HP 445946-001 User Manual

Page 4

Advertising
background image


Contents

4

User access control .............................................................................................................................. 34

Setting up user IDs .......................................................................................................................... 35

Ports and trunking

Introduction ......................................................................................................................................... 36

Ports on the switch ............................................................................................................................... 36

Port trunk groups.................................................................................................................................. 37

Statistical load distribution................................................................................................................ 37

Built-in fault tolerance....................................................................................................................... 37

Before you configure trunks ................................................................................................................... 37

Trunk group configuration rules.............................................................................................................. 38

Port trunking example ........................................................................................................................... 39

Configuring trunk groups (CLI example) ............................................................................................. 40

Configuring trunk groups (BBI example) ............................................................................................. 41

Configurable Trunk Hash algorithm ........................................................................................................ 44

Link Aggregation Control Protocol.......................................................................................................... 44

Configuring LACP ........................................................................................................................... 46

Port-based Network Access and traffic control

Port-based Network Access control......................................................................................................... 47

Extensible authentication protocol over LAN ....................................................................................... 47

802.1x authentication process.......................................................................................................... 48

EAPoL Message Exchange ............................................................................................................... 48

802.1x port states........................................................................................................................... 49

Supported RADIUS attributes ............................................................................................................ 50

EAPoL configuration guidelines ......................................................................................................... 51

Port-based traffic control ....................................................................................................................... 51

Configuring port-based traffic control................................................................................................. 52

VLANs

Introduction ......................................................................................................................................... 53

Overview............................................................................................................................................ 53

VLANs and port VLAN ID numbers ......................................................................................................... 53

VLAN numbers ............................................................................................................................... 53

Viewing VLANs ......................................................................................................................... 54

PVID numbers ................................................................................................................................. 54

Viewing and configuring PVIDs......................................................................................................... 54

Port information ......................................................................................................................... 54

Port configuration....................................................................................................................... 54

VLAN tagging ..................................................................................................................................... 55

VLANs and IP interfaces........................................................................................................................ 58

VLAN topologies and design considerations............................................................................................ 58

VLAN configuration rules ................................................................................................................. 59

Multiple VLANS with tagging................................................................................................................. 60

Configuring the example network...................................................................................................... 61

Configuring ports and VLANs on Switch 1 (CLI example) ................................................................ 61

Configuring ports and VLANs on Switch 2 (CLI example) ................................................................ 63

Configuring ports and VLANs on Switch 1 (BBI example) ................................................................ 64

FDB static entries.................................................................................................................................. 66

Trunking support for FDB static entries................................................................................................ 67

Configuring a static FDB entry .......................................................................................................... 67

Spanning Tree Protocol

Advertising