character at the cursor. Ctrl+E Moves the cursor to the end of a line. Ctrl+F Moves the cursor one character to the right.
  • Page 14: Understanding Command-Line Error Messages

    Step Command Remarks By default, this feature is disabled. Enable redisplaying For more information about this command, entered-but-not-submitted info-center synchronous see Network Management and Monitoring commands. Command Reference. Understanding command-line error messages When you press Enter to submit a command, the command line interpreter examines the command syntax.
  • Page 15: Viewing History Commands

    Viewing history commands You can use arrow keys to access history commands in Windows 200x and Windows XP Terminal or Telnet. In Windows 9x HyperTerminal, the arrow keys are invalid, and you must use Ctrl+P and Ctrl+N instead. To view command history, use one of the following methods: Task Command Display all commands in the command history...
  • Page 16: Filtering The Output From A Display Command

    Keys Function <PageDown> Displays the next page. To display all output at one time and refresh the screen continuously until the final screen is displayed: Task Command Remarks The default for a session depends on the setting of the screen-length command in user interface view.
  • Page 17 Character Meaning Examples Matches the preceding character or character group one or multiple "zo+" matches "zo" and "zoo", but not "z". times Matches the preceding or "def|int" only matches a character string succeeding character string containing "def" or "int". If it is at the beginning or the end of a regular expression, it equals ^ or $.
  • Page 18 Character Meaning Examples Matches a string containing "\Bt" matches "t" in "install", but not "t" in "big \Bcharacter character, and no space is allowed top". before character. Matches character1character2. character2 must be a number, letter, "v\w" matches "vlan" ("v" is character1 and "l" is character1\w or underline, and \w equals character2) and "service"...
  • Page 19: Configuring User Privilege And Command Levels

    Configuring user privilege and command levels To avoid unauthorized access, the device defines the user privilege levels and command levels in Table 7. User privilege levels correspond to command levels. A user logged in with a specific privilege level can use only the commands at that level or lower levels.
  • Page 20 Step Command Remarks By default, the authentication Specify the scheme mode for VTY and AUX users is authentication-mode scheme authentication mode. password, and no authentication is required for console login users. Return to system view. quit This step is required only for SSH Configure the For more information, see Security users who must provide their...
  • Page 21 Step Command Remarks user-interface { first-num1 Enter user interface view. [ last-num1 ] | vty first-num2 [ last-num2 ] } Optional. By default, the authentication Enable the scheme authentication-mode scheme mode for VTY and AUX users is authentication mode. password, and no authentication is required for console users.
  • Page 22: Switching The User Privilege Level

    To avoid problems, HP recommends that administrators log in with a lower privilege level to view system operating parameters, and switch to a higher level temporarily only when they are maintaining the...
  • Page 23 device. Administrators should also switch to a lower privilege level if they either leave temporarily or someone else manages the device temporarily. Configuring the authentication parameters for user privilege level switching A user can switch to a lower privilege level without authentication. To switch to a higher privilege level, a user must provide the privilege level switching authentication information (if any).
  • Page 24 Step Command Remarks If local authentication is involved, this step is required. By default, a user privilege level has no password. If no user privilege level is specified super password [ level user-level ] when you configure the command, Configure a password for the [ hash ] { cipher | simple } the user privilege level defaults to user privilege level.
  • Page 25: Changing The Level Of A Command

    User privilege User interface level switching Information required for the Information required for the authentication authentication first authentication mode second authentication mode mode mode Password configured for the local privilege level on the device with the super password command. Password for privilege level Password configured for the switching configured on the local scheme...
  • Page 26: Displaying And Maintaining Cli

    Displaying and maintaining CLI Task Command Remarks Display the command keyword display command-alias [ | { begin | Available in any view. alias configuration. exclude | include } regular-expression ] display clipboard [ | { begin | exclude | Display data in the clipboard. Available in any view.
  • Page 27: Login Overview

    Login overview This chapter describes the available login methods and their configuration procedures. Login methods at a glance Table 10 shows the supported login methods. Table 10 Login methods Login method Default setting and configuration requirements Logging in to the CLI: •...
  • Page 28: User Interface Assignment

    NOTE: About the HP Support for AUX user interfaces depends on the device model. For more information, see 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Configuration Guides. User interface assignment The device automatically assigns user interfaces to CLI login users, depending on their login methods.
  • Page 29: Logging In To The Cli

    Logging in to the CLI You can access the CLI through the console port, Telnet, or SSH. Logging in through the console/AUX port for the first time This section describes how to use the console port for login. To log in through the console port, make sure the console terminal has a terminal emulation program (for example, HyperTerminal in Windows XP).
  • Page 30 On Windows Server 2003, add the HyperTerminal program first, and then log in to and manage the device as described in this document. On Windows Server 2008, Windows 7, Windows Vista, or some other operating system, obtain a third-party terminal control program first, and then follow the user guide or online help to log in to the device.
  • Page 31: Configuring Console Login Control Settings

    Figure 7 Setting the properties of the serial port Power on the device and press Enter at the prompt. At the default user view prompt <HP>, enter commands to configure the device or view the running status of the device. To get help, enter ?.
  • Page 32: Disabling Authentication For Console Login

    Authentication Configuration tasks Reference mode Enable password authentication on the console user "Configuring password interface. Password authentication for console login" Set a password. Enable scheme authentication on the console user interface. Configure local or remote authentication settings. To configure local authentication: Configure a local user and specify the password on the device.
  • Page 33: Configuring Scheme Authentication For Console Login

    Step Command Remarks By default, you can log in to the Enable password device through the console port authentication-mode password authentication. without authentication and have user privilege level 3 after login. set authentication password Set a password. [ hash ] { cipher | simple } By default, no password is set.
  • Page 34: Configuring Common Console User Interface Settings (Optional)

    Step Command Remarks Optional. By default, command authorization Enable command command authorization is disabled. The commands authorization. available for a user only depend on the user privilege level. Optional. By default, command accounting is Enable command command accounting disabled. The accounting server accounting.
  • Page 35 By default, the terminal display type is ANSI. The device supports two types of terminal display: ANSI and VT100. HP recommends setting the display type of both the device and the terminal to VT100. If the device and Specify the terminal display...
  • Page 36: Logging In Through Telnet

    Step Command Remarks By default, a screen displays 24 Set the maximum number of lines at most. lines to be displayed on a screen-length screen-length A value of 0 disables pausing screen. between screens of output. Set the size of command By default, the buffer saves 10 history-command max-size value history buffer.
  • Page 37: Disabling Authentication For Telnet Login

    Scheme—Uses the AAA module to provide local or remote authentication. You must provide a • username and password for accessing the CLI. If the password configured in the local user database was lost, log in to the device through the console port and view set the password or configure a new password.
  • Page 38: Configuring Password Authentication For Telnet Login

    As shown in Figure 9, the next time you attempt to Telnet to the device, you do not need to provide a username or password. If the maximum number of login users has been reached, your login attempt fails, and the message "All user interfaces are used, please try later!" appears. Figure 9 Telnetting to the device without authentication Configuring password authentication for Telnet login Step...
  • Page 39: Configuring Scheme Authentication For Telnet Login

    Figure 10 Password authentication interface for Telnet login Configuring scheme authentication for Telnet login When scheme authentication is used, you can configure the command authorization and command accounting functions. If command authorization is enabled, a command is available only if the user has the correct user privilege level and is authorized to use the command by the AAA scheme.
  • Page 40 Step Command Remarks Whether local, RADIUS, or HWTACACS authentication is adopted depends on the configured AAA Enable scheme authentication-mode scheme scheme. authentication. By default, local authentication is adopted. Optional. By default, command authorization is Enable command command authorization disabled. The commands available for authorization.
  • Page 41: Configuring Common Vty User Interface Settings (Optional)

    Figure 11 Scheme authentication interface for Telnet login Configuring common VTY user interface settings (optional) Before configuring the auto-execute command command and saving the running configuration, make sure you can access the CLI through a different user interface. You might be unable to access the CLI through a VTY user interface after configuring the command.
  • Page 42: Using The Device To Log In To A Telnet Server

    Step Command Remarks Optional. Set the maximum number of lines By default, up to 24 lines is screen-length screen-length to be displayed on a screen. displayed on a screen. A value of 0 disables the function. Optional. Set the size of command history history-command max-size By default, the buffer saves 10 buffer.
  • Page 43: Logging In Through Ssh

    Step Command Remarks Optional. Specify the source IPv4 telnet client source { interface By default, no source IPv4 address address or source interface-type interface-number | ip or source interface is specified. interface for outgoing ip-address } The device automatically selects a Telnet packets.
  • Page 44: Configuring The Ssh Server On The Device

    Configuring the SSH server on the device When scheme authentication is used, you can choose to configure the command authorization and command accounting functions. If command authorization is enabled, a command is available only if the user has the commensurate user privilege level and is authorized by the AAA scheme to use the command.
  • Page 45: Using The Device To Log In To An Ssh Server

    Step Command Remarks Optional. By default, command accounting is Enable command accounting. command accounting disabled. The accounting server does not record the commands executed by users. Exit to system view. quit Enter the ISP domain view: Optional. domain domain-name For local authentication, configure Apply the specified AAA local user accounts.
  • Page 46: Displaying And Maintaining Cli Login

    About the { aux | console | vty } num2 ] Display user interface information. HP 830 Series PoE+ Unified [ summary ] [ | { begin | exclude | Wired-WLAN Switch and HP include } regular-expression ]...
  • Page 47 | vty } num2 } Support for the aux keyword depends on the device model. For more information, see About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Command References. Available in user view.
  • Page 48: Logging In To The Web Interface

    The 10500/7500 20G unified wired-WLAN module provides a built-in Web server for you to configure it through a Web browser. The HP 830 Series PoE+ unified wired-WLAN switch provides two built-in Web servers: one on the access controller engine, and one on the switching engine. For information about how to log in to the Web interface of the switching engine, see HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Fundamentals Configuration Guide.
  • Page 49: Configuring Https Login

    Step Command Remarks Optional. The default HTTP service port is 80. Configure the HTTP service ip http port port-number If you execute the command port number. multiple times, the most recent configuration takes effect. Optional. By default, the HTTP service is not associated with any ACL.
  • Page 50 Step Command Remarks By default, the HTTPS service is not associated with any SSL server policy. If you disable the HTTPS service, the system automatically de-associates the Associate the HTTPS HTTPS service from the SSL service ip https ssl-server-policy service with an SSL server policy.
  • Page 51: Displaying And Maintaining Web Login

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same.
  • Page 52: Http Login Configuration Example

    HTTP login configuration example Network requirements As shown in Figure 15, configure the AC so the PC can log in to the AC's Web interface through HTTP. Figure 15 Network diagram Configuration procedure Configure the switch hosting the 10500/7500 20G unified wired-WLAN module: # Create VLAN 200 (used for remote login), and add the interface connected to the PC to the VLAN.
  • Page 53: Https Login Configuration Example

    Figure 16 Web login page # Type the user name, password, and verify code. Then, click Login. The homepage appears. After login, you can configure the AC settings through the Web interface. HTTPS login configuration example Network requirements As shown in Figure 17, to prevent unauthorized users from accessing the AC's Web interface, configure the AC as the HTTPS server and the host as the HTTPS client, and request a certificate for each of them.
  • Page 54 [AC-pki-domain-1] ca identifier new-ca [AC-pki-domain-1] certificate request url http://10.1.2.2/certsrv/mscep/mscep.dll [AC-pki-domain-1] certificate request from ra [AC-pki-domain-1] certificate request entity en [AC-pki-domain-1] quit # Create RSA local key pairs. [AC] public-key local create rsa # Retrieve the CA certificate from the certificate issuing server. [AC] pki retrieval-certificate ca domain 1 # Request a local certificate from a CA through SCEP for the AC.
  • Page 55 Enter https://10.1.1.1 in the address bar, and select the certificate issued by new-ca. Then the Web login page of the AC appears. On the login page, type the username usera and password 123 to enter the Web management page. For more information about PKI configuration commands, SSL configuration commands, and the public-key local create rsa command, see Security Command Reference.
  • Page 56: Logging In Through Snmp

    Logging in through SNMP You can run SNMP on an NMS to access the device MIB and perform GET and SET operations to manage and monitor the device. The device supports SNMPv1, SNMPv2c, and SNMPv3, and can work with various network management software products, including IMC. For more information about SNMP, see Network Management and Monitoring Configuration Guide.
  • Page 57: Configuring Snmpv1 Or Snmpv2C Settings

    Step Command Remarks snmp-agent group v3 group-name Configure an SNMP [ authentication | privacy ] By default, no SNMP group is group and specify its [ read-view read-view ] [ write-view configured. access right. write-view ] [ notify-view notify-view ] [ acl acl-number ] snmp-agent usm-user v3 user-name group-name [ [ cipher ] If you specify the cipher keyword, the...
  • Page 58: Nms Login Example

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements Configure the AC and NMS so you can remotely manage the AC through SNMPv3.
  • Page 59: Controlling User Logins

    Controlling user logins Use ACLs to prevent unauthorized logins. For more information about ACLs, see ACL and QoS Configuration Guide. Controlling Telnet logins Use a basic ACL (2000 to 2999) to filter Telnet traffic by source IP address. Use an advanced ACL (3000 to 3999) to filter Telnet traffic by source and/or destination IP address.
  • Page 60: Configuring Source/Destination Ip-Based Telnet Login Control

    Step Command Remarks rule [ rule-id ] { deny | permit } [ counting | fragment | logging | source { sour-addr By default, a basic ACL Configure an ACL rule. sour-wildcard | any } | time-range does not contain any rule. time-range-name ] * Exit the basic ACL view.
  • Page 61: Telnet Login Control Configuration Example

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 62: Configuring Source Ip-Based Snmp Login Control

    # Reference ACL 2000 on user interfaces VTY 0 through VTY 4 so only Host A and Host B can Telnet to the AC. [AC] user-interface vty 0 4 [AC-ui-vty0-4] acl 2000 inbound Configuring source IP-based SNMP login control Use a basic ACL (2000 to 2999) to control SNMP logins by source IP address. To access the requested MIB view, an NMS must use a source IP address permitted by the ACL.
  • Page 63: Snmp Login Control Configuration Example

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 64: Configuring Source Ip-Based Web Login Control

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 65 Figure 22 Network diagram Configuration procedure # Create ACL 2000, and configure rule 1 to permit packets sourced from Host B. <AC> system-view [AC] acl number 2030 match-order config [AC-acl-basic-2030] rule 1 permit source 10.110.100.52 0 [AC-acl-basic-2030] quit # Associate the ACL with the HTTP service so only the Web users on Host B can access the AC. [AC] ip http acl 2030...
  • Page 66: Configuring Ftp

    Configuring FTP File Transfer Protocol (FTP) is an application layer protocol based on the client/server model. It is used to transfer files from one host to another over a TCP/IP network. FTP server uses TCP port 20 to transfer data and TCP port 21 to transfer control commands. For more information about FTP, see RFC 959.
  • Page 67: Managing Directories On The Ftp Server

    IP address is used as the source IP address for the FTP packets sent by the device. The source interface and source IP address settings overwrite each other. The ftp client source command setting applies to all FTP sessions. When you set up an FTP session using the ftp or ftp ipv6 command, you can also specify a different source IP address for the FTP session.
  • Page 68: Working With The Files On The Ftp Server

    Task Command Display detailed information about a directory or file on the FTP dir [ remotefile [ localfile ] ] server. Query a directory or file on the FTP server. ls [ remotefile [ localfile ] ] Change the working directory on the FTP server. cd { directory | ..
  • Page 69: Switching To Another User Account

    Task Command Remarks Upload a file to the FTP server. put localfile [ remotefile ] Download a file from the FTP get remotefile [ localfile ] server. Switching to another user account After you log in to the FTP server with one user account, you can switch to another user account to obtain a different privilege without reestablishing the FTP connection.
  • Page 70 By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 71: Using The Device As An Ftp Server

    125 ASCII mode data connection already open, transfer starting for /config.cfg. 226 Transfer complete. FTP: 3494 byte(s) sent in 5.646 second(s), 618.00 byte(s)/sec. [ftp] bye 221 Server closing. # Specify newest.bin as the main system software image file for the next startup. <AC>...
  • Page 72: Configuring Authentication And Authorization

    Step Command Remarks Enable the FTP server. ftp server enable By default, the FTP server is disabled. Optional. Use an ACL to control FTP ftp server acl acl-number By default, no ACL is used for access access to the server. control.
  • Page 73: Ftp Server Configuration Example

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 74 [AC-luser-abc] service-type ftp [AC-luser-abc] quit # Enable the FTP server. [AC] ftp server enable [AC] quit # Examine the storage space for space insufficiency and delete unused files for more free space. <AC> dir Directory of cfa0:/ -rw- 63857248 Dec 07 2012 16:00:50 main.bin -rw- Dec 07 2012 16:03:52...
  • Page 75: Displaying And Maintaining Ftp

    IMPORTANT: The system software image file used for the next startup and the startup configuration file must be saved in the Flash root directory. You can copy or move a file to the Flash root directory. # Reboot the AC and the system software image file is updated at the system reboot. <AC>...
  • Page 76: Configuring Tftp

    Configuring TFTP Trivial File Transfer Protocol (TFTP) is a simplified version of FTP for file transfer over secure reliable networks. TFTP uses UDP port 69 for data transmission. In contrast to TCP-based FTP, TFTP does not require authentication or complex message exchanges, and is easier to deploy. TFTP supports the following transfer modes: Binary mode—Used to transfer image files, such as .app, .bin, and .btm files.
  • Page 77: Displaying And Maintaining The Tftp Client

    When configuring the 10500/7500 20G unified wired-WLAN module, make sure the settings are correct (including VLAN settings) on the internal Ethernet interface that connects the module to the switch. For more information, see HP 10500/7500 20G Unified Wired-WLAN Module Fundamentals Configuration Guide.
  • Page 78 By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same. Network requirements...
  • Page 79: Managing The File System

    Your device might have a Flash, a CF card, or both, depending on your device model. For more information, see About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Configuration Guides.
  • Page 80: Displaying File Information

    You can display directory and file information, display file contents, and rename, copy, move, remove, restore, and delete files. The copy operation enables you to create a file. You can also create a file by performing the download operation or using the save command. Displaying file information Perform this task in user view.
  • Page 81: Deleting/Restoring A File

    The digest of a file can be used to verify the file integrity. For example, you can calculate the digest of a software image file and compare it with that the file digest provided on the HP website to verify whether the file has been tampered with.
  • Page 82: Displaying The Current Working Directory

    Task Command Display directory or file dir [ /all ] [ file-url | /all-filesystems ] information. Displaying the current working directory Perform this task in user view. Task Command Display the current working directory. Changing the current working directory Perform this task in user view. Task Command Change the current working...
  • Page 83: Managing Storage Media

    Managing storage media CAUTION: After a storage medium is formatted, all files on it are erased and cannot be restored. If a startup configuration file exists on the storage medium, formatting the storage medium results in loss of the startup configuration file.
  • Page 84: File System Management Examples

    Step Command Remarks Optional. Set the file system operation file prompt { alert | quiet } mode. The default is alert. File system management examples # Display the files and the subdirectories in the current directory. <Sysname> dir Directory of cfa0:/ -rw- 20669704 Jan 12 2012 15:17:24...
  • Page 85: Managing Configuration Files

    Managing configuration files You can use the CLI or the BootWare menus to manage configuration files. This chapter only describes managing configuration files from the CLI. Overview A configuration file saves configurations as a set of text commands. You can save the running configuration to a configuration file so the configuration takes effect after you reboot the device.
  • Page 86: Configuration File Content Organization And Format

    The configuration file ends with the word return. You can execute the save command to save the running configuration to a configuration file. To make sure the configuration file can be loaded, HP recommends that you not edit the content and format of the configuration file.
  • Page 87: Saving Configuration By Using Different Methods

    Private key method—Only the device that encrypts the configuration file can decrypt the file. • • Public key method—Any device that supports the configuration encryption function can decrypt the encrypted configuration file. To view encrypted configuration, use the display saved-configuration command instead of the more command.
  • Page 88: Using Automatic Configuration Backup After A Software Upgrade

    Using automatic configuration backup after a software upgrade After a software upgrade, the system by default starts up with the next-startup configuration file created on the old software version, but the system does not load settings that are incompatible with the new software version to the current configuration.
  • Page 89: Restoring The Next-Startup Configuration File From A Tftp Server

    Step Command Remarks Optional. Verify that the next-startup configuration file has If no next-startup configuration file has display startup been specified in user been specified, the backup operation will view. fail. Optional. Verify that the specified If the specified next-startup configuration configuration file exists on file does not exist on the device, the the device.
  • Page 90: Displaying And Maintaining Configuration Files

    Perform the following task in user view: Task Command Delete the next-startup configuration file. reset saved-configuration Displaying and maintaining configuration files Task Command Remarks display current-configuration [ configuration [ configuration ] | interface [ interface-type Display the running configuration. Available in any view. [ interface-number ] ] | exclude modules ] [ by-linenum ] [ | { begin | exclude | include } regular-expression ]...
  • Page 91: Upgrading Software

    Upgrading software Upgrading software includes upgrading the BootWare (called "bootrom" in CLI) and system software. Each time the device is powered on, it runs the BootWare image to initialize hardware and display hardware information, and then runs the system software image (called the "boot file" in software code) so you can access the software features, as shown in Figure NOTE:...
  • Page 92: Upgrading Bootware

    Upgrading method Software types Remarks • BootWare image • This method is disruptive. You must reboot the entire System software Upgrading the software device to complete the upgrade. image (excluding patches) Hotfixes repair software defects without requiring a reboot or service interruption. Installing hotfixes System software image Hotfixes do not add new features to system software...
  • Page 93: Basic Concepts

    Basic concepts This section describes the basic patch concepts. Patch, patch file, and patch package file A patch fixes certain software defects. A patch file contains one or more patches. After being loaded from the storage medium to the patch memory area, each patch is assigned a unique number, which starts from 1.
  • Page 94 Figure 29 Impact of patch manipulation commands on patch state   IDLE state Patches that have not been loaded are in IDLE state. You cannot install or run these patches. As shown Figure 30, the patch memory area can load up to eight patches. The patch memory area supports up to 200 patches.
  • Page 95 Figure 31 Patch states in the patch memory area after a patch file is loaded ACTIVE state Patches in ACTIVE state run temporarily in the system and become DEACTIVE at a reboot. For example, for the seven patches in Figure 31, if you activate the first five patches, their states change from DEACTIVE to ACTIVE.
  • Page 96: Patch Installation Task List

    The default system patch file name is patch_mpu.bin for all WLAN-supported cards except for the HP 830 switching engine. Installing and running a patch in one step To install and run patches in one step, use the patch install command. This command changes the state of installed patches from IDLE to ACTIVE or RUNNING, depending on your choice.
  • Page 97: Installing A Patch Step By Step

    Step Command Remarks Enter system view. system-view • patch-location: Specifies the directory where the patch file is patch install { patch-location | file located. Install patches in one step. patch-package } • file patch-package: Specifies a patch package file name. If you execute the patch install patch-location command, the directory specified for the patch-location argument replaces the directory specified with the patch location command after the upgrade is complete.
  • Page 98: Uninstalling A Patch Step By Step

    Loading a patch file You must load the correct patch file before performing any patch installation operations. If you install a patch from a patch file, the system loads the patch file from the patch file location, which is the root directory of the storage medium. If you install a patch from a patch package, the system finds the correct patch file in the patch package file and loads the patch file.
  • Page 99: Displaying And Maintaining Software Upgrade

    By default, the aggregate interfaces between the access controller engine and the switching engine on an 830 switch are Access interfaces in VLAN 1. When configuring the two aggregate interfaces, make sure their permitted VLANs are the same. HP also recommends setting their link type to be the same.
  • Page 100: Upgrading The System Software

    Upgrading the system software Network requirement As shown in Figure 34, the current system software version of the AC is soft-version1. The latest system software image soft-version2.bin and the latest configuration file new-config.cfg are both saved in the aaa directory of the FTP server. The AC and the FTP server can reach each other. You can log in to the AC through Telnet.
  • Page 101: Installing Patches

    Connected to 2.2.2.2. 220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user User(2.2.2.2:(none)):aaa 331 Give me your password, please Password: 230 Logged in successfully [ftp] # Download auto-update.txt from the FTP server. [ftp] ascii [ftp] get auto-update.txt # Download new-config.cfg from the FTP server.
  • Page 102 Configure the AC: # Use the save command to save the running configuration. (Details not shown.) # Examine the storage medium on the AC for space insufficiency. If the free space is not sufficient for the patches, delete unused files. (Details not shown.) # Load the patch file patch_mpu.bin from the TFTP server to the root directory of the device's storage medium.
  • Page 103: Dealing With Password Loss

    Dealing with password loss CAUTION: Dealing with console login password loss and user privilege level password loss from BootWare menus is disruptive. How to deal with console login password loss and user privilege level password loss depends on the state of password recovery capability (see Figure 36).
  • Page 104: Examining The State Of Password Recovery Capability

    System is starting... Press Ctrl+D to access BASIC-BOOTWARE MENU Booting Normal Extend BootWare.. The Extend BootWare is self-decompressing....... Done! **************************************************************************** HP WCMD BootWare, Version 2.00 **************************************************************************** Copyright (c) 2010-2013 Hewlett-Packard Development Company, L.P. Compiled Date : Jan 6 2013 CPU Type...
  • Page 105: Dealing With Console Login Password Loss When Password Recovery Capability Is Enabled

    BootWare password: Not required. Please press Enter to continue. Press Enter and read the password recovery capability state message displayed before the EXTEND-BOOTWARE menu. Password recovery capability is enabled. Note: The current operating device is cfa0 Enter < Storage Device Operation > to select device. ===========================<EXTEND-BOOTWARE MENU>=========================== |<1>...
  • Page 106: Dealing With User Privilege Level Password Loss When Password Recovery Capability Is Enabled

    Flag Set Success. When the EXTEND-BOOTWARE menu appears again, enter 0 to reboot the device. The device starts up with empty configuration. To use the configuration in the next-startup configuration file, load the file in system view. <Sysname> system-view [Sysname] configuration replace file startup.cfg Current configuration will be lost, save current configuration? [Y/N]:n Info: Now replacing the current configuration.
  • Page 107: Dealing With Password Loss When Password Recovery Capability Is Disabled

    The device deletes the user privilege level password configuration commands from the main next-startup configuration file. After the operation is completed, the following message appears: Clear Super Password Success! When the EXTEND-BOOTWARE menu appears again, enter 0 to reboot the device. The device starts up with the main next-startup configuration file.
  • Page 108 The device starts up with the factory-default configuration. Configure a new console login password (see "Configure a new console login password.") or new user privilege level passwords (see "Configure new passwords for user privilege levels."). To make the settings take effect after a reboot, save the running configuration to the next-startup configuration file.
  • Page 109: Managing Licenses

    License-based features require licenses to run on your device. You can use the display license command to view the current registration state of a feature. For more information about license registration, see HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module License Registration and Activation Guide.
  • Page 110: Managing The Device

    Storage media include Flash and CF card. Different devices support different storage media. For more information, see About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Configuration Guides. The examples in this chapter uses the CF card.
  • Page 111: Changing The System Time

    Configure the device name. sysname sysname The default device name is HP. Changing the system time You must synchronize your device with a trusted time source by using NTP or changing the system time before you run it on the network. Network management depends on an accurate system time setting, because the timestamps of system messages and logs use the system time.
  • Page 112: Configuration Example

    Command Effective system time Configuration example System time 03:00:00 ss Sat 01/01/2005. If the original system time plus summer-offset is The original system time beyond the daylight saving in the daylight saving time clock summer-time ss time range, the original range: one-off 00:30 system time does not...
  • Page 113: Configuration Procedure

    Command Effective system time Configuration example System time Original system clock ± zone-offset outside the clock timezone daylight saving time zone-time add 1 System clock configured: range: 04:00:00 ss Sat clock summer-time ss one-off 1:00 01/01/2005. Original system clock ± 2005/1/1 1:00 zone-offset + 2005/8/8 2...
  • Page 114: Enabling Displaying The Copyright Statement

    Step Command Remarks Optional. Set the system time and date. clock datetime time date Available in user view. Enter system view. system-view Optional. clock timezone zone-name { add | Set the time zone. Coordinated UTC time zone by minus } zone-offset default.
  • Page 115: Banner Input Methods

    Banner input methods You can configure a single-line banner or a multi-line banner: • Single-line banner. A single-line banner must be input in the same line as the command. The start and end delimiters for the banner can be any printable character, but they must be the same and must not be included in the banner.
  • Page 116: Configuring The Maximum Number Of Concurrent Users

    Step Command Remarks Configure the incoming header incoming text Optional. banner. Configure the login banner. header login text Optional. Configure the legal banner. header legal text Optional. Configure the shell banner. header shell text Optional. Configure the MOTD banner. header motd text Optional.
  • Page 117: Rebooting The Device

    Rebooting the device CAUTION: Device reboot can interrupt network services. • To avoid data loss, use the save command to save the current configuration before a reboot. • Use the display startup and display boot-loader commands to verify that you have correctly set the •...
  • Page 118: Scheduling Jobs

    Scheduling jobs You can schedule a job to automatically run a command or a set of commands without administrative interference. The commands in a job are polled every minute. When the scheduled time for a command is reached, the job automatically executes the command. If a confirmation is required while the command is running, the system automatically enters Y or Yes.
  • Page 119: Scheduling A Job In The Non-Modular Approach

    Every job can have only one view and up to 10 commands. If you specify multiple views, the most recently specified view takes effect. Enter a view name in its complete form. Most commonly used view names include monitor for user view, system for system view, GigabitEthernet x/x/x for Ethernet interface view, and Vlan-interfacex for VLAN interface view.
  • Page 120: Setting The Port Status Detection Timer

    LED on the device panel. Support for this feature depends on your device model. For more information, see About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/7500 20G Unified Wired-WLAN Module Configuration Guides.
  • Page 121: Configuring The Alarm Resend Function

    Configuring the alarm resend function When an AP is running, it may encounter high CPU usage or high memory usage. If you do not configure the alarm resend function on the wired-WLAN switch, the switch does not collect CPU or memory statistics or send the statistics though you can use the display cpu or display memory command to view such information.
  • Page 122: Clearing Unused 16-Bit Interface Indexes

    NMS of the new IP address. The IP address changes of the interface not under monitor will be ignored. The device preferentially monitors the primary interface. HP recommends you specify the interface that has better route or more reliable link as the primary.
  • Page 123: Displaying And Maintaining Device Management

    For more information, see About Display device temperature display environment [ cpu ] [ | { begin | the HP 830 Series PoE+ Unified information. exclude | include } regular-expression ] Wired-WLAN Switch and HP...
  • Page 124 For more information, see About Display the operating states of display fan [ fan-id ] [ | { begin | the HP 830 Series PoE+ Unified fans. exclude | include } regular-expression ] Wired-WLAN Switch and HP...
  • Page 125: Support And Other Resources

    Related information Documents To find related documents, browse to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals For related documentation, navigate to the Networking section, and select a networking category. •...
  • Page 126: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 127 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 128: Index

    10 Managing storage media,77 Configuring user privilege and command levels,13 Monitoring an NMS-connected interface,1 15 Configuring Web login control,57 Contacting HP,1 19 NMS login example,52 Controlling Telnet logins,53 Controlling the CLI output,9 Conventions,120 Overview,103 Overview,79 Overview,104 Deleting the next-startup configuration...
  • Page 129 Rebooting the device,1 1 1 Registering a feature,103 TFTP client configuration example,71 Related information,1 19 Restoring the next-startup configuration file from a TFTP Understanding command-line error messages,8 server,83 Upgrading BootWare,86 Upgrading system software,86 Saving the running configuration,19 Using the command history function,8 Saving the running configuration,80...

This manual is also suitable for:

105007500

Table of Contents