Execute commands to configure the device or check the running status of the device. To print the manual completely, please, download it. Use these commands with caution. For file deletion, see the delete command; for subdirectory deletion, see the rmdir command. Diagnosing Pluggable Transceivers The system outputs alarm information for you to diagnose and troubleshoot faults of pluggable transceivers. Page Configuration on the TFTP server Configurations may vary with different types of servers Obtain the boot file and configuration file through legitimate channels, such as the official HP website, agents, and technical staff. By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login. Configuration procedure Follow the step below to configure the device to log in to a telnet server as a telnet client:
You can upload the file under this directory, or save the downloaded file under this directory. Configuring the system clock Configuring the system clock The system clock, displayed by system time stamp, is determined by the configured relative time, time zone, and daylight saving time. Page 46 – Configuring password authentication for Power on the device after powering it off, which is also called hard reboot or cold start. Backup configuration file available? Page Configuring a scheduled Configuring a scheduled Comparison item task—approach 1 task—approach 2 User view and system view. In addition, automatic saving of the running configuration is performed periodically, while manual saving can immediately save the running configuration.
Page Before upgrading the software, use the save command to save the current system configuration. Square brackets enclose syntax choices keywords or arguments that are optional. Nothing herein swicth be construed as constituting an additional warranty.
The user is authorized the command with the default level not higher than the user privilege level.
Page – Displaying and maintaining a configurati Enabling Automatic Saving Of The Running Configuration To do… Use the command… Remarks Required By 510, the path and filename Configure the path and filename archive configuration location for saving configuration files are prefix for saving configuration directory filename-prefix not configured, and the system files filename-prefix does not save the configuration file at a specified interval.
Page Configuration System clock configured Example Configure: Power on the device after powering it off, which is also called hard reboot or cold start.
Esries view the system clock, use the display clock command. Page 84 – Configuring source MAC-based login contr If the users want to use hpp of levels 0, 1, 2 and 3, the following configuration is required: Page 48 By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login.
Conventions Conventions This section describes the conventions used in this documentation set. For security, a user is required to input the password if any to switch to a higher privilege level.
Configuration File Management Configuration file management The device provides the configuration file management seires.
If the device has only one startup configuration to be used at the next startup, the system only sets the startup configuration file to NULL. Page 64 Page 65 Page 66 – Configuring common settings for modem lo This chapter includes these sections: Page 77 Create RSA local key pairs.
HP SERIES CONFIGURATION MANUAL Pdf Download.
swotch Page 47 – Configuring scheme authentication for te Page – Identifying and diagnosing pluggable tra The default through modems user privilege level of modem login users is 3. Page 42 To do… Use the command… Remarks Optional Enable display of copyright copyright-info enable information Enabled by switfh. Page Configuring a scheduled Configuring a scheduled Comparison item task—approach 1 task—approach 2 User view and system view.
Page 46 – Configuring password authentication for Release Document version: Page 58 – Logging in through modems Page 59 Page 60 Page 61 – Modem login authentication modes Page 62 – Configuring none authentication for mode Fips Compliance HP recommends that you use the secure mode or, if you use the normal mode, specify a filename not existing in the current directory as the target filename when downloading the boot file or the startup configuration file. Page 39 – Configuring scheme authentication for co Device reboot might result in interruption of ongoing services.
ASCII mode transfers files as text.
HP G SI Switch – switch – 24 ports – managed – rack-mountable Overview – CNET
For more information about authentication modes and parameters, see the Security Configuration Guide. An improper change of the command level may bring inconvenience to your maintenance and operation, or even potential security problems.
Banner Configuration Example Configure the banner to be header motd text Optional displayed before login Banner configuration example Configure the banner to be displayed when a user enters user view as Welcome to HP!. Reboot the device, and the boot file is updated at the system reboot. Typing Commands clock cluster Typing commands Editing command lines Table 2 lists some shortcut keys you can use to edit command lines. Incremental patch An incremental patch means that the patch is dependent on the previous patch units.
For information about logging in to the device with the default configuration, “Configuration requirements. Download the configuration file config. The specified file will be used as the main boot file at the next reboot on slot 2!
When you log in to the device through telnet again: After passing the authentication, the users can only use the commands of level 0. Clearing The bit Interface Indexes Not Used In The Current System Clearing the bit interface indexes not used in the current system In practical networks, the network management software requires the device to provide a uniform, stable bit interface index.
Directory Operations Format Description Length Example Specifies a file in the specified storage medium on the device. Configuring scheme authentication for modem login Configuration prerequisites You have logged in to the device. On Windows Server operating system, you need to add the HyperTerminal program first, and then log in to and manage the device as described in this document.
HP A5120-24G SI Switch – switch – 24 ports – managed – rack-mountable Series
The following table lists telnet login configurations for different authentication modes. This section includes these topics: If the available memory space of the master and slave switches is not enough, use the fixdisk command to file Verifying File Swifch The digest of seriss file can be used to verify the file integrity.
It offers a user-friendly interface to facilitate network management. You are required to enter the login username and password. File Management File management This chapter includes these sections: