BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index
BLADE OS 5.1 Application Guide
BMD00113, September 2009 Contents 5
Chapter 2: Ports and Trunking 65
Ports on the Switch
66
Port Trunk Groups
67
Statistical Load Distribution
68
Built-In Fault Tolerance
68
Before You Configure Static Trunks
68
Trunk Group Configuration Rules
69
Port Trunking Example
70
Configurable Trunk Hash Algorithm
72
Link Aggregation Control Protocol
73
Chapter 3: Port-Based Network Access Control
77
Extensible Authentication Protocol over LAN
78
EAPoL Authentication Process
79
EAPoL Message Exchange
80
EAPoL Port States
81
Guest VLAN
81
Supported RADIUS Attributes
82
EAPoL Configuration Guidelines
84
Port-Based Traffic Control
85
Chapter 4: VLANs
87
VLANs Overview
87
VLANs and Port VLAN ID Numbers
88
VLAN Tagging
90
VLANs and IP interfaces
93
VLAN Topologies and Design Considerations
94
VLAN Configuration Rules
94
Multiple VLANs with Tagging Adapters
95
Protocol-Based VLANs
101
Port-Based vs. Protocol-Based VLANs
102
PVLAN Priority Levels
102
PVLAN Tagging
102
PVLAN Configuration Guidelines
103
Configuring PVLANs
103
Private VLANs
106
Private VLAN Ports
106
Private VLANs Configuration Guidelines
107
Private VLANs Configuration Example
107
FDB Static Entries
108