beautypg.com
Manuals
Brands
HP Manuals
Switch
FlexNetwork NJ5000
HP FlexNetwork NJ5000 Manuals
Manuals and User Guides for HP FlexNetwork NJ5000. We have
1
HP FlexNetwork NJ5000 manual available for free PDF download: User Manual
HP FlexNetwork NJ5000 User Manual (475 pages)
5G PoE+ Walljack
Brand:
HP
| Category:
Switch
| Size: 9.47 MB
Table of Contents
User Guide
1
Table of Contents
3
Overview
13
Accessing the Web Interface
13
Restrictions and Guidelines for Web-Based Login
13
Logging in to the Web Interface for the First Time
16
Logging out of the Web Interface
17
Using the Web Interface
18
Icons and Buttons
18
Page Display Function
19
Search Function
19
Sort Function
21
Feature Summary
22
Feature Menu Navigators for the Web Interface
22
Wizard Menu
22
Summary Menu
22
Device Menu
23
Network Menu
25
Authentication Menu
28
Security Menu
29
Qos Menu
29
Poe Menu
31
Features Configurable from the CLI
31
Manage-Mode
32
Poe Force-Power
32
Poe Legacy Enable
33
Configuration Wizard
35
Basic Service Setup
35
Entering the Configuration Wizard Homepage
35
Configuring System Parameters
35
Configuring Management IP Address
36
Finishing Configuration Wizard
38
Displaying System and Device Information
40
Displaying System Information
40
Displaying Basic System Information
40
Displaying the System Resource State
41
Displaying Recent System Logs
41
Setting the Refresh Period
41
Displaying Device Information
41
Configuring Basic Device Settings
43
Configuring System Name
43
Configuring Idle Timeout Period
43
Maintaining Devices
44
Software Upgrade
44
Device Reboot
45
Electronic Label
45
Diagnostic Information
46
Configuring System Time
47
Overview
47
Displaying the Current System Time
47
Manually Configuring the System Time
47
Configuring System Time by Using NTP
48
Configuring the Time Zone and Daylight Saving Time
49
System Time Configuration Example
50
Network Requirements
50
Configuring the System Time
50
Verifying the Configuration
51
Configuration Guidelines
51
Configuring Syslog
52
Displaying Syslogs
52
Setting the Log Host
53
Setting Buffer Capacity and Refresh Interval
54
Managing the Configuration
55
Backing up the Configuration
55
Restoring the Configuration
55
Saving the Configuration
56
Resetting the Configuration
57
Managing Files
58
Displaying Files
58
Downloading a File
58
Uploading a File
59
Removing a File
59
Specifying the Main Boot File
59
Managing Ports
60
Setting Operation Parameters for a Port
60
Displaying Port Operation Parameters
63
Displaying a Specified Operation Parameter for All Ports
63
Displaying All the Operation Parameters for a Port
63
Port Management Configuration Example
64
Network Requirements
64
Configuring the Switch
65
Configuring Port Mirroring
68
Terminology
68
Mirroring Source
68
Mirroring Destination
68
Mirroring Direction
68
Mirroring Group
68
Local Port Mirroring
68
Configuration Restrictions and Guidelines
69
Recommended Configuration Procedures
69
Configuring a Mirroring Group
70
Configuring Ports for the Mirroring Group
70
Local Port Mirroring Configuration Example
71
Network Requirements
71
Configuration Procedure
72
Managing Users
74
Adding a Local User
74
Setting the Super Password
75
Switching to the Management Level
76
Configuring a Loopback Test
77
Configuration Guidelines
77
Configuration Procedure
77
Configuring VCT
79
Overview
79
Testing Cable Status
79
Configuring the Flow Interval
80
Viewing Port Traffic Statistics
80
Configuring RMON
81
Overview
81
Working Mechanism
81
RMON Groups
81
RMON Configuration Task List
82
Configuring a Statistics Entry
84
Configuring a History Entry
85
Configuring an Event Entry
86
Configuring an Alarm Entry
87
Displaying RMON Statistics
89
Displaying RMON History Sampling Information
90
Displaying RMON Event Logs
92
RMON Configuration Example
92
Configuring Energy Saving
96
Configuring Energy Saving on a Port
96
Configuring SNMP
97
Overview
97
SNMP Mechanism
97
SNMP Protocol Versions
98
Recommended Configuration Procedure
98
Enabling SNMP Agent
99
Configuring an SNMP View
101
Creating an SNMP View
101
Adding Rules to an SNMP View
102
Configuring an SNMP Community
103
Configuring an SNMP Group
104
Configuring an SNMP User
105
Configuring SNMP Trap Function
107
Displaying SNMP Packet Statistics
108
Snmpv1/V2C Configuration Example
109
Snmpv3 Configuration Example
112
Displaying Interface Statistics
117
Configuring Vlans
118
Overview
118
VLAN Fundamentals
118
VLAN Types
119
Port-Based VLAN
119
Restrictions and Guidelines
121
Recommended VLAN Configuration Procedures
121
Recommended Configuration Procedure for Assigning an Access Port to a VLAN
121
Recommended Configuration Procedure for Assigning a Trunk Port to a VLAN
122
Recommended Configuration Procedure for Assigning a Hybrid Port to a VLAN
123
Creating Vlans
124
Configuring the Link Type of a Port
124
Setting the PVID for a Port
125
Selecting Vlans
126
Modifying a VLAN
127
Modifying Ports
128
VLAN Configuration Example
129
Network Requirements
129
Configuring Switch a
129
Configuring Switch B
133
Configuration Guidelines
133
Configuring VLAN Interfaces
134
Overview
134
Creating a VLAN Interface
134
Modifying a VLAN Interface
135
Deleting a VLAN Interface
137
Configuration Guidelines
138
Configuring a Voice VLAN
139
Overview
139
OUI Addresses
139
Voice VLAN Assignment Modes
139
Security Mode and Normal Mode of Voice Vlans
141
Recommended Voice VLAN Configuration Procedure
142
Configuring Voice VLAN Globally
143
Configuring Voice VLAN on Ports
144
Adding OUI Addresses to the OUI List
144
Voice VLAN Configuration Examples
145
Configuring Voice VLAN on a Port in Automatic Voice VLAN Assignment Mode
145
Configuring a Voice VLAN on a Port in Manual Voice VLAN Assignment Mode
149
Configuration Guidelines
154
Configuring the MAC Address Table
155
Overview
155
How a MAC Address Entry Is Created
155
Types of MAC Address Entries
155
Displaying and Configuring MAC Address Entries
156
Setting the Aging Time of MAC Address Entries
157
MAC Address Table Configuration Example
157
Network Requirements
157
Creating a Static MAC Address Entry
157
Configuring MSTP
159
Overview
159
Introduction to STP
159
STP Protocol Packets
159
Basic Concepts in STP
160
Calculation Process of the STP Algorithm
161
Introduction to RSTP
166
Introduction to MSTP
166
MSTP Features
166
MSTP Basic Concepts
166
How MSTP Works
170
MSTP Implementation on Devices
170
Protocols and Standards
171
Configuration Guidelines
171
Recommended MSTP Configuration Procedure
171
Configuring an MST Region
171
Configuring MSTP Globally
172
Configuring MSTP on a Port
175
Displaying MSTP Information of a Port
176
MSTP Configuration Example
178
Network Requirements
178
Configuration Procedure
179
Configuring LLDP
184
Overview
184
Basic Concepts
184
LLDP Operating Modes
188
Working Mechanism
188
Protocols and Standards
188
Recommended LLDP Configuration Procedure
189
Enabling LLDP on Ports
189
Setting LLDP Parameters on Ports
190
Setting LLDP Parameters for a Single Port
190
Setting LLDP Parameters for Ports in Batch
192
Configuring LLDP Globally
193
Displaying LLDP Information for a Port
195
Displaying Global LLDP Information
199
Displaying LLDP Information Received from LLDP Neighbors
200
LLDP Configuration Example
201
Network Requirements
201
Configuring Switch a
201
Configuring Switch B
203
Verifying the Configuration
204
LLDP Configuration Guidelines
205
Configuring ARP
206
Overview
206
ARP Message Format
206
ARP Operating Mechanism
206
ARP Table
207
Gratuitous ARP
208
Configuring ARP Entries
208
Displaying ARP Entries
208
Creating a Static ARP Entry
208
Removing ARP Entries
209
Configuring Gratuitous ARP
209
Static ARP Configuration Example
210
Configuring ARP Attack Protection
214
Overview
214
User Validity Check
214
ARP Packet Validity Check
214
Configuring ARP Detection
214
Configuring IGMP Snooping
216
Overview
216
Basic IGMP Snooping Concepts
216
How IGMP Snooping Works
218
Protocols and Standards
219
Recommended Configuration Procedure
219
Enabling IGMP Snooping Globally
220
Enabling Dropping Unknown Multicast Data Globally
220
Configuring IGMP Snooping in a VLAN
221
Configuring IGMP Snooping Port Functions
222
Displaying IGMP Snooping Multicast Forwarding Entries
223
IGMP Snooping Configuration Example
224
Network Requirements
224
Configuration Procedure
225
Verifying the Configuration
227
Configuring MLD Snooping
228
Overview
228
Basic MLD Snooping Concepts
228
How MLD Snooping Works
230
Protocols and Standards
231
Recommended Configuration Procedure
231
Enabling MLD Snooping Globally
232
Enabling Dropping Unknown Ipv6 Multicast Data Globally
232
Configuring MLD Snooping in a VLAN
233
Configuring MLD Snooping Port Functions
234
Displaying MLD Snooping Multicast Forwarding Entries
235
MLD Snooping Configuration Example
236
Network Requirements
236
Configuration Procedure
237
Verifying the Configuration
239
Configuring Ipv4 or Ipv6 Static Routes
240
Creating an Ipv4 Static Route
240
Displaying the Ipv4 Active Route Table
241
Creating an Ipv6 Static Route
241
Displaying the Ipv6 Active Route Table
242
DHCP Overview
244
DHCP Address Allocation
244
Allocation Mechanisms
244
IP Address Allocation Process
245
IP Address Lease Extension
245
DHCP Message Format
246
DHCP Options
246
Common DHCP Options
247
Option 82
247
Protocols and Standards
248
Configuring DHCP Snooping
249
Overview
249
Application of Trusted Ports
249
DHCP Snooping Support for Option 82
250
Recommended Configuration Procedure
251
Enabling DHCP Snooping
251
Configuring DHCP Snooping Functions on an Interface
252
Displaying Clients' IP-To-MAC Bindings
252
DHCP Snooping Configuration Example
253
Managing Services
256
Overview
256
Using Diagnostic Tools
259
Ping
259
Traceroute
259
Ping Operation
260
Configuring Ipv4 Ping
260
Configuring Ipv6 Ping
261
Traceroute Operation
261
Configuring Ipv4 Traceroute
261
Configuring Ipv6 Traceroute
262
Configuring 802.1X
264
802.1X Overview
264
802.1X Architecture
264
Access Control Methods
264
Controlled/Uncontrolled Port and Port Authorization Status
265
Packet Formats
265
EAP over RADIUS
266
Initiating 802.1X Authentication
267
802.1X Authentication Procedures
267
802.1X Timers
271
Using 802.1X Authentication with Other Features
271
Configuration Prerequisites
273
Recommended Configuration Procedure
274
Configuring 802.1X Globally
274
Configuring 802.1X on a Port
275
Configuring an 802.1X Guest VLAN
277
Configuring an Auth-Fail VLAN
278
802.1X Configuration Examples
278
MAC-Based 802.1X Configuration Example
278
802.X with ACL Assignment Configuration Example
285
Configuring AAA
294
Overview
294
AAA Application
294
Domain-Based User Management
295
Configuration Prerequisites
295
Recommended Configuration Procedure
295
Configuring an ISP Domain
296
Configuring Authentication Methods for the ISP Domain
296
Configuring Authorization Methods for the ISP Domain
298
Configuring Accounting Methods for the ISP Domain
299
AAA Configuration Example
300
Configuring RADIUS
305
Overview
305
Client/Server Model
305
Security and Authentication Mechanisms
305
Basic RADIUS Message Exchange Process
306
RADIUS Packet Format
306
Extended RADIUS Attributes
309
Protocols and Standards
309
Configuring a RADIUS Scheme
310
Configuring Common Parameters
311
Adding RADIUS Servers
314
RADIUS Configuration Example
315
Configuration Guidelines
319
Configuring HWTACACS
321
Recommended Configuration Procedure
321
Creating the HWTACACS Scheme System
321
Configuring HWTACACS Servers for the Scheme
322
Configuring HWTACACS Communication Parameters for the Scheme
323
HWTACACS Configuration Example
326
Network Requirements
326
Configuring the HWTACACS Server
326
Configuring the HPE NJ5000 5G Poe+ Switch
326
Verifying the Configuration
331
Configuration Guidelines
331
Configuring Users
333
Configuring a Local User
333
Configuring a User Group
335
Managing Certificates
337
Overview
337
PKI Terms
337
PKI Architecture
337
How PKI Works
338
PKI Applications
339
Recommended Configuration Procedures
339
Recommended Configuration Procedure for Manual Request
339
Recommended Configuration Procedure for Automatic Request
341
Creating a PKI Entity
341
Creating a PKI Domain
342
Generating an RSA Key Pair
345
Destroying the RSA Key Pair
346
Retrieving and Displaying a Certificate
346
Requesting a Local Certificate
348
Retrieving and Displaying a CRL
349
PKI Configuration Example
350
Configuration Guidelines
354
Configuring MAC Authentication
355
Overview
355
User Account Policies
355
Authentication Methods
355
MAC Authentication Timers
355
Using MAC Authentication with Other Features
356
VLAN Assignment
356
ACL Assignment
356
Auth-Fail VLAN
356
Configuration Prerequisites
356
Recommended Configuration Procedure
357
Configuring MAC Authentication Globally
357
Configuring MAC Authentication on a Port
358
MAC Authentication Configuration Examples
359
Local MAC Authentication Configuration Example
359
ACL Assignment Configuration Example
362
Configuring Port Security
370
Overview
370
Port Security Features
370
Port Security Modes
370
Configuration Guidelines
372
Recommended Configuration Procedure
372
Configuring Global Settings for Port Security
373
Configuring Basic Port Security Control
374
Configuring Secure MAC Addresses
375
Configuring Advanced Port Security Control
376
Configuring Permitted Ouis
378
Port Security Configuration Examples
378
Basic Port Security Mode Configuration Example
378
Advanced Port Security Mode Configuration Example
381
Configuring Port Isolation
387
Configuring the Isolation Group
387
Port Isolation Configuration Example
388
Configuring Authorized IP
390
Configuration Procedure
390
Authorized IP Configuration Example
391
Network Requirements
391
Configuration Procedure
391
Configuring Loopback Detection
393
Recommended Configuration Procedure
393
Configuring Loopback Detection Globally
393
Configuring Loopback Detection on a Port
394
Configuring Acls
395
Overview
395
ACL Categories
395
Match Order
395
Implementing Time-Based ACL Rules
396
Ipv4 Fragments Filtering with Acls
397
Configuration Guidelines
397
Recommend ACL Configuration Procedures
397
Recommended Ipv4 ACL Configuration Procedure
397
Recommended Ipv6 ACL Configuration Procedure
397
Configuring a Time Range
398
Adding an Ipv4 ACL
399
Configuring a Rule for a Basic Ipv4 ACL
399
Configuring a Rule for an Advanced Ipv4 ACL
401
Configuring a Rule for an Ethernet Frame Header ACL
403
Adding an Ipv6 ACL
405
Configuring a Rule for a Basic Ipv6 ACL
406
Configuring a Rule for an Advanced Ipv6 ACL
407
Configuring Qos
410
Overview
410
Networks Without Qos Guarantee
410
Qos Requirements of New Applications
410
Congestion: Causes, Impacts, and Countermeasures
410
End-To-End Qos
412
Traffic Classification
412
Packet Precedences
413
Queue Scheduling
415
Rate Limit
417
Priority Mapping
418
Introduction to Priority Mapping Tables
419
Configuration Guidelines
420
Recommended Qos Configuration Procedures
420
Adding a Class
421
Configuring Classification Rules
422
Adding a Traffic Behavior
424
Configuring Traffic Mirroring and Traffic Redirecting for a Traffic Behavior
424
Configuring Other Actions for a Traffic Behavior
425
Adding a Policy
427
Configuring Classifier-Behavior Associations for the Policy
427
Applying a Policy to a Port
428
Configuring Queue Scheduling on a Port
429
Configuring GTS on Ports
430
Configuring Rate Limit on a Port
430
Configuring Priority Mapping Tables
431
Configuring Priority Trust Mode on a Port
432
ACL and Qos Configuration Example
434
Network Requirements
434
Configuring Switch
434
Configuring Poe
442
Overview
442
Poe System
442
Power Supplying Modes
442
Protocols and Standards
443
Configuring Poe
443
Configuring Poe Ports
443
Configuring Non-Standard PD Detection
444
Displaying Information about PSE and Poe Ports
444
Poe Configuration Example
445
Document Conventions and Icons
447
Conventions
447
Network Topology Icons
448
Support and Other Resources
449
Accessing Hewlett Packard Enterprise Support
449
Accessing Updates
449
Websites
450
Customer Self Repair
450
Remote Support
450
Documentation Feedback
450
Related Products
HP NJ5000-5G-PoE+
HP NJ2000
HP IntelliJack NJ2000G
HP FlexNetwork 7500 Series
HP flexnetwork 5510 hi series
HP FlexNetwork 5130 HI series
HP FlexNetwork 5140 EI Series
HP NJ713AA#ABM
HP IntelliJack NJ1000G
Hp NonStop Pathway/iTS
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals