BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index
BLADE OS 5.1 Application Guide
2 BMD00113, September 2009
Copyright © 2009 BLADE Network Technologies, Inc., 2350 Mission College Blvd., Suite 600,
Santa Clara, California, 95054, USA. All rights reserved. Part Number: BMD00113.
This document is protected by copyright and distributed under licenses restricting its use, copying,
distribution, and decompilation. No part of this document may be reproduced in any form by any
means without prior written authorization of BLADE Network Technologies, Inc. Documentation is
provided “as is” without warranty of any kind, either express or implied, including any kind of
implied or express warranty of non-infringement or the implied warranties of merchantability or
fitness for a particular purpose.
U.S. Government End Users: This document is provided with a “commercial item” as defined by FAR
2.101 (Oct. 1995) and contains “commercial technical data” and “commercial software
documentation” as those terms are used in FAR 12.211-12.212 (Oct. 1995). Government End Users
are authorized to use this documentation only in accordance with those rights and restrictions set forth
herein, consistent with FAR 12.211- 12.212 (Oct. 1995), DFARS 227.7202 (JUN 1995) and DFARS
252.227-7015 (Nov. 1995).
BLADE Network Technologies, Inc. reserves the right to change any products described herein at any
time, and without notice. BLADE Network Technologies, Inc. assumes no responsibility or liability
arising from the use of products described herein, except as expressly agreed to in writing by BLADE
Network Technologies, Inc. The use and purchase of this product does not convey a license under any
patent rights, trademark rights, or any other intellectual property rights of BLADE Network
Technologies, Inc.
BLADE OS, and BLADE are trademarks of BLADE Network Technologies, Inc. in the United States
and certain other countries. Cisco
®
and EtherChannel
®
are registered trademarks of Cisco Systems,
Inc. in the United States and certain other countries. Any other trademarks appearing in this manual
are owned by their respective companies.
Originated in the USA.