ProLiant BL p-Class GbE2 Interconnect Switch Application Guide

Contents 3
Contents
Accessing the GbE2 Interconnect Switch
Introduction............................................................................................................................................. 8
Additional references ............................................................................................................................... 8
Typographical conventions........................................................................................................................ 9
Using the command line interface .............................................................................................................. 9
Connecting through the console port...................................................................................................... 9
Configuring an IP interface................................................................................................................... 9
Connecting via Telnet ........................................................................................................................ 10
Connecting via Secure Shell ............................................................................................................... 10
Using the Browser-based Interface............................................................................................................ 10
Using Simple Network Management Protocol ............................................................................................ 11
SNMP v1.0...................................................................................................................................... 11
SNMP v3.0...................................................................................................................................... 11
Default configuration ......................................................................................................................... 12
User configuration............................................................................................................................. 12
View based configurations ................................................................................................................. 13
Configuring SNMP trap hosts ............................................................................................................. 14
SNMPv2 trap host configuration ......................................................................................................... 15
SNMPv3 trap host configuration ......................................................................................................... 15
Secure access to the switch ..................................................................................................................... 16
Setting allowable source IP address ranges .......................................................................................... 16
RADIUS authentication and authorization............................................................................................. 16
TACACS+ authentication ........................................................................................................................ 21
How TACACS+ authentication works................................................................................................... 21
TACACS+ authentication features in GbE2 Interconnect Switch............................................................... 21
Authorization.................................................................................................................................... 21
Accounting....................................................................................................................................... 22
Configuring TACACS+ authentication on the switch (CLI example) .......................................................... 22
Configuring TACACS+ authentication on the switch (BBI example) .......................................................... 24
Secure Shell and Secure Copy................................................................................................................. 25
User access control ................................................................................................................................ 29
Setting up user IDs ............................................................................................................................ 29
Ports and trunking
Introduction........................................................................................................................................... 30
Ports on the GbE2 Interconnect Switch...................................................................................................... 30
Port trunk groups.................................................................................................................................... 31
Statistical load distribution.................................................................................................................. 31
Built-in fault tolerance ........................................................................................................................ 31
Before you configure trunks ..................................................................................................................... 31
Trunk group configuration rules................................................................................................................ 32
Port trunking example............................................................................................................................. 32
Configuring trunk groups (CLI example) ............................................................................................... 33
Configuring trunk groups (BBI example) ............................................................................................... 34
Configurable Trunk Hash algorithm .......................................................................................................... 37
Link Aggregation Control Protocol............................................................................................................ 37
Configuring LACP ............................................................................................................................. 38
Port-based Network Access and traffic control
Port-based Network Access control........................................................................................................... 40
Extensible authentication protocol over LAN ......................................................................................... 40
802.1x authentication process............................................................................................................ 40
EAPoL Message Exchange ................................................................................................................. 41
802.1x port states............................................................................................................................. 42