Sign In
Upload
Manuals
Brands
HP Manuals
Switch
ProCurve 6200yl-24G
HP ProCurve 6200yl-24G Manuals
Manuals and User Guides for HP ProCurve 6200yl-24G. We have
3
HP ProCurve 6200yl-24G manuals available for free PDF download: Advanced Traffic Management Manual, Access Security Manual, Product End-Of-Life Disassembly Instructions
HP ProCurve 6200yl-24G Advanced Traffic Management Manual (460 pages)
Switch Software
Brand:
HP
| Category:
Switch
| Size: 2.21 MB
Table of Contents
Table of Contents
5
Product Documentation
15
About Your Switch Manual Set
15
Electronic Publications
15
Software Feature Index
16
1 Static Virtual Lans (Vlans)
23
Overview
23
Introduction
24
General VLAN Operation
24
Types of Static Vlans Available in the Switch
25
Designated Vlans
25
Port-Based Vlans
25
Protocol-Based Vlans
25
Terminology
26
Static VLAN Operation
27
VLAN Environments
28
VLAN Operation
29
Routing Options for Vlans
30
Overlapping (Tagged) Vlans
31
Per-Port Static VLAN Configuration Options
33
VLAN Operating Rules
34
General Steps for Using Vlans
38
Multiple VLAN Considerations
39
Single Forwarding Database Operation
40
Example of an Unsupported Configuration and How to Correct It
41
Multiple Forwarding Database Operation
42
Configuring Vlans
43
Menu: Configuring Port-Based VLAN Parameters
43
To Change VLAN Support Settings
44
Adding or Editing VLAN Names
45
Adding or Changing a VLAN Port Assignment
47
CLI: Configuring Port-Based and Protocol-Based VLAN Parameters
49
Customizing the Show Vlans Output
56
Creating an Alias for Show VLAN Commands
58
Note on Using Pattern Matching with the "Show Vlans Custom" Command
58
Changing the Number of Vlans Allowed on the Switch
59
Webagent: Viewing and Configuring VLAN Parameters
65
802.1Q VLAN Tagging
66
Special VLAN Types
71
VLAN Support and the Default VLAN
71
The Primary VLAN
71
The Secure Management VLAN
72
Preparation
74
Configuration
75
Using DHCP to Obtain an IP Address
76
Deleting the Management VLAN
79
Operating Notes for Management Vlans
79
Voice Vlans
80
Operating Rules for Voice Vlans
80
Components of Voice VLAN Operation
81
Voice VLAN Qos Prioritizing (Optional)
81
Voice VLAN Access Security
82
Effect of Vlans on Other Switch Features
82
Spanning Tree Operation with Vlans
82
IP Interfaces
83
VLAN MAC Address
83
Port Trunks
83
Port Monitoring
83
Jumbo Packet Support
83
VLAN Restrictions
84
Migrating Layer 3 Vlans Using VLAN MAC Configuration
85
VLAN MAC Address Reconfiguration
85
Handling Incoming and Outgoing VLAN Traffic
86
Sending Heartbeat Packets with a Configured MAC Address
87
Configuring a VLAN MAC Address with Heartbeat Interval
88
Operating Notes
88
Example
89
Verifying a VLAN MAC Address Configuration
89
2 Gvrp
91
Overview
91
Introduction
92
General Operation
93
Per-Port Options for Handling GVRP "Unknown Vlans
96
Per-Port Options for Dynamic VLAN Advertising and Joining
98
GVRP and VLAN Access Control
100
Advertisements and Dynamic Joins
100
Port-Leave from a Dynamic VLAN
100
Planning for GVRP Operation
101
Configuring GVRP on a Switch
102
Menu: Viewing and Configuring GVRP
102
CLI: Viewing and Configuring GVRP
103
Web: Viewing and Configuring GVRP
107
GVRP Operating Notes
107
3 Multiple Instance Spanning-Tree Operation
109
Overview
109
Multiple Spanning Tree Protocol (MSTP)
112
MSTP Structure
113
How MSTP Operates
115
MST Regions
115
Regions, Legacy STP and RSTP Switches, and the Common Spanning Tree (CST)
117
MSTP Operation with 802.1Q Vlans
118
Terminology
119
Operating Rules
121
MSTP Compatibility with RSTP or STP
122
Configuring MSTP
123
Planning an MSTP Application
123
MSTP Configuration Overview
125
Configuring MSTP Operation Mode and Global Settings
127
Configuring MSTP Per-Port Parameters
132
Configuring Per Port Parameters
133
Configuring BPDU Filtering
136
Configuring BPDU Protection
137
PVST Protection and Filtering
140
Configuring MST Instance Parameters
145
Configuring MST Instance Per-Port Parameters
147
Enabling or Disabling Spanning Tree Operation
150
Enabling an Entire MST Region at Once or Exchanging One Region Configuration for Another
150
MSTP VLAN Configuration Enhancement
152
Preconfiguring Vlans in an MST Instance
153
Configuring MSTP Instances with the VLAN Range Option
154
Operating Notes for the VLAN Configuration Enhancement
156
How to Save Your Current Configuration
157
Displaying MSTP Statistics and Configuration
159
Displaying Global MSTP Status
160
Displaying Detailed Port Information
162
Displaying Status for a Specific MST Instance
163
Displaying the MSTP Configuration
164
Troubleshooting an MSTP Configuration
168
Displaying the Change History of Root Bridges
168
Displaying Debug Counters for All MST Instances
171
Displaying Debug Counters for One MST Instance
172
Displaying Debug Counters for Ports in an MST Instance
174
Field Descriptions in MSTP Debug Command Output
176
Troubleshooting MSTP Operation
179
Loop Protection
180
Configuring Loop Protection
182
Changing Modes
183
Loop Protection in Port Mode
183
Loop Protection in VLAN Mode
183
Operating Notes
184
Viewing Loop Protection Status
184
Displaying Loop Protection Status in Port Mode
184
Displaying Loop Protection Status in VLAN Mode
185
STP Loop Guard
186
4 Switch Meshing
193
Introduction
193
Switch Meshing Fundamentals
195
Terminology
195
Operating Rules
196
Using a Heterogeneous Switch Mesh
198
Bringing up a Switch Mesh Domain
199
Further Operating Information
199
Configuring Switch Meshing
200
Preparation
200
Menu: to Configure Switch Meshing
200
CLI: to Configure and View Switch Meshing
203
CLI: Configuring Switch Meshing
203
Viewing Switch Mesh Status
204
Operating Notes for Switch Meshing
209
Flooded Traffic
209
Unicast Packets with Unknown Destinations
210
Spanning Tree Operation with Switch Meshing
211
Filtering/Security in Meshed Switches
213
IP Multicast (IGMP) in Meshed Switches
213
Static Vlans
213
Dynamic Vlans
214
Jumbo Packets
214
Mesh Design Optimization
215
Other Requirements and Restrictions
216
5 Quality of Service: Managing Bandwidth more Effectively
219
Using Quality of Service Policies
219
Qos Terminology
222
Qos Operation
224
Globally-Configured Qos
225
Classifier-Based Qos
226
Qos Packet Classification
227
Globally-Configured Packet Classification
227
Classifier-Based Match Criteria
228
Qos Traffic Marking
229
Globally-Configured Traffic Marking
229
Layer 2 802.1P Prioritization
229
Layer 3 DSCP Marking
231
VLAN and Untagged VLAN Environments
232
Classifier-Based Traffic Marking
233
Globally-Configured Qos
234
Global Qos Configuration Procedure
234
Viewing a Global Qos Configuration
236
Global Qos Restrictions
237
Global TCP/UDP Classifier
239
Assigning an 802.1P Priority for a Global TCP/UDP Classifier
240
Operating Notes on Using TCP/UDP Port Ranges
241
Assigning a DSCP Policy for a Global TCP/UDP Classifier
242
Displaying Resource Usage for Qos Policies
248
Global IP-Device Classifier
250
Assigning a Priority for a Global IP-Device Classifier
251
Assigning a DSCP Policy for a Global IP-Device Classifier
253
Global IP Type-Of-Service Classifier
258
Ipv4 Tos/Ipv6 Traffic Class Byte
259
Assigning an 802.1P Priority for a Global IP-Precedence Classifier
261
Assigning an 802.1P Priority for a Global IP-Diffserv Classifier
262
Assigning a DSCP Policy for a Global IP-Diffserv Classifier
266
Comparison of Global IP Type-Of-Service Classifiers
270
Global Layer-3 Protocol Classifier
271
Assigning a Priority for a Global Layer-3 Protocol Classifier
271
Global VLAN-ID Classifier
273
Assigning a Priority for a Global VLAN-ID Classifier
273
Assigning a DSCP Policy for a Global VLAN-ID Classifier
275
Global Source-Port Classifier
280
Assigning a Priority for a Global Source-Port Classifier
280
Assigning a DSCP Policy for a Global Source-Port Classifier
282
IP Multicast (IGMP) Interaction with Qos
288
Advanced Classifier-Based Qos
289
Classifier-Based Qos Model
290
Classifier-Based Qos Configuration Procedure
290
Configuring Qos Actions in a Policy
295
Override of Global Qos Settings
300
Viewing a Classifier-Based Qos Configuration
301
Classifier-Based Qos Restrictions
305
Interaction with Other Software Features
305
Classifier-Based Qos Configuration Examples
306
Qos Policy for Layer 4 TCP/UDP Traffic
307
Qos Policy for Subnet Traffic
307
Differentiated Services Codepoint (DSCP) Mapping
308
Default Priority Settings for Selected Codepoints
309
Displaying Non-Default Codepoint Settings
310
Notes on Changing a Priority Setting
311
Error Messages for DSCP Policy Changes
312
Example of Changing the Priority Setting on a Policy When One or more Classifiers Are Currently Using the Policy
313
Qos Queue Configuration
315
Mapping of Outbound Port Queues
316
Impact of Qos Queue Configuration on Guaranteed Minimum Bandwidth (GMB)
316
Minimum Guaranteed Bandwidth with 8 Queues
317
Configuring the Number of Priority Queues
318
Viewing the Qos Queue Configuration
319
6 Stack Management for the 3500, 3500Yl, 6200Yl and 6600 Switches
321
Introduction to Stack Management on the 3500, 3500Yl, 6200Yl and 6600 Switches
321
Components of HP Stack Management
323
General Stacking Operation
323
Operating Rules for Stacking
325
General Rules
325
Specific Rules
326
Configuring Stack Management
327
Overview of Configuring and Bringing up a Stack
327
General Steps for Creating a Stack
329
Using the Menu Interface to View Stack Status and Configure Stacking
331
Using the Menu Interface to View and Configure a Commander Switch
331
Using the Menu to Manage a Candidate Switch
333
Using the Commander to Manage the Stack
335
Using the Commander to Access Member Switches for Configuration Changes and Monitoring Traffic
341
Converting a Commander or Member to a Member of Another Stack
342
Monitoring Stack Status
343
Using the CLI to View Stack Status and Configure Stacking
347
Using the CLI to View Stack Status
349
Using the CLI to Configure a Commander Switch
351
Adding to a Stack or Moving Switches between Stacks
353
Using the CLI to Remove a Member from a Stack
358
Using the CLI to Access Member Switches for Configuration Changes and Traffic Monitoring
360
SNMP Community Operation in a Stack
362
Using the CLI to Disable or Re-Enable Stacking
363
Transmission Interval
363
Stacking Operation with Multiple Vlans Configured
363
Status Messages
364
7 Qinq (Provider Bridging)
365
Overview
365
Introduction
366
How Qinq Works
367
Terminology
368
Operating Rules and Guidelines
369
Enabling Qinq and Configuring Qinq Modes
369
Configuring Vlans
370
Qinq Mixed Vlan Mode
370
Operating Notes and Restrictions
372
Configuring Qinq
375
General Configuration Steps
375
Enabling Qinq
376
Setting up S-Vlans
376
Configuring Per-Port S-VLAN Membership
377
Configuring Port-Types
378
Configuration Example
379
Updating Qinq Configurations
384
Changing Qinq Modes
384
Disabling Qinq
384
Changing VLAN Port Memberships (Mixed Vlan Mode)
384
Moving Ports between C-Vlans and S-Vlans (Mixed Vlan Mode)
385
Displaying Qinq Config and Status
386
Show Commands for Qinq
386
Show Commands for Vlans
387
Displaying Spanning Tree Status
389
Effects of Qinq on Other Switch Features
390
Event Log Messages
396
8 Classifier-Based Software Configuration
397
Introduction
397
Traffic Classes
398
Traffic Class-Based Configuration Model
398
Creating a Traffic Class
400
Using Match Criteria
400
Traffic Class Configuration Procedure
401
Optional ICMP Match Criteria
410
Optional IGMP Match Criteria
413
Optional TCP and UDP Match Criteria
414
Using CIDR Notation for Ipv4/Ipv6 Addresses
416
Resequencing Match/Ignore Statements
420
Creating a Service Policy
421
Creating a PBR Policy
425
Troubleshooting PBR
427
Modifying Classes in a Policy
427
Resequencing Classes in a Policy
429
Applying a Service Policy to an Interface
430
Displaying Statistics for a Policy
433
Where to Go from here
434
Zone Classes
435
Zone Class-Based Configuration
436
Creating a Zone Class
437
Creating a Zone Policy
439
Modifying Zones and Policies
441
Applying a Zone Policy to a ONE Application
442
Troubleshooting Problems
444
Where to Go from here
445
Index
447
Advertisement
HP ProCurve 6200yl-24G Access Security Manual (390 pages)
Brand:
HP
| Category:
Switch
| Size: 5.58 MB
Table of Contents
Table of Contents
5
Product Documentation
17
About Your Switch Manual Set
17
Feature Index
18
Getting Started
23
Contents
23
Introduction
24
Conventions
24
Feature Descriptions by Model
24
Command Syntax Statements
25
Command Prompts
25
Screen Simulations
26
Port Identity Examples
26
Configuration and Operation Examples
26
Keys
26
Sources for more Information
27
Getting Documentation from the Web
29
Online Help
29
Need Only a Quick Start
30
IP Addressing
30
To Set up and Install the Switch in Your Network
31
Physical Installation
31
Premium Edge Switch Features
31
Overview of Access Security Features
32
General Switch Traffic Security Guideline
33
Applications for Access Control Lists (Acls)
34
Configuring Username and Password Security/
35
Configuring Username and Password Security
35
Contents
35
Overview
36
Configuring Local Password Security
39
Menu: Setting Passwords
39
CLI: Setting Passwords and Usernames
41
Front-Panel Security
42
Web: Setting Passwords and Usernames
42
When Security Is Important
43
Clear Button
44
Front-Panel Button Functions
44
Reset Button
45
Restoring the Factory Default Configuration
45
Configuring Front-Panel Security
46
Disabling the Clear Password Function of the Clear Button
48
Disabling the Clear Password Function of the Clear Button on the Switch's Front Panel
48
On the Switch's Front Panel
48
And Setting or Changing the "Reset-On-Clear" Operation
50
Re-Enabling the Clear Button on the Switch's Front Panel
50
Re-Enabling the Clear Button on the Switch's Front Panel and Setting or Changing the "Reset-On-Clear" Operation
50
Changing the Operation of the Reset+Clear Combination
51
Disabling or Re-Enabling the Password Recovery Process
52
Password Recovery
52
Password Recovery Process
54
Virus Throttling/
57
Contents
57
Virus Throttling
57
Introduction
59
Filtering Options
61
General Operation of Connection-Rate Filtering
61
Application Options
62
Sensitivity to Connection Rate Detection
62
Terminology
63
Operating Rules
64
For a Network that Is Relatively Attack-Free
65
General Configuration Guidelines
65
For a Network that Appears to be under Significant Attack
66
Basic Connection-Rate Filtering Configuration
67
Global and Per-Port Configuration
67
Enabling Connection-Rate Filtering and Configuring Sensitivity
68
Configuring the Per-Port Filtering Mode
69
Example of a Basic Connection-Rate Filtering Configuration
70
Viewing and Managing Connection-Rate Status
72
Viewing the Connection-Rate Configuration
72
Listing and Unblocking the Currently-Blocked Hosts
74
Configuring and Applying Connection-Rate Acls
76
Configuring and Applying Connection-Rate Acls
77
Connection-Rate ACL Operation
77
Configuring a Connection-Rate ACL Using
78
Configuring a Connection-Rate ACL Using Source IP Address Criteria
78
Source IP Address Criteria
78
Configuring a Connection-Rate ACL Using UDP/TCP Criteria
79
Applying Connection-Rate Acls
82
Using CIDR Notation to Enter the ACE Mask
82
Example of Using an ACL in a Connection-Rate Configuration
83
Operating Notes
86
Connection-Rate Log and Trap Messages
87
Web and Mac Authentication/
89
Contents
89
Web and MAC Authentication
89
Overview
90
Client Options
91
General Features
91
Authenticator Operation
93
How Web and MAC Authentication Operate
93
Web-Based Authentication
93
MAC-Based Authentication
95
Terminology
97
Operating Rules and Notes
98
Do These Steps before You Configure Web/Mac Authentication
100
General Setup Procedure for Web/Mac Authentication
100
Additional Information for Configuring the RADIUS
101
Additional Information for Configuring the RADIUS Server to Support MAC Authentication
101
Server to Support MAC Authentication
101
Configuring the Switch to Access a RADIUS Server
102
Configuring the Switch to Access a RADIUS Server
103
Configuring Web Authentication on the Switch
105
Overview
105
Configure the Switch for Web-Based Authentication
106
Configuring MAC Authentication on the Switch
110
Overview
110
Configure the Switch for MAC-Based Authentication
111
Show Status and Configuration of Web-Based Authentication
114
Show Status and Configuration of MAC-Based Authentication
115
Client Status
117
Tacacs+ Authentication/
119
Contents
119
TACACS+ Authentication
119
Overview
120
Terminology Used in TACACS Applications
121
General Authentication Setup Procedure
123
General System Requirements
123
General Authentication Setup Procedure
124
Before You Begin
126
Configuring TACACS+ on the Switch
126
CLI Commands Described in this Section
127
Viewing the Switch's Current Authentication Configuration
127
Server Contact Configuration
128
Viewing the Switch's Current TACACS
128
Viewing the Switch's Current TACACS+ Server Contact Configuration
128
Configuring the Switch's Authentication Methods
129
Configuring the Switch's TACACS+ Server Access
133
General Authentication Process Using a TACACS+ Server
138
How Authentication Operates
138
Local Authentication Process
140
Encryption Options in the Switch
141
General Operation
141
Using the Encryption Key
141
Access When Using TACACS+ Authentication
142
Controlling Web Browser Interface
142
Messages Related to TACACS+ Operation
143
Operating Notes
143
Table of Contents
145
Authentication Services
147
Overview
147
Accounting Services
148
RADIUS-Administered Cos and Rate-Limiting
148
Terminology
148
Switch Operating Rules for RADIUS
149
General RADIUS Setup Procedure
151
Configuring the Switch for RADIUS Authentication
152
Outline of the Steps for Configuring RADIUS Authentication
153
Configure Authentication for the Access Methods
154
You Want RADIUS to Protect
154
Enable the (Optional) Access Privilege Option
156
Configure the Switch to Access a RADIUS Server
157
Configure the Switch's Global RADIUS Parameters
159
Local Authentication Process
163
Controlling Web Browser Interface Access
164
Configuring RADIUS Accounting
165
Operating Rules for RADIUS Accounting
166
Configure the Switch to Access a RADIUS Server
167
Steps for Configuring RADIUS Accounting
167
Configure Accounting Types and the Controls for Sending Reports to the RADIUS Server
169
Optional) Configure Session Blocking and Interim Updating Options
171
RADIUS Authentication Statistics
175
Viewing RADIUS Statistics
175
Table of Contents
181
Overview
182
Terminology
183
Prerequisite for Using SSH
185
Public Key Formats
185
For Switch and Client Authentication
186
Steps for Configuring and Using SSH
186
General Operating Rules and Notes
188
Assigning a Local Login (Operator) and
189
Generating the Switch's Public and Private Key Pair
190
Providing the Switch's Public Key to Clients
192
Enabling SSH on the Switch and Anticipating SSH Client Contact Behavior
195
Configuring the Switch for SSH Authentication
198
Use an SSH Client to Access the Switch
201
Further Information on SSH Client Public-Key Authentication
202
Messages Related to SSH Operation
207
Table of Contents
209
Overview
210
Terminology
211
Prerequisite for Using SSL
213
Steps for Configuring and Using SSL for Switch and Client
213
General Operating Rules and Notes
214
Assigning a Local Login (Operator) and Enable (Manager)Password
215
Configuring the Switch for SSL Operation
215
Generating the Switch's Server Host Certificate
217
To Generate or Erase the Switch's Server Certificate
218
With the CLI
218
Comments on Certificate Fields
219
Generate a Self-Signed Host Certificate with the Web Browser
221
Interface
221
Generate a CA-Signed Server Host Certificate with the Web Browser Interface
223
Enabling SSL on the Switch and Anticipating SSL Browser Contact Behavior
225
Using the CLI Interface to Enable SSL
227
Using the Web Browser Interface to Enable SSL
227
Common Errors in SSL Setup
229
Table of Contents
231
Introduction
232
Overview
232
Filter Limits
233
Filter Types and Operation
233
Using Port Trunks with Filters
233
Operating Rules for Source-Port Filters
234
Source-Port Filters
234
Named Source-Port Filters
236
Operating Rules for Named Source-Port Filters
236
Defining and Configuring Named Source-Port Filters
237
Viewing a Named Source-Port Filter
238
Static Multicast Filters
245
Protocol Filters
246
Configuring Traffic/Security Filters
247
Configuring a Source-Port Traffic Filter
248
Configuring a Filter on a Port Trunk
249
Example of Creating a Source-Port Filter
249
Editing a Source-Port Filter
250
Configuring a Multicast or Protocol Traffic Filter
251
Filter Indexing
252
Displaying Traffic/Security Filters
253
Table of Contents
255
General Features
257
Overview
257
Why Use Port-Based or Client-Based Access Control
257
802.1X Client-Based Access Control
258
User Authentication Methods
258
802.1X Port-Based Access Control
259
Accounting
260
Alternative to Using a RADIUS Server
260
Example of the Authentication Process
263
General 802.1X Authenticator Operation
263
VLAN Membership Priority
264
General Operating Rules and Notes
266
Do These Steps before You Configure 802.1X Operation
268
General Setup Procedure for 802.1X Access Control
268
Overview: Configuring 802.1X Authentication on the Switch
269
Enable 802.1X Authentication on Selected Ports
271
Enable the Selected Ports as Authenticators and Enable the (Default) Port-Based Authentication
271
Specify Client-Based or Return to Port-Based 802.1X Authentication
272
Example: Configuring Client-Based 802.1X Authentication
273
Example: Configuring Port-Based 802.1X Authentication
273
Reconfigure Settings for Port-Access
273
Configure the 802.1X Authentication Method
275
Enter the RADIUS Host IP Address(Es)
276
Enable 802.1X Authentication on the Switch
277
Optionally Resetting Authenticator Operation
277
802.1X Open VLAN Mode
278
Introduction
278
VLAN Membership Priorities
279
Use Models for 802.1X Open VLAN Modes
280
Operating Rules for Authorized-Client and Unauthorized-Client Vlans
285
Setting up and Configuring 802.1X Open VLAN Mode
289
802.1X Open VLAN Operating Notes
293
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X-Authenticated Devices
294
Port-Security
295
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
296
Example
296
Supplicant Port Configuration
298
Displaying 802.1X Configuration, Statistics, and Counters
300
Show Commands for Port-Access Authenticator
300
Viewing 802.1X Open VLAN Mode Status
302
Show Commands for Port-Access Supplicant
306
How RADIUS/802.1X Authentication Affects VLAN Operation
307
Operating Notes
311
Messages Related to 802.1X Operation
312
Table of Contents
313
Basic Operation
316
Port Security
316
Blocking Unauthorized Traffic
317
Eavesdrop Protection
317
Trunk Group Exclusion
318
Planning Port Security
319
Configuring Port Security
324
Retention of Static Addresses
330
Differences between MAC Lockdown and Port Security
337
MAC Lockdown Operating Notes
338
Deploying MAC Lockdown
339
MAC Lockout
343
Port Security and MAC Lockout
345
Notice of Security Violations
346
Reading Intrusion Alerts and Resetting Alert Flags
346
Web: Displaying and Configuring Port Security Features
346
How the Intrusion Log Operates
347
Keeping the Intrusion Log Current by Resetting Alert Flags
348
Menu: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
349
CLI: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
350
Using the Event Log to Find Intrusion Alerts
352
Table of Contents
357
Overview
358
Access Levels
359
Defining Authorized Management Stations
360
Overview of IP Mask Operation
360
Menu: Viewing and Configuring IP Authorized Managers
361
CLI: Viewing and Configuring Authorized IP Managers
362
Listing the Switch's Current Authorized IP Manager(S)
362
Building IP Masks
365
Configuring One Station Per Authorized Manager IP Entry
365
Web: Configuring IP Authorized Managers
365
Configuring Multiple Stations Per Authorized Manager IP Entry
366
Additional Examples for Authorizing Multiple Stations
368
Operating Notes
368
Overview
372
Configuring Key Chain Management
373
Creating and Deleting Key Chain Entries
373
Assigning a Time-Independent Key to a Chain
374
Assigning Time-Dependent Keys to a Chain
375
HP ProCurve 6200yl-24G Product End-Of-Life Disassembly Instructions (2 pages)
Brand:
HP
| Category:
Switch
| Size: 0.04 MB
Advertisement
Advertisement
Related Products
HP 6200YL
HP ProCurve 6200yl-24G-mGBIC
HP Presario 6400 - Desktop PC
HP ProCurve 6108
HP ProCurve 6120G/XG
HP ProCurve 6600-24G
HP ProCurve 6600-24G-4XG
HP ProCurve 6600-48G
HP 6400cl
HP ProCurve 6120XG
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL