EasyManua.ls Logo

HPE OfficeConnect 1950 Series User Manual

HPE OfficeConnect 1950 Series
182 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
HPE OfficeConnect 1950 Switch Series
User Guide
Part number: 5998-8111
Document version: 6W103-20160825

Table of Contents

Other manuals for HPE OfficeConnect 1950 Series

Questions and Answers:

HPE OfficeConnect 1950 Series Specifications

General IconGeneral
ModelHPE OfficeConnect 1950 Series
Switch TypeManaged
LayerLayer 2/3
Switching CapacityUp to 176 Gbps
MAC Address Table Size16, 000 entries
Routing ProtocolStatic, RIP, OSPF
Operating Temperature0°C to 45°C
QoS SupportYes
Ports24 or 48 Gigabit Ethernet ports
10G PortsOptional 2 or 4 SFP+ ports
PoE SupportYes
StackingYes (up to 4 switches)
ManagementWeb-based, SNMP, CLI
Security802.1X, ACLs, Port Security
Forwarding RateUp to 131 Mpps
Power SupplyInternal
DimensionsVaries by model
WeightVaries by model
Operating Humidity10% to 90% non-condensing

Summary

Overview

Logging in to the Web interface for the first time

Guide on initial login procedures for the web interface.

Using the Web interface

Explains the structure and areas of the web interface.

Feature navigator

Overview of the feature navigator menu for accessing device functions.

Managing the device from the CLI

Instructions for managing the device using the Command Line Interface.

Restrictions: Applicable hardware platforms and software versions

Logging in to the Web interface

Restrictions and guidelines

Rules and recommendations for a successful login to the web interface.

Web browser requirements

Specifies supported web browsers and necessary settings for web interface access.

Default login settings

Default credentials and settings for the initial login to the web interface.

Concurrent login users

Information on the maximum number of concurrent web interface users.

Logging out of the Web interface

Procedures for securely logging out of the web interface.

Using the Web interface

Banner and auxiliary area

Description of the banner and auxiliary section of the web interface.

Navigation tree

Explanation of the navigation tree structure for accessing features.

Content pane

Details on the content pane displaying information and configuration options.

Types of webpages

Overview of different webpage types: feature, table, and configuration.

Using a feature page

How to use feature pages to view and configure module functions.

Using a table page

How to use table pages to view and sort data entries.

Using a configuration page

How to use configuration pages for setting parameters and features.

Icons and buttons

Performing basic tasks

Essential tasks for device configuration and management.

Saving the configuration

Methods to save the current device configuration settings.

Displaying or modifying settings of a table entry

Procedures for viewing and editing entries in data tables.

Rebooting the device

Steps required to restart the device for settings to take effect.

Feature navigator

Dashboard menu

Overview of system status and logs provided by the dashboard.

Device menu

Navigating tasks within the device management section.

Network menu

Probe

Tools for testing network connectivity to devices.

Interfaces

Managing and configuring network interfaces on the device.

Link Aggregation

Bundling multiple physical links into a single logical aggregate link.

VLAN

Configuring Virtual Local Area Networks for network segmentation.

DHCP Snooping

Monitoring DHCP traffic to ensure security and proper IP assignment.

IP

IP addressing and configuration settings for the device.

IPv6

IPv6 addressing and configuration details.

Static Routing

Manually configuring static routes for network traffic forwarding.

Policy-Based Routing

Routing packets based on defined policies and criteria.

DHCP

Configuring DHCP server and relay agent functions.

SSH

Secure Shell configuration for secure remote access and file transfer.

Resources menu

ACLs

Access Control List configuration for traffic filtering and policy matching.

PKI

Public Key Infrastructure configuration for digital certificates.

QoS menu

QoS Policies

Defining and applying QoS policies to manage traffic quality.

Hardware Queuing

Configuring hardware queuing mechanisms for congestion management.

Priority Mapping

Mapping priority values to packets for scheduling and control.

Rate Limit

Controlling traffic rates using token bucket mechanisms.

Security menu

Packet Filter

Configuring packet filters using Access Control Lists to control traffic flow.

IP Source Guard

Preventing IP spoofing by validating source IP and MAC address bindings.

802.1X

Implementing 802.1X for port-based network access control.

MAC Authentication

Authenticating users based on their MAC addresses.

Port Security

Enhancing network security by controlling MAC address learning and authentication.

Device management

Settings

Configuring basic device settings like name, location, and system time.

System time sources

Configuring how the device obtains and maintains system time.

Administrators

Managing administrator accounts, roles, and access permissions.

Password control

Minimum password length

Setting the minimum length requirement for user passwords.

Password composition policy

Defining rules for password complexity, including character types.

Password complexity checking policy

Enforcing policies to ensure user passwords are complex and secure.

Password expiration

Implementing password lifecycle management through expiration policies.

HPE OfficeConnect 1950 stacking (IRF)

Stack member roles

Understanding master and standby roles in an IRF stack.

Stack port

Logical interfaces used for connecting stack member devices.

Stack domain ID

Unique identifier for a stack to prevent interference.

Stack split and stack merge

Concepts related to stack link failures and reunification.

Member priority

Determining master election likelihood based on priority settings.

Network services features

Link aggregation

Bundling multiple Ethernet links into a single logical aggregate link.

Link aggregation modes

Static and dynamic modes for operating aggregation groups.

Storm control

Port isolation

VLAN

Port-based VLANs

Grouping VLAN members by port for network segmentation.

VLAN interface

Virtual interfaces for Layer 3 communication between VLANs.

Voice VLAN

Configuring VLANs to prioritize voice traffic with QoS.

Voice VLAN assignment modes

Automatic and manual methods for assigning ports to voice VLANs.

MAC

Types of MAC address entries

Different types of entries stored in the MAC address table.

Aging timer for dynamic MAC address entries

Configuring timers for dynamic MAC address entries to manage table space.

MAC address learning

Enabling or disabling MAC address learning to prevent table saturation.

STP

Spanning tree modes

Different modes for Spanning Tree Protocol: STP, RSTP, PVST, MSTP.

MSTP basic concepts

Fundamental concepts of Multiple Spanning Tree Protocol regions and instances.

Port roles

Roles of ports in spanning tree calculation: root, designated, alternate, backup, master.

Port states

States of ports in RSTP and MSTP: Forwarding, Learning, Discarding.

LLDP

LLDP agent

Mapping of entities where LLDP runs on the network.

Transmitting LLDP frames

How LLDP agents send frames to connected devices.

Receiving LLDP frames

How LLDP agents process received LLDP frames.

LLDP trapping

Notifying network management systems of LLDP events.

DHCP snooping

IP

IP address classes

Classification of IPv4 addresses into classes A, B, C, D, and E.

Subnetting and masking

Dividing networks into subnets and using subnet masks.

IP address configuration methods

Methods to assign IP addresses to interfaces: manual or DHCP.

MTU for an interface

Maximum Transmission Unit configuration for network interfaces.

ARP

Types of ARP table entries

Dynamic and static ARP entries stored in the ARP table.

Dynamic ARP entry

ARP entries created and updated automatically by the device.

Static ARP entry

Manually configured ARP entries for protecting IP-to-MAC mappings.

ARP attack protection

Features to detect and prevent ARP attacks on the network.

Gratuitous ARP

Gratuitous ARP packet learning

Updating ARP entries using information from gratuitous ARP packets.

Periodic sending of gratuitous ARP packets

Preventing gateway spoofing and ARP entry aging.

DNS

Dynamic domain name resolution

Using DNS server to resolve domain names to IP addresses.

Static domain name resolution

Manually creating mappings between domain names and IP addresses.

DNS proxy

Simplifying network management by forwarding DNS requests.

DDNS

Dynamically updating domain name-to-IP address mappings for DNS servers.

IPv6

IPv6 address formats

Representation and simplification methods for IPv6 addresses.

IPv6 address types

Different types of IPv6 addresses: Unicast, Multicast, Anycast.

EUI-64 address-based interface identifiers

Generating interface identifiers from MAC addresses for IPv6.

IPv6 global unicast address configuration methods

Methods for configuring IPv6 global unicast addresses: EUI-64 or manual.

IPv6 link-local address configuration methods

Methods for configuring IPv6 link-local addresses: automatic or manual.

ND

ND proxy

Enabling devices to answer NS messages for hosts on other networks.

Common ND proxy

ND proxy behavior across different subnets.

Local ND proxy

ND proxy behavior within different VLANs.

Port mirroring

Static routing

Policy-based routing

Policy

Defining match criteria and actions for routing packets.

PBR and Track

Integrating PBR with Track feature for dynamic action status adaptation.

IGMP snooping

MLD snooping

DHCP

DHCP server

Configuring the device as a DHCP server to assign IP addresses.

DHCP address pool

Defining IP address ranges and parameters for DHCP clients.

DHCP options

Carrying dynamic address allocation information and additional client configurations.

DHCP relay agent

DHCP relay entry recording

Recording client IP-MAC bindings for security functions.

Periodic refreshing of dynamic DHCP relay entries

Periodically refreshing DHCP relay entries for client information.

HTTP/HTTPS

SSH

FTP

Telnet

NTP

SNMP

MIB

Management Information Base structure for network device variables.

SNMP access control

Configuring SNMP access control using community names and ACLs.

QoS features

QoS policies

Defining and applying QoS policies to manage traffic quality.

Traffic class

Defining criteria for classifying network traffic.

Traffic behavior

Defining QoS actions to be taken on classified traffic.

Applying a QoS policy

Methods to apply QoS policies to interfaces, VLANs, or globally.

SP queuing

WRR queuing

WFQ queuing

Weighted Fair Queuing for proportional bandwidth allocation based on precedence.

Priority mapping

Port priority

Configuring port priority to influence packet scheduling and forwarding.

Configuring the port priority

Steps to set port priority for incoming packets.

Rate limit

Security features

Packet filter

Configuring packet filters using Access Control Lists to control traffic flow.

IP Source Guard

Preventing IP spoofing by validating source IP and MAC address bindings.

Overview

General description of IP Source Guard functionality.

Interface-specific static IPv4SG bindings

Manually configuring static IP Source Guard bindings for specific interfaces.

802.1X

Implementing 802.1X for port-based network access control.

802.1X architecture

Components and entities involved in the 802.1X protocol.

802.1X authentication methods

EAP relay and EAP termination methods for RADIUS authentication.

Access control methods

Port-based and MAC-based access control methods defined by 802.1X.

Port authorization state

Controlling network access based on port authorization status.

Periodic online user reauthentication

Reauthenticating users periodically to update authorization attributes.

Online user handshake

Checking connectivity status of online 802.1X users.

Auth-Fail VLAN

Configuring a VLAN for users who fail 802.1X authentication.

Guest VLAN

Configuring a VLAN for users who have not performed 802.1X authentication.

Critical VLAN

Configuring a VLAN for users failing authentication due to unreachable RADIUS servers.

Mandatory authentication domain

Placing users in a domain for unified authentication and authorization.

MAC authentication

Controlling network access by authenticating source MAC addresses.

Overview

General overview of MAC authentication.

Port security

Overview

Combining 802.1X and MAC authentication for MAC-based access control.

Authorization-fail-offline

Logging off users who fail ACL or user profile authorization.

Aging timer for secure MAC addresses

Configuring timers for secure MAC addresses to age out.

Port security modes

Different security modes for port security: autoLearn, secure, authentication methods.

Secure MAC addresses

Aging mode for secure MAC addresses

Modes for aging out secure MAC addresses: Timeout or Inactivity.

Max users

Specifying the maximum number of secure MAC addresses allowed on a port.

Portal

Portal authentication server

Receiving authentication requests and interacting with access devices.

Portal Web server

Pushing authentication pages and forwarding user information.

Local portal Web server

Using the access device as both portal server and authentication server.

Portal-free rules

Allowing specified users to access external websites without portal authentication.

Interface policy

Configuring portal features on specific interfaces.

ISP domains

RADIUS

Remote Authentication Dial-In User Service protocol details.

RADIUS

RADIUS protocol

Understanding the RADIUS client/server model and its use.

Enhanced RADIUS features

Additional RADIUS features supported by the device.

Log features

Log levels

Classification of logs into eight severity levels.

Log destinations

Configuring where system logs are outputted: log buffer or log host.

Configuration examples

Device maintenance examples

Examples for maintaining device settings and configurations.

System time configuration example

Example for configuring device system time synchronization with NTP.

Administrators configuration example

Example for creating and configuring administrator accounts.

Stack configuration example

Example for configuring a virtual stack using IRF.

NTP configuration example

Example for configuring the device as an NTP server and client.

SNMP configuration example

Example for configuring SNMP service and access control.

Network services configuration examples

Ethernet link aggregation configuration example

Example for configuring static Layer 2 link aggregation.

Port isolation configuration example

Example for configuring port isolation to isolate hosts.

VLAN configuration example

Example for configuring VLANs to segment network traffic.

Voice VLAN configuration example

Example for enabling voice VLANs and configuring OUI addresses.

MAC address entry configuration example

Example for configuring static and blackhole MAC address entries.

MSTP configuration example

Example for configuring MSTP to forward VLAN traffic along different spanning trees.

LLDP configuration example

Example for configuring LLDP on switches for neighbor discovery.

DHCP snooping configuration example

Example for configuring DHCP snooping to secure IP assignment.

Static ARP entry configuration example

Example for configuring static ARP entries to prevent spoofing.

Static DNS configuration example

Example for configuring static DNS entries for name resolution.

Dynamic DNS configuration example

Example for configuring dynamic DNS for updating name-to-IP mappings.

DDNS configuration example with www.3322.org

Example for configuring DDNS with a specific service provider.

Static IPv6 address configuration example

Example for configuring IPv6 addresses using EUI-64.

ND configuration example

Example for configuring IPv6 Neighbor Discovery protocol.

Port mirroring configuration example

Example for configuring local port mirroring for traffic monitoring.

IPv4 static route configuration example

Example for configuring static IPv4 routes for network communication.

IPv4 local PBR configuration example

Example for configuring Policy-Based Routing for IPv4 traffic.

IGMP snooping configuration example

Example for configuring IGMP snooping to manage multicast traffic.

MLD snooping configuration example

Example for configuring MLD snooping to manage IPv6 multicast traffic.

DHCP configuration example

Example for configuring DHCP server and relay agent.

QoS configuration example

Example for configuring QoS policies, queuing, and rate limiting.

Security configuration examples

Examples for configuring various security features.

ACL-based packet filter configuration example

Example for filtering traffic using ACLs with time-based rules.

Static IPv4 source guard configuration example

Example for configuring static IPv4 Source Guard entries.

802.1X RADIUS authentication configuration example

Example for configuring 802.1X authentication using a RADIUS server.

802.1X local authentication configuration example

Example for configuring 802.1X authentication using local user accounts.

RADIUS-based MAC authentication configuration example

Example for configuring MAC authentication using RADIUS.

RADIUS-based port security configuration example

Example for configuring RADIUS-based port security with OUI matching.

Direct portal authentication configuration example

Example for configuring direct portal authentication for host access.

Re-DHCP portal authentication configuration example

Example for configuring re-DHCP portal authentication with private and public IPs.

Cross-subnet portal authentication configuration example

Example for configuring cross-subnet portal authentication.

AAA for SSH users by a TACACS server configuration example

Example for configuring AAA for SSH users via TACACS server.

PoE configuration example

Example for configuring Power over Ethernet for IP phones and APs.

Appendix A Managing the device from the CLI

Command summary

A summary of CLI commands for device management.

Document conventions and icons

Conventions

Explains conventions used in the documentation for clarity.

Command conventions

Explains conventions used for commands and syntax.

GUI conventions

Explains conventions used for graphical user interface elements.

Symbols

Explains the meaning of symbols used for alerts and notes.

Network topology icons

Describes icons representing network devices and connections.

Support and other resources

Accessing Hewlett Packard Enterprise Support

Information on how to access HPE support services and resources.

Accessing updates

Guidance on how to find and download software updates.

Websites

Links to various Hewlett Packard Enterprise websites for networking and general information.

Customer self repair

Information about Hewlett Packard Enterprise customer self repair programs.

Remote support

Details on remote support services available for supported devices.

Documentation feedback

Instructions for providing feedback to improve documentation.

Related product manuals