EasyManua.ls Logo

HP A5800 Series User Manual

HP A5800 Series
200 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #74 background imageLoading...
Page #74 background image
67
Ste
p
Command
Remarks
5. Associate the HTTPS
service with a
certificate
attribute-based
access control policy.
ip https certificate
access-control-policy
policy-name
Optional.
By default, the HTTPS service is not associated with
any certificate-based attribute access control policy.
Associating the HTTPS service with a
certificate-based attribute access control policy
enables the device to control the access rights of
clients.
You must configure client-verify enable in the
associated SSL server policy. If not, no clients can
log in to the device.
The associated SSL server policy must contain at
least one permit rule. Otherwise, no clients can log
in to the device.
For more information about certificate
attribute-based access control policies, see Security
Configuration Guide.
6. Configure the port
number of the HTTPS
service.
ip https port
port-number
Optional.
443 by default.
7. Associate the HTTPS
service with an ACL.
ip https acl acl-number
Required.
By default, the HTTPS service is not associated with
any ACL.
Associating the HTTPS service with an ACL enables the
device to allow only clients permitted by the ACL to
access the device.
8. Create a local user
and enter local user
view.
local-user user-name
Required.
By default, no local user is configured.
9. Configure a
password for the
local user.
password { cipher |
simple } password
Required.
By default, no password is configured for the local
user.
10. Specify the command
level of the local user.
authorization-attribute
level level
Required.
By default, no command level is configured for the
local user.
11. Specify the Telnet
service type for the
local user.
service-type telnet
Required.
By default, no service type is configured for the local
user.
12. Exit to system view. quit
13. Create a VLAN
interface and enter its
view.
interface vlan-interface
vlan-interface-id
Required.
If the VLAN interface already exists, the command
enters its view.
14. Assign an IP address
and subnet mask to
the VLAN interface.
ip address ip-address
{ mask | mask-length }
Required.
By default, no IP address is assigned to the VLAN
interface.

Table of Contents

Other manuals for HP A5800 Series

Question and Answer IconNeed help?

Do you have a question about the HP A5800 Series and is the answer not in the manual?

HP A5800 Series Specifications

General IconGeneral
ModelHP A5800 Series
ManagementCLI, SNMP, Web
Dimensions4.36 x 44 x 48 cm (1.72 x 17.32 x 18.9 in)
MAC Address Table Size32K entries
VLANs Supported4094
Routing ProtocolsOSPF, BGP, RIP, IS-IS
Operating Temperature32°F to 113°F (0°C to 45°C)
Operating Humidity10% to 90% (noncondensing)

Summary

Configuring the CLI

Entering the CLI

Learn how to access the Command Line Interface for device interaction and configuration.

Command conventions

Understand the syntax and symbols used in HP CLI commands for proper usage.

CLI view description

Explore the hierarchical structure of CLI views for command execution and navigation.

Using online help

Access help resources directly from the CLI for command assistance and syntax.

Configuring user privilege and command levels

Manage user access and command permissions based on privilege levels for security.

Saving the current configuration

Learn to save active configurations to ensure persistence after device reboots.

Login Methods

Console Login

Detailed steps for logging in via the console port, the primary access method.

Telnet Login

Configure and use Telnet for remote device management and maintenance.

SSH Login

Securely access the device remotely using SSH for encrypted communication.

Modem Login

Connect and log in to the device remotely using modems for out-of-band access.

Web Login

Access the device's web interface for management through HTTP or HTTPS.

NMS Login

Enable and configure login via Network Management Stations for centralized monitoring.

User login control

Implement policies to control user access based on IP addresses or MAC addresses.

File management

Filename formats

Understand the rules for specifying file paths and names on the device.

Performing directory operations

Manage directories, including creation, deletion, and navigation.

Performing file operations

Handle files by displaying, renaming, copying, moving, and deleting them.

Configuration file management

Manage startup and running configurations for device setup and backup.

Saving the running configuration

Learn methods to save current configurations for persistence.

Configuring software upgrade

Software upgrade methods

Overview of different techniques for upgrading device software.

Upgrading the boot ROM program through a system reboot

Procedure to update the Boot ROM via system reboot.

Upgrading the boot file through a system reboot

Steps to update the system boot file via reboot.

Software upgrade by installing hotfixes

Apply hotfixes to repair software defects without interrupting services.

One-step patch installation

Install multiple patches efficiently in a single operation.

Configuring ISSU

ISSU process

Understand the In-Service Software Upgrade procedure and its flow.

Boot file version rollback

Revert to a previous boot file version if an ISSU upgrade fails.

Enabling version compatibility check

Verify compatibility between new and current boot files before ISSU.

Configuring compatible ISSU

Perform ISSU when boot files are compatible, ensuring high availability.

Performing compatible ISSU upgrade

Step-by-step guide for executing a compatible ISSU.

Configuring device management

Configuring the device name

Set a unique name to identify the device in the network.

Configuring the system clock

Set the device's time, date, timezone, and daylight saving time.

Enabling the display of copyright information

Configure system messages displayed upon user login.

Configuring banners

Customize login and shell messages displayed to users.

Configuring the exception handling method

Define how the system responds to software abnormalities.

Rebooting the device

Learn methods for restarting the device, including scheduled and immediate reboots.

Automatic configuration

Typical automatic configuration network

Understand the network setup for automated device configuration.

How automatic configuration works

Details on the process of automatic IP and configuration file acquisition.

Using DHCP to obtain an IP address and other configuration information

Configure DHCP to assign IP addresses and network parameters.

Obtaining the configuration file from the TFTP server

Learn how devices retrieve configuration files from a TFTP server.

Executing the configuration file

Understand the process of applying obtained configuration files.

Support and other resources

Contacting HP

Information on how to get technical support and assistance from HP.

Subscription service

Details on registering products for updates and notifications.

Related information

Links to additional documents, manuals, and resources.

Websites

Useful HP and networking-related website links for further information.

Conventions

Command conventions

Explains the conventions used for CLI commands and syntax.

GUI conventions

Explains the conventions used for graphical user interface elements.

Symbols

Defines the meaning of symbols used in the documentation.

Network topology icons

Illustrates the meaning of network diagram icons used in the manual.

Related product manuals