BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index
BLADE OS 5.1 Application Guide
BMD00113, September 2009 Index 265
R
RADIUS
authentication
............................................... 43
port 1812 and 1645 ..................................... 140
port 1813................................................... 140
SSH/SCP..................................................... 58
Rapid Spanning Tree Protocol (RSTP) ................ 122
redundancy, active-active................................... 243
re-mark............................................................. 145
RIP (Routing Information Protocol)
advertisements
............................................ 178
distance vector protocol ............................... 177
hop count................................................... 177
TCP/IP route information....................... 18, 177
version 1.................................................... 177
Router ID, OSPF............................................... 201
routers...................................................... 158, 161
border........................................................ 195
peer........................................................... 195
port trunking ................................................ 67
switch-based routing topology...................... 159
routes, advertising ............................................. 195
routing, internal and external .............................. 195
Routing Information Protocol. See RIP
RSA keys
........................................................... 58
RSTP ............................................................... 122
S
SecurID.............................................................. 59
security
LDAP authentication
..................................... 52
port mirroring............................................. 256
RADIUS authentication................................. 43
VLANs ....................................................... 87
segments. See IP subnets.
service ports
...................................................... 140
SNMP ........................................................ 31, 196
HP-OpenView.............................................. 31
Source-Specific Multicast .................................. 185
spanning tree configuration rules .......................... 69
SSH
RSA host and server keys
.............................. 58
configuring .................................................. 55
statistical load distribution.................................... 68
summarizing routes ........................................... 199
switch failover .................................................. 242
switch ports VLANs membership ......................... 89
T
TACACS+ ..........................................................47
tagging. See VLANs tagging.
TCP
..................................................................139
technical terms
port VLAN identifier (PVID)
..........................90
tagged frame.................................................90
tagged member..............................................90
untagged frame .............................................90
untagged member ..........................................90
VLAN identifier (VID) ..................................90
text conventions...................................................20
thash...................................................................72
Trunk Hash algorithm...........................................72
Trunking configuration rules.................................69
typographic conventions .......................................20
U
UDP .................................................................139
user account...................................................30, 60
V
virtual interface router (VIR)...............................239
virtual link, OSPF ..............................................201
Virtual Local Area Networks. See VLANs.
virtual router ID numbering
.................................245
virtual router group ............................................243
VLANs
broadcast domains
.................................87, 162
configuration rules.........................................69
default PVID.................................................88
example showing multiple VLANs ..................95
ID numbers...................................................88
IP interface configuration .............................163
multiple spanning trees.................................109
multiple VLANs............................................90
port members................................................89
PVID ...........................................................88
routing .......................................................162
security ........................................................87
Spanning-Tree Protocol................................109
tagging................................................89 to ??
topologies.....................................................94