Configuracion

236
HP ExpertOne Web-based Training Getting Started with HP Switching & Routing Rev. 13.31 Course ID: 00731204 Track: HP ATP – FlexNetwork Solutions V1 certification

Transcript of Configuracion

  • HP ExpertOneWeb-based Training

    Getting Started with HP Switching & RoutingRev. 13.31 Course ID: 00731204Track: HP ATP FlexNetwork Solutions V1 certification

  • Copyright2013HewlettPackardDevelopmentCompany,L.P.Theinformationcontainedhereinissubjecttochangewithoutnotice.TheonlywarrantiesforHPproductsandservicesaresetforthintheexpresswarrantystatementsaccompanyingsuchproductsandservices.Nothinghereinshouldbeconstruedasconstitutinganadditionalwarranty.HPshallnotbeliablefortechnicaloreditorialerrorsoromissionscontainedherein.ThisisanHPcopyrightedworkthatmaynotbereproducedwithoutthewrittenpermissionofHP.YoumaynotusethesematerialstodelivertrainingtoanypersonoutsideofyourorganizationwithoutthewrittenpermissionofHP.

    Getting Started with HP Switching & RoutingWeb-based TrainingRev.13.31

  • Rev. 13.31 1 1

    HP Switch Overview Module 1

    Module 1: HP Switch Overview

    Objectives

    After completing this module, you should be able to:

    Explain how HP switches help organizations meet todays business and technical challenges

    Explain how the HP ProVision command line interface (CLI) and the Comware CLI are separated into different privilege levels and identify tasks that can be completed at each level

    Describe the following types of switches and explain how they

    Core, distribution, and access layer switchesLayer 2 and Layer 3 switchesModular and fixed-port switchesManaged, smart-managed, and unmanaged switches

    are used in todays networks:

    ProVisionComware

    After completing this module, you should be able to: Describe the following types of switches and explain how they are used

    in todays networks: Core, distribution, and access layer switches Layer 2 and Layer 3 switches Modular and fixed-port switches Managed, smart-managed, and unmanaged switches

    Explain how HP switches help organizations meet todays business and technical challenges

    Explain how the HP ProVision command line interface (CLI) and the Comware CLI are separated into different privilege levels and identify tasks that can be completed at each level

  • Getting Started with HP Switching and Routing

    1 2 Rev. 13.31

    Module 1: HP Switch Overview

    Lesson 1: Introduction

    In this lesson, you will review what small, medium, and large companies require from their network to meet their current business goals.

    You will then learn how HP helps IT organizations meet these requirements, allowing companies to move beyond the limitations of aging, traditional networks.

    In this lesson, you will review what small, medium, and large companies require from their network to meet their current business goals. You will then learn how HP helps IT organizations meet these requirements, allowing companies to move beyond the limitations of aging, traditional networks.

  • HP Switch Overview

    Rev. 13.31 1 3

    Module 1: HP Switch Overview

    Current networking challenges

    Data center

    Campus LAN

    Branch office

    Introduction To understand the challenges companies are facing today, you should consider three areas: data center, campus LAN, and branch office. Data Center Companies, seeking to improve efficiency and save money, are consolidating resources in centralized data centers, which are rapidly evolving and generating dramatic changes: Server virtualization, which allows a single physical system to host

    multiple virtual machines, increases the demand for bandwidth at the data center edge. The portability of virtual servers also means that the network edge must constantly adjust to new services.

    Traditional client-server application models drove traffic from the workstation to the server (north-south). In the data center, cloud computing and federated applications now drive more traffic between servers (east-west).

    Administrators also want to converge LAN and Storage Area Network (SAN) traffic.

    To accommodate all of these services, the network must deliver high performance, high flexibility, high scalability, high availability, and low latency. To keep up, you also need a single pane of glass management tool through which you can manage all components.

  • Getting Started with HP Switching and Routing

    1 4 Rev. 13.31

    Campus LAN Companies are moving resources out of the LAN and into the data center and private or public clouds, driving more traffic across WAN connections. At the same time, documents and applicationssuch as Unified Communications and Collaboration (UC&C) solutionsare becoming more media rich, increasing the need for more bandwidth and less latency. If the network cannot deliver, the user experience suffers. Users are also relying more heavily on mobile devicesincreasingly as their preferred method of accessand wireless LANs (WLANs) are being deployed in hospitals, campuses, warehouses, and other spaces. Campus networks must transform to support the delivery of applications and services to wired and mobile workers alike. Unfortunately, existing WLAN deployments often deliver a substandard user experience. Branch office Rather than deploy services at each branch office, companies are consolidating services at centralized data centers. Resource consolidation increases the demand for bandwidth and low latency on WAN links. Companies are also reducing the number of IT staff at branch office or even eliminating them. While these changes may save money and increase efficiency, they introduce new challenges for branch office solutions. Customers need fast, reliable WAN connections and solutions that can survive locally when a WAN outage occurs.

  • HP Switch Overview

    Rev. 13.31 1 5

    Module 1: HP Switch Overview

    Customer requirements

    Companies of all sizessmall, medium, and largenow find themselves with networks that hinder rather than drive the delivery of high-quality network services.

    Companies have But they need

    An infrastructure that supports connectivity but does not add intelligence in a coherent fashion

    An infrastructure that responds to diverse users and applications appropriately and consistently

    A complicated system of management solutions for different segments of the network

    A single-pane-of-glass solution that manages the entire infrastructure

    Separate silos of servers that experience differing traffic loads

    All of their resources to work efficiently all of the time

    Companies of all sizessmall, medium, and largenow find themselves with networks that hinder rather than drive the delivery of high-quality network services. Companies have An infrastructure that supports connectivity but does not add intelligence

    in a coherent fashion A complicated system of management solutions for different segments of

    the network Separate silos of servers that experience differing traffic loads But they need An infrastructure that responds to diverse users and applications

    appropriately and consistently A single-pane-of-glass solution that manages the entire infrastructure All of their resources to work efficiently all of the time

  • Getting Started with HP Switching and Routing

    1 6 Rev. 13.31

    Module 1: HP Switch Overview

    Converged networks with HP FlexNetwork

    Introduction To help companies evolve their network to meet these needs, HP provides the FlexNetwork architecture. HP FlexFabric HP FlexFabric creates a low-latency, highly resilient infrastructure, uniquely tuned for adapting to a virtualized environment, on which compute and storage traffic converges.

    HP FlexCampus HP FlexCampus converges wired and wireless networks to deliver secure identity-based access to employees and guests.

    HP FlexBranch HP FlexBranch simplifies the deployment and management of standardized, secure, responsive, and resilient end-to-end solutions across many branches.

    HP FlexManagement HP FlexManagement converges management of all network components into a single solution, helping to orchestrate network management according to business needs.

  • HP Switch Overview

    Rev. 13.31 1 7

    HP FlexNetwork HP FlexNetwork is based on open standards. It is scalable, secure, and agile. Although divided into different components, the HP FlexNetwork offers a consistent set of services and a unified management solution.

  • Getting Started with HP Switching and Routing

    1 8 Rev. 13.31

    Module 1: HP Switch Overview

    HP FlexFabric LAN/SAN convergence

    Introduction Another issue facing companies is having to manage LANs and Storage Area Networks (SANs) as separate infrastructures. Companies want to simplify and save money by converging data and storage traffic onto a single network. However, traditional Ethernet does not meet storages need for high-speed, lossless delivery. HP provides servers with Converged Network Adaptors (CNAs) as well as Fibre Channel over Ethernet (FCoE) switches, enabling companies to benefit from the first phase of LAN/SAN convergence. 1) In a traditional network, the LAN and SAN are completely separate

    physical networks, one devoted to data traffic and the other to storage. Servers require two sets of NICs, and different groups manage each network, increasing costs and creating logistical problems.

  • HP Switch Overview

    Rev. 13.31 1 9

    Module 1: HP Switch Overview

    HP FlexFabric LAN/SAN convergence (cont.)

    2) HP servers and switches provide an interim step toward LAN/SAN convergence. In this step, the SAN still hosts the storage components. However, the server connects only to the LAN, using its Converged Network Adapters to handle both data and storage traffic. This phase allows customers to save money on server components without requiring a pitchfork upgrade for storage.

  • Getting Started with HP Switching and Routing

    1 10 Rev. 13.31

    Module 1: HP Switch Overview

    HP FlexFabric LAN/SAN convergence (cont.)

    3) With full convergence, LAN and SAN traffic traverse the same network infrastructure and both are managed through a single pane of glass.

  • HP Switch Overview

    Rev. 13.31 1 11

    Module 1: HP Switch Overview

    Open standards

    HP is also committed to supporting industry open standards. Open standards give companies the freedom to implement multivendor solutions and ensure continuing support for a converged networkno matter what applications are later deployed.

    Make it easy to integrate new applications into core business practices

    Increase application flexibility

    Help reduce costs

    Thus, HP products:

    HP AllianceOne

    For example, HP AllianceOne, an extensive system of partnerships, tests a wide variety of solutions across the server, storage, and network components of the HP FlexNetwork.

    HP is also committed to supporting industry open standards. Open standards give companies the freedom to implement multivendor solutions and ensure continuing support for a converged networkno matter what applications are later deployed. For example, HP AllianceOne, an extensive system of partnerships, tests a wide variety of solutions across the server, storage, and network components of the HP FlexNetwork. Thus, HP products: Make it easy to integrate new applications into core business practices Increase application flexibility Help reduce costs

  • Getting Started with HP Switching and Routing

    1 12 Rev. 13.31

    Module 1: HP Switch Overview

    HP warranty

    For many switches, HP provides a lifetime warranty, which includes:

    Fans and power supplies

    Advanced replacement at no cost

    Next-day business delivery

    Software maintenance

    Technical assistance

    Some restrictions apply. For complete warranty information, visit:

    http://www.hp.com/networking/warranty

    For many switches, HP provides a lifetime warranty, which includes: Fans and power supplies Advanced replacement at no cost Next-day business delivery Software maintenance Technical assistance Some restrictions apply. For complete warranty information, visit: http://www.hp.com/networking/warranty

  • HP Switch Overview

    Rev. 13.31 1 13

    Module 1: HP Switch Overview

    Green business technology

    In addition, HP is committed to developing energy-efficient products. Some of HPs green technologies include options such as low-power idle mode and the ability to power down unused Ethernet ports on switches. Most energy efficient functions are easily monitored and managed. Several of HPs switches have earned the Miercom Certified Green Standard for networking devices.

    In addition, HP is committed to developing energy-efficient products. Some of HPs green technologies include options such as low power idle mode and the ability to power down unused Ethernet ports on switches. Most energy efficient functions are easily monitored and managed. Several of HPs switches have earned the Miercom Certified Green Standard for networking devices.

  • Getting Started with HP Switching and Routing

    1 14 Rev. 13.31

    Module 1: HP Switch Overview

    Lesson 1: Summary

    In this lesson, you learned how HP is helping companies transform their network, providing an infrastructure that responds to diverse users and applications appropriately and consistently.

    You also learned that this highly scalable network architecture is built on the FlexFabric architecture.

    Because the FlexNetwork is built on open standards, you are not locked into proprietary applications or services. You can choose solutions that best meet your companys needs.

    In this lesson, you learned how HP is helping companies transform their network, providing an infrastructure that responds to diverse users and applications appropriately and consistently.

    You also learned that this highly scalable network architecture is built on the FlexFabric architecture.

    Because the FlexNetwork is built on open standards, you are not locked into proprietary applications or services. You can choose solutions that best meet your companys needs.

  • HP Switch Overview

    Rev. 13.31 1 15

    Module 1: HP Switch Overview

    Lesson 2: Introduction

    In this lesson, you will begin to learn about switch technology. Specifically, you will learn how switches can be categorized based on the following criteria:

    Deployment in the network architecture

    Open Systems Interconnection (OSI) layer

    Manageability

    Form factor

    Support for stacking technologies

    In this lesson, you will begin to learn about switch technology. Specifically, you will learn how switches can be categorized based on the following criteria: Deployment in the network architecture Open Systems Interconnection (OSI) layer Manageability Form factor Support for stacking technologies

  • Getting Started with HP Switching and Routing

    1 16 Rev. 13.31

    Module 1: HP Switch Overview

    Deployment options: three-tier networks

    Switches can be categorized by where they are deployed in the network environment. Traditional networks are organized into three tiers:

    Core switches establish the backbone of the network.

    Distribution switches are consolidation points for LAN access or server access switches and connect to the core switches.

    LAN or server access switches support workstations and servers.

    Switches can be categorized by where they are deployed in the network environment. Traditional networks are organized into three tiers: Core switches establish the backbone of the network. Distribution switches are consolidation points for LAN access or server

    access switches and connect to the core switches. LAN or server access switches support workstations and servers.

  • HP Switch Overview

    Rev. 13.31 1 17

    Module 1: HP Switch Overview

    Deployment options: two-tier networks

    HP also supports two-tier networks:

    The distribution layer is eliminated; the LAN and server access switches connect directly to the core switches.

    Traffic flows directly from the edge to the core, reducing latency.

    HP also supports two-tier networks: The distribution layer is eliminated; the LAN and server access switches

    connect directly to the core switches. Traffic flows directly from the edge to the core, reducing latency.

  • Getting Started with HP Switching and Routing

    1 18 Rev. 13.31

    Module 1: HP Switch Overview

    Layer 2 and Layer 3 switches

    Introduction Switches are also categorized based on their ability to forward traffic at the Data Link or the Network Layer of the Open Systems Interconnection (OSI) model. Layer 1 The Physical Layer controls the physical medium, defining the electrical and mechanical specifications for the network connection. Layer 2 The Data Link Layer describes the procedures (called protocols) that control data transfer across the physical infrastructure. Layer 3 The Network Layer is primarily responsible for logical addressing and the routing of traffic across internetworks. Layer 4 The Transport Layer ensures the reliable transfer of data between hosts. It provides flow control, error checking, and data recovery. Layer 5 The Session Layer defines the process of establishing and maintaining a session (a two-way communication) between two applications.

  • HP Switch Overview

    Rev. 13.31 1 19

    Layer 6 The Presentation Layer translates the data from the lower layers to a format that can be used by the Application Layer. Layer 7 The Application Layer defines how applications access network services. Ethernet Ethernet is a Layer 1 and Layer 2 protocol. It defines the electrical and mechanical specifications of the physical media that the network uses and also controls data transfer across the physical infrastructure. Layer 2 switch A Layer 2 switch forwards traffic based on the frames Data Link Layer information, specifically the hardware address, which is called the Media Access Control (MAC) address. (You will learn more about Layer 2 forwarding later in this course.) Layer 3 switch A Layer 3 switch can route traffic based on Network Layer information. To route traffic, Layer 3 switches must have the appropriate IP route. Layer 3 switches support static routes and routes learned through routing protocols. Some switches support only static routes and are called Light Layer 3 switches. (You will learn more about Layer 3 routing later in this course.)

  • Getting Started with HP Switching and Routing

    1 20 Rev. 13.31

    Module 1: HP Switch Overview

    Switch manageability

    Smart web-managedUnmanaged

    Managed

    Introduction Switches are also categorized based on their level of manageability. Managed Managed switches support Simple Network Management Protocol (SNMP) and allow you to configure each ports communication parameters and many other aspects of the switch through a command line interface (CLI). Many managed switches also provide a graphical user interface, such as a Web browser interface. All of HPs enterprise switches are managed. Smart web-managed Smart web-managed switches, as the name suggests, can be managed through a Web browser interface. The Web browser interface is designed to be intuitive, making it easy to configure and manage switch features. In addition, these switch support Simple Network Management Protocol (SNMP). You can, therefore, manage them through a centralized SNMP console. Unmanaged Unmanaged switches provide basic Layer 2 switching and are not configurable. These switches are commonly referred to as plug-and-play switches and are designed for small to medium businesses (SMBs) that need basic switch functionality.

  • HP Switch Overview

    Rev. 13.31 1 21

    Module 1: HP Switch Overview

    Form factor

    Fixed-port switches

    Modular switches

    Flex-chassis switches

    Introduction Another way switches are categorized is by their form factor or physical frame. (Regardless of their form factor, all types of switches support high-speed links, either through traditional copper cabling or fiber optic cabling.) Fixed-port switches Fixed-port switches have a predefined number of ports. Typically, the switch is one rack unit (RU). An RU refers to the amount of vertical space the hardware will take up in an equipment rack in the wiring, server room, or data center. For example, most server racks have 42U, meaning that they can accommodate 42 1U devices. Modular switches Modular switches do not have a defined number of ports. Instead, port type and density in a modular switch are defined by the type and number of modules that are installed in the chassis. Flex-chassis switches Flex-chassis switches contain a number of fixed ports as well as room to accommodate a limited number of modules, which allow you to add extra high-speed ports or advanced features or services.

  • Getting Started with HP Switching and Routing

    1 22 Rev. 13.31

    Module 1: HP Switch Overview

    Meshed stacking and IRF

    Meshed stacking

    Introduction Switches may also be categorized based on their support for stacking. Traditional stacking enables you to connect several switches and manage them through a single IP address. HP also offers two, more advanced stacking technologies: meshed stacking and Intelligent Resilient Framework (IRF). Meshed stacking Available on the HP 3800 Switch Series, meshed stacking allows you to aggregate up to five switches to form a fully meshed stack for resiliency and management via a single interface. Direct links run to and from each switch in the stack, forming a single logical switch.

  • HP Switch Overview

    Rev. 13.31 1 23

    Module 1: HP Switch Overview

    Meshed stacking and IRF (cont.)

    IRF

    IRF IRF allows you to combine multiple switches, creating a single resilient virtual switch. To other devices on the network, each IRF system appears to be one device, which has one MAC address and one bridge ID. Routing updates originate from this one device. The IRF system draws on each switchs capabilities during normal operation. As a result, the IRF system provides high performance while greatly simplifying the design and operations of data center and campus networks. In addition, the IRF system provides both device-level and link-level redundancy. If a switch (or a switch component) fails or becomes unavailable, the IRF system can quickly and seamlessly fail over, preventing service interruption and guaranteeing complete continuity for business-critical applications. IRF runs on many HP switches, including the HP 5120, 5500, 5800, 5820, 5830, 7500, 9500, 10500, and 12500 Switch Series. Benefits IRF and meshed stacking offer many benefits over traditional stacking: Unified management: You can manage the stack through a single

    master switch.

  • Getting Started with HP Switching and Routing

    1 24 Rev. 13.31

    High availability: IRF and meshed stacking provide N:1 failover and redundant links.

    Increased performance: All available links remain active and provide load balancing, which increases efficiency in switching and routing.

    Scalability: You can increase network bandwidth and processing capabilities by adding switches to the meshed stack or IRF system.

    Flattened architecture: By enabling access layer switches to share highly available links to the core, meshed stacking and IRF help customers create low-latency, two-tier architectures in both the campus LAN and data center.

  • HP Switch Overview

    Rev. 13.31 1 25

    Module 1: HP Switch Overview

    Lesson 2: Summary

    In this lesson, you learned how switches can be categorized based on criteria such as the network tier where they are deployed, Layer 2 or 3 functionality, manageability, form factor, and stacking capability.

    In this lesson, you learned how switches can be categorized based on criteria such as the network tier where they are deployed, Layer 2 or 3 functionality, manageability, form factor, and stacking capability.

  • Getting Started with HP Switching and Routing

    1 26 Rev. 13.31

    Module 1: HP Switch Overview

    Lesson 3: Introduction

    In this lesson, you will begin to apply what you have learned about switches. You will take a look at a few HP switches, considering features such as their form factor, manageability, forwarding and switching capabilities, and stacking capabilities.

    You will also learn how to access and begin managing HP switches.

    In this lesson, you will begin to apply what you have learned about switches. You will take a look at a few HP switches, considering features such as their form factor, manageability, forwarding and switching capabilities, and stacking capabilities.

    You will also learn how to access and begin managing HP switches.

  • HP Switch Overview

    Rev. 13.31 1 27

    Module 1: HP Switch Overview

    HP switch portfolio

    FlexFabric switches

    Featured Switch Series

    Form Factor

    Switches Manageability Forwarding & Routing

    Power over Ethernet (PoE)

    Stacking/ IRF

    5800 Switch Series Flex-chassis

    5800-24G, 5800-24G-PoE+, & 5800-24G-SFP

    5800-48G, 5800-48G-PoE, & 5800-48G with 2 slots

    5800AF-48G

    Managed Layer 3/4 Yes IRF with up to 9 switches

    5820 Switch Series Flex-chassis

    5820-14XG-SFP+ with 2 slots

    5820-24XG-SFP+ 5820AF-24XG

    Managed Layer 3/4 No IRF with up to 9 switches

    5830 Switch Series Fixed-port 5830AF-48G with 1 interface slot

    5830AF-96G

    Managed Layer 3/4 No IRF with up to 4 switches

    5920 Switch Series Fixed-port 5920AF-24XG Managed Layer 3/4 No IRF with up to 4 switches

    12500 Switch Series Modular 12504 (4 slots) 12508 (8 slots) 12518 (18 slots)

    Managed Layer 3/4 Yes IRF with up to 4 switches

    Introduction You will now be introduced to several switches in each part of the FlexNetwork architecture. And because small businesses have specific technical, management, and budget requirements, you will examine switches ideally suited for these environments. FlexFabric switches This table provides basic information about some of the switches that can be used to implement FlexFabric. To view information about other switches that play a role in FlexFabric, go to http://www.hp.com/go/networking.

  • Getting Started with HP Switching and Routing

    1 28 Rev. 13.31

    Module 1: HP Switch Overview

    HP switch portfolio (cont.)

    FlexCampus switches

    Featured Switch Series

    Form Factor Switches Manageability Forwarding & Routing

    PoE Stacking

    2530 Switch Series Fixed 2530-24G 2530-48G 2530-24G-PoE+ 2530-48G-PoE+

    Managed Layer 2 Yes (designatedswitches)

    Yes, up to 16 switches

    3800 Switch Series Fixed 3800-24G-2SFP+ 3800-24G-2XG 3800-24G-PoE+-2XG 3800-24G-PoE+-2SFP+ 3800-48G-PoE+-4SFP+ 3800-48G-4SFP+ 3800-48G-4XG 3800-48G-PoE+-4XG 3800-24SFP-2SFP+

    Managed Layer 3/4 Yes (designatedswitches)

    Meshed stacking

    8200 zl Switch Series

    Modular 8206 zl 8212 zl

    Managed Layer 3/4 Yes (designatedmodules)

    No

    10500 Switch Series Modular 10504 10508 & 10508-V* 10512

    Managed Layer 3/4 Yes IRF with up to 4 switches

    FlexCampus switches This table provides basic information about some of the switches that can be used to implement FlexCampus. To view information about other switches that play a role in FlexCampus, go to http://www.hp.com/go/networking. (Keep in mind that some FlexCampus switches, such as the 2530 Switch Series, can be deployed in FlexBranch as well.)

  • HP Switch Overview

    Rev. 13.31 1 29

    Module 1: HP Switch Overview

    HP switch portfolio (cont.)

    FlexBranch switches

    Featured Switch Series

    Form Factor

    Switches Manageability Forwarding& Routing

    PoE Stacking/IRF

    2620 Switch Series Fixed-port 2620-24, 26020-24-PP0E+, & 2620-24-PoE+

    2620-48 & 2620-48-PoE+

    Managed Layer 3/4 Yes (designatedswitches)

    Up to 16 switches

    2910 al Switch Series

    Fixed-port 2910-24G al 2910-48G al 2910-24-G-PoE+ al 2910-48G-PoE+ al

    Managed Layer 3/4 Yes (designatedswitches)

    Up to 16 switches

    2920 Switch Series Fixed-port 2920-24G 2920-24G-PoE+ 2920-48G 2920-48G-PoE+

    Managed Layer 3/4 Yes (designatedswitches)

    Up to 4 switches

    5400 zl Switch Series

    Modular 5406 zl 5412 zl

    Managed Layer 3/4 Yes (designatedmodules)

    No

    5500 HI Switch Series

    Fixed-port 5500-24G-4SFP HI Switch with 2 Interface Slots

    5500-48G-4SFP HI Switch with 2 Interface Slots

    Managed Layer 3/4 No IRF with up to 9 switches

    FlexBranch switches This table provides basic information about some of the switches that can be used to implement FlexBranch. To view information about other switches that play a role in FlexBranch, go to http://www.hp.com/go/networking. (Keep in mind that some switches, such as the 2620, 2910 al, 2920, and 5400 zl, can be deployed in FlexCampus as well.)

  • Getting Started with HP Switching and Routing

    1 30 Rev. 13.31

    Module 1: HP Switch Overview

    HP switch portfolio (cont.)

    Small business switches

    Featured Switch Series

    Form Factor Switches Manageability Forwarding & Routing

    PoE Stacking

    1410 Switch Series Fixed-port 1410-8G 1410-16G 1410-24G 1410-8 1410-16 1410-24 1410-24-2G

    Unmanaged Layer 2 No No

    1810 Switch Series Fixed-port 1810-8G v2 1810-24G v2 1810-48G 1810-8 v2 1810-24 v2

    Web browserInterface; SNMP v1 & v2

    Layer 2 No No

    1910 Switch Series Modular 1910-48G 1910-24G-PoE 1910-24G 1910-16G 1910-8G 1910-8G-PoE+

    Web browserInterface; SNMP v1, v2, & v3

    Light Layer 3 (32 static routes)

    Yes (designatedswitches)

    No

    Small business switches Small businesses need to provide competitive services but do not have the budgets and IT staff of larger companies. They need switches that are easy to deploy and manage. To see a complete list of switches for small businesses, visit http://www.hp.com/go/networking.

  • HP Switch Overview

    Rev. 13.31 1 31

    Module 1: HP Switch Overview

    Switch software

    HP managed switches run one of the following:

    Both ProVision software and Comware software provide many of the same features. There are some differences, of course, but a detailed comparison is beyond the scope of this course. For now, you simply need to understand that the software determines the structure of the command line interface (CLI) and the commands you enter. (For more in-depth information, attend Building SMB Networks with HP Technologies, which is an instructor-led training course.)

    You will now learn more about ProVision and Comware switches.

    ProVision software Comware software

    The 8200 zl Switch Series runs the ProVision software.

    The 10500 Switch Series runs the Comware software.

    HP managed switches run one of the following: ProVision software Comware software Both ProVision software and Comware software provide many of the same features. There are some differences, of course, but a detailed comparison is beyond the scope of this course. For now, you simply need to understand that the software determines the structure of the command line interface (CLI) and the commands you enter. (For more in-depth information, attend Building SMB Networks with HP Technologies, which is an instructor-led training course.) You will now learn more about ProVision and Comware switches.

  • Getting Started with HP Switching and Routing

    1 32 Rev. 13.31

    Module 1: HP Switch Overview

    Switch management interfaces

    ProVision CLI

    ProVision menu interface

    ProVision Web browser interface

    Comware CLI

    Comware Web browser interface

    Introduction Both ProVision and Comware switches are managed primarily through their CLI. ProVision switches offer two additional management interfaces: the menu interface and the Web browser interface. Some Comware switches also provide a Web browser interface. Keep in mind that the CLI is the primary interface for both ProVision and Comware switches, and this course will focus on that interface. ProVision CLI The example above shows the ProVision CLI. You will learn more about how to access the CLI and navigate in it in the next slides. ProVision menu interface The example above shows the ProVision menu interface, which you initially access through the CLI by entering the menu command. As mentioned earlier, this course will not cover the menu interface, focusing instead on the CLI. ProVision Web browser interface The example above shows the ProVision web browser interface. As mentioned earlier, this course will not cover the web browser interface, focusing instead on the CLI.

  • HP Switch Overview

    Rev. 13.31 1 33

    Comware CLI The example above shows the Comware CLI. You will learn more about how to access the CLI and navigate in it in the next slides. Comware Web browser interface The example above shows the Comware web browser interface. As mentioned earlier, this course will not cover the web browser interface, focusing instead on the CLI.

  • Getting Started with HP Switching and Routing

    1 34 Rev. 13.31

    Module 1: HP Switch Overview

    In-band and out-of-band management

    Introduction You can access a switchs CLI in two ways. What is out-of-band management? With out-of-band management, you connect your management station to the switchs console port with a serial cable and access the CLI with terminal emulation software. This is called out-of-band management because you are not connecting to the switch through a network port. Some Comware switches also permit you to connect to an AUX port through a modem connection. What is in-band management? With in-band management, your management communications run over network connections. You require IP connectivity to the switch through a direct or indirect Ethernet connection. To open a management session, you must use terminal emulation software that supports either Telnet or Secure Shell (SSH). With the Telnet protocol, data is transmitted in clear text and is vulnerable to snooping. With the SSH protocol, data is encrypted. You will learn more about SSH in Module 2: Security. What application do you need to access the CLI? There are many options, but one commonly used terminal emulation application is Tera Term, which is shareware that you can download and use for free.

  • HP Switch Overview

    Rev. 13.31 1 35

    Module 1: HP Switch Overview

    HP ProVision switches: management users

    You can access the CLI of an HP ProVision switch as operator or manager:

    Operator provides read-only access. You can view only statistics and configuration information.

    Manager provides read-write access. You can make configuration changes and view information.

    You can protect access to the switch by configuring a password for each user. At factory default settings, there are no passwords for either user.

    You can access the CLI of an HP ProVision switch as operator or manager:

    Operator provides read-only access. You can view only statistics and configuration information.

    Manager provides read-write access. You can make configuration changes and view information.

    You can protect access to the switch by configuring a password for each user. At factory default settings, there are no passwords for either user.

  • Getting Started with HP Switching and Routing

    1 36 Rev. 13.31

    Module 1: HP Switch Overview

    HP ProVision switches: CLI structure

    View Switch prompt Tasks

    Operator Switch> View statistics and configuration information.

    Manager Switch# Begin configuring the switch (such as updating system software).

    Global configuration Switch(config)# Make configuration changes to the switch features.

    Context configuration Switch ()#

    Examples:Switch(vlan-1)#Switch(rip)#

    Make configuration changes within a specific context, such as to a VLAN, one or more ports, or routing protocols.

    Introduction The HP ProVision switch CLI is organized into different levels, or contexts. You can tell the context by the switch prompt. Operator context The > symbol in the switch prompt indicates you are at the operator level. At this level you can view statistics and configuration information. To move to the manager level, enter enable. If a manager password has been configured on the switch, you will be prompted to enter that password. Manager context The # symbol in the switch prompt appears at the manager level. From this context, you can view additional information and begin managing the switch. For example, you can update the switch software. To move to the global configuration context, enter configure terminal (or a command shortcut such as config). Global configuration context The word config in the switch prompt indicates you are at the global configuration context. At this context, you can make configuration changes to the systems software features. Context configuration From the global configuration context, you can enter commands to move to other contexts, from which you configure particular settings. For example, you might move to a physical interface context or a VLAN context to

  • HP Switch Overview

    Rev. 13.31 1 37

    configure settings specific to that interface or VLAN. You can also access contexts for protocols such as Routing Information Protocol (RIP) or Open Shortest Path First (OSPF). The prompt changes to indicate the context as shown in these examples: Switch(vlan-1)# Switch(rip)#

  • Getting Started with HP Switching and Routing

    1 38 Rev. 13.31

    Module 1: HP Switch Overview

    HP Comware switches: User interfaces

    Introduction On Comware switches, you access the CLI through user interfaces. Inband management In-band access, which allows multiple users to access the switch through the IP network, uses virtual interfaces VTY0, VTY1, VTY2, and so on. At a switchs default settings, you are required to enter a password for these interfaces, but to eliminate a potential security weakness, the switch does not have a default password. You must configure a unique password for your particular company. To access a Comware switch for the first time, you must use out-of-band management. You can then configure a password for in-band management or change the authentication method to any of the three methods described for out-of-band management. Out-of-band management Out-of-band connections use the AUX0 interface and require no password at default settings, enabling initial access to the switch. You can leave this default authentication method (none) for out-of-band management, or you can configure the AUX0 interface to require users to log in with a password or with a username and password. If you require a username and password (an authentication method called scheme authentication), the switch checks the credentials against a local list of users or an external authentication server, as dictated by its Authentication, Authorization, and Accounting (AAA) domain settings.

  • HP Switch Overview

    Rev. 13.31 1 39

    Module 1: HP Switch Overview

    HP Comware switches: CLI command levels

    On Comware switches, each CLI command is associated with one of four command levels. The command level for each command is configurable, but most network managers leave the commands at the default settings.

    The figure below shows the four command levels and the types of commands that are available at each level.

    CLIcommand

    levels

    3

    2

    1

    0

    Manager: System (file and user) management commands (read-write)

    System: Services configuration commands (read-write)

    Monitor: Basic read-only commands

    Visitor: Diagnosis commands such as ping and traceroute

    On Comware switches, each CLI command is associated with one of four command levels. The command level for each command is configurable, but most network managers leave the commands at the default settings. The figure below shows the four command levels and the types of commands that are available at each level.

  • Getting Started with HP Switching and Routing

    1 40 Rev. 13.31

    Module 1: HP Switch Overview

    HP Comware switches: Privilege levels

    The types of commands that you can enter depend on your privilege level, which the Comware switch assigns you when you log in. Privilege levels equate to the CLI command levels.

    You may enter any command that is available to your current privilege level and lower.

    Visitor

    System

    Monitor

    CLI Command Levels

    Manager

    System

    Monitor

    Visitor

    super 3

    super 2

    super 1

    super 0

    User Privilege Levels

    3

    2

    1

    0

    Manager

    To move between levels, simply enter super .

    To move to a higher level, enter the super password for that level. For example, to move to the manager level, enter super 3 .

    You can always move to a lower level than your current level although this action is not necessary because you have access to those commands at the higher level.

    The types of commands that you can enter depend on your privilege level, which the Comware switch assigns you when you log in. Privilege levels equate to the CLI command levels. You may enter any command that is available to your current privilege level and lower. To move between levels, simply enter super . To move to a higher level, enter the super password for that level. For

    example, to move to the manager level, enter super 3 . You can always move to a lower level than your current level although

    this action is not necessary because you have access to those commands at the higher level.

  • HP Switch Overview

    Rev. 13.31 1 41

    Module 1: HP Switch Overview

    HP ProVision switches: CLI structure

    Introduction The Comware CLI is divided into views, each of which contains a set of related commands. In addition to having the privilege to enter a particular command, you must be in the correct view. As the table shows, the switch prompt indicates the current view. User view The user view is indicated by angle brackets (). In this view, you can view settings, troubleshoot system problems, and manage files. You can move to the system view by entering the command: system-view. System view The system view is indicated by square brackets ([ ]). In this view, you can make configuration changes to the switchs software. You can also access other command views. You can return to the user view by entering quit.

    Other command views Other command views give you access to configure interfaces, both physical and virtual, including the user interfaces. Many other features can be configured within their specific view mode. To exit a specific view and return to the system view, enter quit.

  • Getting Started with HP Switching and Routing

    1 42 Rev. 13.31

    Module 1: HP Switch Overview

    HP CLI help

    Both HP ProVision and Comware CLIs offer help features to assist you in navigating the interface. The table shows the common help commands for both.

    You want to: HP ProVision HP Comware

    View a brief description for all available commands at your context or view

    help [Enter]?[Tab]

    ?

    View commands that start with certain letters

    ?[Tab]

    ?

    Auto-complete a command Type as many characters as necessary to identify the command uniquely and press [Tab]

    Note that you do not have to complete the command. You just need to enter enough characters to complete the command.

    View the options for a command

    ? ?

    View hotkeys No help option display hotkey

    Both HP ProVision and Comware CLIs offer help features to assist you in navigating the interface. The table shows the common help commands for both.

  • HP Switch Overview

    Rev. 13.31 1 43

    Module 1: HP Switch Overview

    ProVision switches: CLI compatibility

    display commands

    Frequently used commands

    Fundamental commands

    Introduction Because many companies have both ProVision and Comware switches, HP has been focusing on providing CLI compatibility within the ProVision software. Specifically, HP has been adding support for certain Comware commands within the ProVision CLI. This effort is designed to help network administrators who are familiar with Comware commands to use the ProVision CLI more easily. The following switches provide this CLI compatibility: HP 8200 zl Switch Series HP 6600 Switch Series HP 6200 yl Switch Series HP 5400 zl Switch Series HP 3500 Switch Series HP 3800 Switch Series HP 2910al Switch Series HP 2915 Switch Series HP 2615 Switch Series HP 2620 Switch Series Note that this course outlines the CLI compatibility support available at the time the course was published. Check your ProVision switch documentation to learn more about the switches and the software versions that support this

  • Getting Started with HP Switching and Routing

    1 44 Rev. 13.31

    feature and to determine the exact Comware commands that are supported. display commands Many HP switches that run the ProVision software support more than 200 Comware display commands, which allow you to view information about the switch and its configuration. (Natively, ProVision switches support show commands, which provide similar functionality as display commands.) Frequently used commands To help network administrators who are familiar with Comware switches to easily manage ProVision switches, HP has also added support for common Comware commands that allow you to move within the CLI hierarchy, reverse (or undo) a command, and save a configuration (as shown in the examples provided). Fundamental commands To help network administrators who are familiar with Comware switches manage ProVision switches more easily, HP has also added support for fundamental Comware configuration commands, such as the file management commands shown here. Extended help HP has also added extended help messages to the ProVision help feature. These messages will help network administrators who are familiar with Comware identify the equivalent command on the ProVision switch. When this feature is enabled, these network administrators can simply type the first part of the Comware configuration command and press the [tab] key. The help feature then will provide a reference to the correct ProVision command. It may also provide guidance on the next action for those configuration items that may not be intuitive due to naming or concept differences between Comware and ProVision software. Of course, not all Comware configuration commands require the new help feature: Some configuration commands are identical, or very similar, to ProVision commands. Using these commands is self-explanatory.

  • HP Switch Overview

    Rev. 13.31 1 45

    Module 1: HP Switch Overview

    Summary

    In this module you have learned about :

    The benefits of HP switches

    The different ways in which switches are categorized

    In-band and out-of-band management access

    CLI structure of HP ProVision and Comware switches

    In this module you have learned about: The benefits of HP switches The different ways in which switches are categorized In-band and out-of-band management access CLI structure of HP ProVision and Comware switches

  • Getting Started with HP Switching and Routing

    1 46 Rev. 13.31

    PAGE INTENTIONALLY LEFT BLANK

  • Rev. 13.31 2 1

    Security Module 2

    Module 2: Security

    Objectives

    This module introduces you to the basics of network security. You will learn about todays security landscape and evolving threats. You will also learn the basics of securing HP networking infrastructure devices from improper access.

    After completing this module, you should be able to:

    Describe ways in which attackers gain unauthorized access to a network

    Explain factors that make a network vulnerable to unauthorized access

    Take the proper measures to physically secure infrastructure devices for unauthorized access

    This module introduces you to the basics of network security. You will learn about todays security landscape and evolving threats. You will also learn the basics of securing HP networking infrastructure devices from improper access. After completing this module, you should be able to: Describe ways in which attackers gain unauthorized access to a network Explain factors that make a network vulnerable to unauthorized access Take the proper measures to physically secure infrastructure devices for

    unauthorized access

  • Getting Started with HP Switching and Routing

    2 2 Rev. 13.31

    Module 2: Security

    Introduction

    As soon as you connect a switch or router to a network, it becomes part of the networks security environment. It can be either a secure or a weak link in the networks defenses.

    To ensure that you deploy a switch securely, you must understand the types of threats that travel through the network infrastructure or even target the network infrastructure itself.

    As soon as you connect a switch or router to a network, it becomes part of the networks security environment. It can be either a secure or a weak link in the networks defenses. To ensure that you deploy a switch securely, you must understand the types of threats that travel through the network infrastructure or even target the network infrastructure itself.

  • Security

    Rev. 13.31 2 3

    Module 2: Security

    Overview of attacks

    First, consider the source of threats and attacks.

    Originally, security solutions were designed to protect a trusted network from external threats. Although external threats still exist, attacks often originate within the network.

    Some authorized users might intentionally launch attacks. Malicious employees, former employees, contractors, or guests could access data inappropriately, misuse resources, or launch attacks.

    Authorized users can also unintentionally introduce threats: connecting insecure or infected devices to the network, opening infected files, downloading applications with hidden malware, using weak passwords, or leaking passwords.

    First, consider the source of threats and attacks. Originally, security solutions were designed to protect a trusted network from external threats. Although external threats still exist, attacks often originate within the network. Some authorized users might intentionally launch attacks. Malicious employees, former employees, contractors, or guests could access data inappropriately, misuse resources, or launch attacks. Authorized users can also unintentionally introduce threats: connecting insecure or infected devices to the network, opening infected files, downloading applications with hidden malware, using weak passwords, or leaking passwords.

  • Getting Started with HP Switching and Routing

    2 4 Rev. 13.31

    Module 2: Security

    Common attacks

    Unauthorized access

    Denial of Service (DoS)

    Impersonation

    Reconnaissance

    Malware

    Viruses and Worms

    Introduction You should be aware of several broad categories of threats, which might originate externally or internally. Unauthorized Access Unauthorized attacks occur when an unauthorized user accesses your network either by guessing, stealing, or cracking a password or by finding insecure network access points. Hackers might be able to crack passwords by trying many different dictionary words or by wiretapping and eavesdropping on communications. Hackers can also trick users into revealing passwords or find passwords that are stored insecurely. Denial of Service (DoS) DoS attacks occur when hackers are able to overwhelm a networks resources. For example, hackers might generate enough traffic to consume available bandwidth or send a server or infrastructure device so much traffic that the devices processor is continually at 100 percent utilization. By tying up these resources, hackers prevent valid users from accessing network services. Hackers also use Distributed DoS (DDoS) attacks, transforming many computers into zombies that launch the attack and magnify the power of the attack while concealing the source. In a variation, called a reflective DDoS attack, the zombie computers send spoofed requests to Internet

  • Security

    Rev. 13.31 2 5

    reflectors (Web servers and so forth). The reflectors then flood the spoofed address, which is the target of the attack. Impersonation Impersonation attacks occur when attackers masquerade as legitimate resource providers to steal private information or install malware on a workstation. Two common types of impersonation attacks are man-in-the-middle (MITM) attacks and phishing attacks: In an MITM attack, hackers intercept communications between two

    endpoints that believe they are communicating with each other and replace the contents of the communication.

    In a phishing attack, the hacker poses as a trusted server and tricks users into sending passwords or other sensitive data.

    Reconnaissance Reconnaissance attacks are used to gather information about a network and to discover potential vulnerabilities a hacker can exploit. Hackers often use tools that can be legitimately used as troubleshooting tools such as: Port scanners, to find open TCP or UDP ports Network mapping software, which discovers information about all

    available endpoints and applications on a network Malware Malware describes any software designed to use network resources or infiltrate network devices without the knowledge or consent of the device owner. Types of malware include: Adware, which displays unwanted pop-up ads on infected systems Spyware, which records Web sites visited, keystrokes, and other

    personal information, which can be used for identity theft or unauthorized network access

    Rootkits, which allow a hacker to hijack the system, using it as a backdoor to access other resources or turning it into a zombie to launch attacks

    Trojan horses, which are programs that users intentionally install without knowing the program contains malware

    Viruses and worms, which are malicious bits of code. (Viruses and worms are covered as their own topic in this section.)

    Viruses and Worms Viruses and worms are small, malicious bits of code that self-replicate and propagate. The terms virus and worm are often used interchangeably, but there is a difference between the two. Viruses spread through files, which users must open, while worms propagate using network connections.

  • Getting Started with HP Switching and Routing

    2 6 Rev. 13.31

    Viruses and worms are often polymorphic/metamorphic. They use self-encryption and self-alteration to disguise themselves and avoid detection by anti-virus software. Unchecked, viruses and worms can spread rampant through an unprotected network and cause enormous amounts of damage to vital files and network resources.

  • Security

    Rev. 13.31 2 7

    Module 2: Security

    Need for physical security

    Introduction As you have learned, internal users can unwittingly allow their endpoints to become compromised, and hackers can then use the endpoints to launch harmful attacks. Consider what can happen if hackers compromise a network infrastructure device, which supports hundreds or even thousands of users traffic. Protecting your infrastructure begins by controlling who has physical access to these devices. Modules or the switch With physical access to the switch, malicious users can remove modules from modular switches or steal the entire switch. Console port If a hacker has physical access to the switch and no one has restricted access to the console port, the hacker can easily establish a terminal session to the command-line interface (CLI) of the switch through that console port. Hackers that gain management access can hijack the switch and gain unauthorized access, perform network reconnaissance attacks, initiate DoS attacks, and disable security features. By default, both HP Comware and ProVision switches are not configured with a password for console port access.

  • Getting Started with HP Switching and Routing

    2 8 Rev. 13.31

    Reset and Clear buttons ProVision switches have Reset and Clear buttons. Some Comware switches have Reset buttons. These buttons are provided to help troubleshoot problems and allow you to reboot the switch, reset the switch to factory default settings, and clear management passwords. However, an unauthorized user could use these functions to disable a switch or gain management access to it. Ports Users with physical access to a switch can disconnect or move Ethernet cables, causing a DoS attack for users or other services connected through that link. Power cord Users with physical access to a switch can unplug the power, causing a DoS for users or other services connected through the switch.

  • Security

    Rev. 13.31 2 9

    Module 2: Security

    Defense in depth

    To confront these threats, organizations require Defense in Depth. This layered approach to security employs multiple solutions to guard against the same threat. For example:

    A switch is locked away from unauthorized access, and a password also protects its management interfaces.

    Switches enforce authentication to prevent most users who would maliciously release a virus from ever connecting. An Intrusion Prevention System (IPS) blocks viruses introduced by devices owned by legitimate users who do not know their devices are infected.

    To confront these threats, organizations require Defense in Depth. This layered approach to security employs multiple solutions to guard against the same threat. For example: A switch is locked away from unauthorized access, and a password also

    protects its management interfaces. Switches enforce authentication to prevent most users who would

    maliciously release a virus from ever connecting. An Intrusion Prevention System (IPS) blocks viruses introduced by devices owned by legitimate users who do not know their devices are infected.

  • Getting Started with HP Switching and Routing

    2 10 Rev. 13.31

    Module 2: Security

    HP Security and Risk ManagementPrinciples

    Build it in

    Make it intelligent

    Protect what matters

    Introduction Managing multiple layers of security can be challenging, particularly as valuable data proliferates and becomes dispersed in Bring Your Own Device (BYOD) and cloud solutions. HP Security and Risk Management solutions help companies integrate security across the enterprise. Build it in Rather than bolt on security as an after-thought, HP solutions build security into every component and also ensure that each component participates in the integrated, business-level strategy. Make it intelligent HP security solutions collect information from end-to-end. By combining and correlating information from many areas, including endpoints, applications, and network infrastructure devices, security solutions can make intelligent choices that protect the company and prove regulatory compliance without interfering with productivity. Protect what matters HP helps to maximize the value of security solutions by ensuring that these solutions protect the data that is most valuable to the business.

  • Security

    Rev. 13.31 2 11

    Module 2: Security

    Security and Risk ManagementAreas

    The HP Security and Risk Management portfolio includes solutions in six areas.

    Security governance, risk, and compliance

    Operations security

    Application security

    Endpoint security

    Network security

    Data center security

    Introduction The HP Security and Risk Management portfolio includes solutions in six areas. Security governance, risk, and compliance The HP Information Security Management (ISM) service replaces disparate security processes with an integrated service that governs security for the entire enterprise from endpoint to network to application to the cloud. Operations security HP operations security solutions integrate security solutions and processes with overarching business orchestration solutions and processes. Application security From the earliest stages of application architecture, whether for in-house applications or cloud services, HP helps you to design the appropriate security measures and build them into the application. Endpoint security HP provides a wide portfolio of solutions for securing servers, desktops, laptops, printers, and other endpointsas well as solutions for ensuring proper access control and data protection for BYOD.

  • Getting Started with HP Switching and Routing

    2 12 Rev. 13.31

    Network security Each component of the network infrastructure supports secure data transmission with built-in protections against exploits and unauthorized network traffic. In addition, HP provides industry-leading network security solutions such as next-generation firewalls and HP TippingPoint IPSs. Data center security Several HP services help you to design a complete, integrated security solution for all components of your data center or private cloud, including both physical and virtual components of servers and the network infrastructure.

  • Security

    Rev. 13.31 2 13

    Module 2: Security

    Security built into the network infrastructure

    Introduction Although this course does not cover specific security services and solutions, HP network infrastructure devices do play a role in an overall security solution. The HP network infrastructure provides a solid foundation for secure communications. Secure device management HP switches enable you to implement best practices for managing them securely. You will delve into the details later in this module. Built-in protection against DHCP attacks Used on most networks today, Dynamic Host Configuration Protocol (DHCP) is vulnerable to attacks such as address spoofing and address exhaustion. With address spoofing, a rogue DHCP server assigns invalid addresses to network devices so these devices cannot operate on the network. With address exhaustion, an attacker requests IP addresses from a legitimate DHCP server until the DHCP servers supply of available IP addresses (pool) is exhausted. When a DHCP servers IP pool is exhausted, valid network hosts cannot receive an IP address and cannot access the network. HP switches can provide protection against these attacks by setting trusted ports for particular DHCP messages.

  • Getting Started with HP Switching and Routing

    2 14 Rev. 13.31

    Built-in protection against STP attacks Spanning Tree Protocol (STP), which you will learn more about in Module 6: Redundancy, enables redundant network links. Devices running STP exchange Bridge Protocol Data Units (BPDUs) to determine active network links; other links are disabled. In an STP attack, a rogue device sends spoofed BPDUs, joins the spanning tree, and affects link selection, which wreaks havoc on the network. HP switches offer BPDU protection and guard features, which ensure that untrusted BPDUs are dropped. Some switches have additional features for ignoring unauthorized STP messages. Built-in protection against ARP attacks Switches and other devices use Address Resolution Protocol (ARP) to resolve IP addresses to MAC addresses. Switches maintain a table of known IP addresses and the associated MAC addresses. Rogue devices use ARP attacks to poison these tables, so that network IP addresses are associated with the MAC addresses of rogue devices. When traffic is sent to these rogue devices, attackers can gather confidential information. HP switches can protect against ARP poisoning. They use DHCP snooping to build tables that specify the expected ports for particular MAC addresses and, based on those expectations, reject suspicious ARP messages.

  • Security

    Rev. 13.31 2 15

    Module 2: Security

    Intelligent decisions supported by the network infrastructure

    Introduction The HP network infrastructure devices also help to collect information and enforce intelligent security decisions. Basic access control Basic access control ensures that only authorized users, as defined by business policies, are allowed to connect to the network and use network resources. Basic access control ensures that a stranger cannot connect a laptop to an open network port in your office and join the company network without first passing an authentication test. Basic access control also protects wireless LANs (WLANs), checking the credentials of wireless users and devices as they initially connect and roam across the campus. This access control also manages the rights of authorized users after they connect to the network, according to business policies. Endpoint integrity Endpoint integrity forms a key element of a BYOD solution. Authorized users may still endanger the network if they use insecure devices. An insecure device is not properly protected: It might not have a firewall or anti-virus software, or its anti-virus software might be out of date. It might be running unauthorized software or be infected by malware. Endpoint integrity isolates such devices until they are brought into compliance.

  • Getting Started with HP Switching and Routing

    2 16 Rev. 13.31

    For example, an authorized user connects to the network with a device that has outdated anti-virus software. Endpoint integrity ensures that the device is quarantined and the user is notified of the problem. The device is not allowed out of quarantine and allowed normal access to the network until the user updates the antivirus software. Security policy enforcement HP switches can take a number of actions to support policies configured centrally, including blocking all traffic, applying VLAN assignments, and so on. In addition, a number of HP switches support OpenFlow, an emerging network virtualization technology. As one of the mechanisms delivering Software-Defined Networking (SDN), OpenFlow forms the foundation for complete abstraction and centralization of the network control plane, promising to extend network virtualization in many innovative ways. OpenFlow works by replacing a network infrastructure devices own processing and forwarding decisions with decisions programmed on an ongoing basis by centralized controllers. In addition, switches that support OpenFlow will be able to collect information and enforce decisions for a security solution that interfaces with the SDN controller. Integration with centralized logging and management solutions HP switches can send logs and SNMP traps to centralized solutions that archive and manage logs and events across the enterprise.

  • Security

    Rev. 13.31 2 17

    Module 2: Security

    Ensuring physical security

    Introduction While implementing a complete security solution might lie beyond your realm of responsibility, you can do your part by ensuring that you deploy infrastructure devices securely. Earlier you learned about vulnerabilities that can arise when a switch lacks physical security. Modules or the switch Whenever possible, you should store switches in a secure, locked, and preferably camera-monitored room. If this is not possible, you should bolt the switch in place. Console port To protect management access to the switchs console port, you should store the switch in a secure, locked, and preferably camera-monitored room. If you cannot secure the switch physically, you should disable the console port. You should consider setting a secure password for console access even on physically secure switches.

  • Getting Started with HP Switching and Routing

    2 18 Rev. 13.31

    Reset and Clear buttons You should do one of the following: Store the switch in a secure, locked, and preferably camera-monitored

    room so that only authorized staff can use the buttons. Configure the switch to disable the buttons. (The Building SMB Networks

    with HP Technologies course will teach you how.)

    Ports The only way to protect against a user disconnecting cables is to store the switch in a secure, locked, and preferably camera-monitored room. Power cord The only way to protect against a user removing the switch power is to store the switch in a secure, locked, and preferably camera-monitored room.

  • Security

    Rev. 13.31 2 19

    Module 2: Security

    Authenticating management users

    You will now focus on securing your network infrastructure devices by authenticating management users. Specifically, you will learn how to:

    Ensure that only authorized users have access to a switch

    Distinguish between the levels of access provided to management users

    Console port (might not be necessary if the device is physically secure)

    Telnet

    Secure Shell (SSH)

    HTTP and HTTP over Secure Sockets Layer (HTTPS)

    You should generally set up authentication for all forms of management access:

    You will now focus on securing your network infrastructure devices by authenticating management users. Specifically, you will learn how to: Ensure that only authorized users have access to a switch Distinguish between the levels of access provided to management users You should generally set up authentication for all forms of management access: Console port (might not be necessary if the device is physically secure) Telnet Secure Shell (SSH) HTTP and HTTP over Secure Sockets Layer (HTTPS)

  • Getting Started with HP Switching and Routing

    2 20 Rev. 13.31

    Module 2: Security

    Authentication on Comware switches

    Introduction As you learned previously, Comware switches have several user interfaces, which control various forms of management access. For each interface, you can select one of the following authentication methods: None: No authentication is required (not recommended). Password: All users who log in through the same interface use the same

    password and receive the same level of access. Authentication, Authorization, and Accounting (AAA): Users

    authenticate to either a local list or to an external server (usually a RADIUS server). They are authorized for the level of management access associated with their account.

    The figure shows the AAA authentication process. Step 1 When a user attempts to establish a management session, the switch prompts the user for his or her credentials. Step 2 The user supplies the credentials: a user name and password.

  • Security

    Rev. 13.31 2 21

    Step 3 The switch forwards the login credentials to a RADIUS or TACACS server for validation. (Alternatively, the switch could have a local record of user accounts and validate the credentials itself.) Step 4 The server validates the login credentials and notifies the switch whether or not to grant the user access. If the user is granted access, the server also tells the switch what level of access the user receives. The switch enforces the decision.

  • Getting Started with HP Switching and Routing

    2 22 Rev. 13.31

    Module 2: Security

    Authentication on ProVision switches

    Introduction HP ProVision switches also support multiple authentication methods. You can select a primary and backup method for each access method: Telnet, SSH, console, or Web. None: No authentication is required (not recommended). Local authentication: All operators log in with a single operator account,

    and all managers log in with a single manager account. Remote RADIUS or TACACS+ authentication: The switch sends a

    request to an authentication sever (usually a RADIUS server). Each management user has a unique user account, and when a user logs in successfully, the authentication server assigns each user an attribute for either operator or manager access.

    The figure illustrates the steps in the local authentication process. Step 1 When a user attempts to open a management session, the switch prompts the user for a password. Step 2 The user submits a password. If the password matches the manager or operator password, the user receives manager or operator privilege, respectively. If the user does not enter valid credentials, he or she cannot access the switch.

  • Security

    Rev. 13.31 2 23

    Module 2: Security

    1Secure management protocols

    When you manage a switch, you send vital information over the connection. For out-of-band management, such as with a connection to the console port of the switch, you can be certain that no one can intercept the data.

    The out-of-band console connection does not provide encryption but is free from snooping.

    With in-band management, however, the vital data crosses the shared network. Hackers might be able to intercept and read data sent in clear-text and then use that data to obtain unauthorized access to your switches or to impersonate network servers.

    You must protect the datas privacy by using secure management protocols that support encryption.

    2 Access the CLI with SSHv2 to encrypt in-band management traffic.

    3 Access the Web interface with HTTPS to encrypt in-band management traffic.

    When you manage a switch, you send vital information over the connection. For out-of-band management, such as with a connection to the console port of the switch, you can be certain that no one can intercept the data. With in-band management, however, the vital data crosses the shared network. Hackers might be able to intercept and read data sent in clear-text and then use that data to obtain unauthorized access to your switches or to impersonate network servers. You must protect the datas privacy by using secure management protocols that support encryption.

  • Getting Started with HP Switching and Routing

    2 24 Rev. 13.31

    Module 2: Security

    SSHv2

    Introduction SSHv2 ensures the privacy and integrity of management traffic by: Securing authentication Encrypting management traffic SSH establishes a secure tunnel between your management station and the switch. The figure shows the process of establishing the tunnel and logging the user in. Step 1 The management station establishes a secure tunnel on the SSHv2 Transport Layer. The station and the switch agree on shared encryption and hash keys using the secure Diffie-Hellman exchange. Using these keys, the station and switch can transform data so that hackers cannot tamper with it (hash keys) or read it (encryption keys). When establishing the tunnel, the switch also uses a public-private key pair to prove its identity, which ensures that the management station does not send credentials to an imposter. For more information about hashing and the Diffie-Hellman exchange, refer to the HP Network Infrastructure Security Technologies WBT.

  • Security

    Rev. 13.31 2 25

    Step 2 The switch requests the management users credentials. The credentials are passed to the switch through the secure tunnel. The switch can then authenticate the user locally or to a remote server, as previously discussed. Step 3 The management station and switch establish communication channels to transmit the management session data within the secure tunnel.

  • Getting Started with HP Switching and Routing

    2 26 Rev. 13.31

    Module 2: Security

    HTTPS

    Introduction HTTPS uses the Secure Sockets Layer (SSL) protocol. Like SSHv2, SSL creates a secure tunnel using encryption and hashing keys generated in a Diffie-Hellman exchange. The figure illustrates the process. Step 1 Your management station and the switch establish a secure tunnel using the SSL protocol. When establishing the tunnel, the switch authenticates itself using a digital certificate. Step 2 All further communications run securely over the encrypted SSL connection. These communications include your authentication credentials and all management traffic after you log in successfully.

  • Security

    Rev. 13.31 2 27

    Module 2: Security

    SSH and HTTP requirements

    How do I set up HTTPS on HP Comware switches? How do I set up HTTPS on HP ProVision switches?

    How do I set up SSH on HP Comware switches? How do I set up SSH on HP ProVision switches?

    Introduction Read the following questions to learn how to use the secure management protocols. How do I set up HTTPS on HP Comware switches? On Comware switches, you need to generate and export a certificate request, which you then have signed by a certificate authority (CA). A CA is a trusted third-party company that certifies identities. You must then install the signed certificate and enable the HTTPS server on the switch. If you have software version 5.20 F2218P01-US or later, you can simply enable HTTPS, which automatically generates a self-signed certificate. In addition, the Comware switches require user accounts for HTTPS access, so you must configure at least one VTY user interface that uses AAA (scheme) authentication, either to the local list or to a RADIUS server. The users account must specify a service type of web. How do I set up HTTPS on HP ProVision switches? On ProVision switches, you need to generate and export a certificate request, which you then have signed by a certificate authority (CA). A CA is a trusted third-party company that certifies identities. You must then install the signed certificate and enable HTTPS on the switch.

  • Getting Started with HP Switching and Routing

    2 28 Rev. 13.31

    You can alternatively generate a self-signed certificate and enable HTTPS. You can choose any option that you learned about earlier for authenticating operators and managers. How do I set up SSH on HP Comware switches? On Comware switches, you must generate a public/private key pair for SSH. You can install the public key on management stations SSH clients manually or trust the key the first time you connect. You must also enable the SSH server, which is disabled by default. The Comware switches require user accounts for SSH access, so you must configure at least one VTY user interface that uses AAA (scheme) authentication, either to the local list or to a RADIUS server. You must create an SSH user on the switch for each local or RADIUS user who is allowed SSH access. The SSH user settings indicate whether this user authenticates with a password or uses public-key authentication. Password authentication allows SSH users to log in with the password in their accounts. If you select public-key authentication, you must generate a public/private key pair on each authorized managers SSH client and install the public keys on the switch. How do I set up SSH on HP ProVision switches? On ProVision switches, you must generate a public/private key pair for SSH. You can install the public key on management stations SSH clients manually or trust the key the first time you connect. You can also use SSH keys to authorize managers. Generate a public/private key pair on each authorized managers SSH client. Then install those keys on the switch as authorized client keys. Alternatively, operators and managers can just authenticate with usernames and passwords, using the options that you learned about earlier.

  • Security

    Rev. 13.31 2 29

    Module 2: Security

    Summary

    In this module, you learned about network threats and the measures you can take to protect against these threats. Specifically, you learned about:

    Threats originating from inside and outside a companys network

    HPs defense strategy that helps protect against threats, no matter where they originate

    Methods for securing your infrastructure, both from physical tampering and unauthorized access

    In this module, you learned about network threats and the measures you can take to protect against these threats. Specifically, you learned about: Threats originating from inside and outside a companys network HPs defense strategy that helps protect against threats, no matter where

    they originate Methods for securing your infrastructure, both from physical tampering

    and unauthorized access

  • Getting Started with HP Switching and Routing

    2 30 Rev. 13.31

    PAGE INTENTIONALLY LEFT BLANK

  • Rev. 13.31 3 1

    VLANs Module 3

    Module 3: VLANS

    Objectives

    This module explains one of the most fundamental aspects of managing todays networks, virtual LANs (VLANs).

    Describe how VLANs are used in todays networks

    Explain how the 802.1Q standard enables network infrastructure devices to transmit and receive traffic from multiple network segments

    After completing this module, you should be able to:

    Explain how to configure VLANs on HP Comware and ProVision switches

    Explain the terms tagged, untagged, access port, trunk port, and hybrid port as they relate to VLANs

    This module explains one of the most fundamental aspects of managing todays networks, virtual LANs (VLANs). After completing this module, you should be able to: Describe how VLANs are used in todays networks Explain how the 802.1Q standard enables network infrastructure devices

    to transmit and receive traffic from multiple network segments Explain how to configure VLANs on HP Comware and ProVision switches Explain the terms tagged, untagged, access port, trunk port, and hybrid

    port as they relate to VLANs

  • Getting Started with HP Switching and Routing

    3 2 Rev. 13.31

    Module 3: VLANS

    Definition of a VLAN

    A LAN is typically defined as a group of connected devices in close physical proximity. A virtual LAN (VLAN), on the other hand, is not defined by physical proximity. A VLAN is a logical group of devices that has been assigned to a particular subnet.

    VLANs can span multiple switches and can be used to segment the otherwise flat structure of a LAN.

    This course focuses on port-based VLANs, which are defined on switch ports.have been assigned to VLAN 10, some to VLAN 20, and others to VLAN 30.

    In this example network, some switch ports

    A LAN is typically defined as a group of connected devices in close physical proximity. A virtual LAN (VLAN), on the other hand, is not defined by physical proximity. A VLAN is a logical group of devices that has been assigned to a particular subnet. VLANs can span multiple switches and can be used to segment the otherwise flat structure of a LAN. This course focuses on port-based VLANs, which are defined on switch ports. In this example network, some switch ports have been assigned to VLAN 10, some to VLAN 20, and others to VLAN 30.

  • VLANs

    Rev. 13.31 3 3

    Module 3: VLANS

    IP addressing for VLANs

    In the example network, VLAN 10 is associated with 10.1.10.0/24, VLAN 20 with 10.1.20.0/24, and VLAN 30 with 10.1.30.0/24.

    All VLANs are located within the larger 10.1.0.0/16 subnet.

    NOTE: In this course, Classless Inter-Domain Routing (CIDR) is used to express network IP addresses. In place of the subnet mask, CIDR uses a prefix length, which indicates how many bits are in the network portion of the address. For more information about CIDR, see Request for Comments (RFC) 1519 (http://www.ietf.org/rfc/rfc1519.txt).

    Each VLAN is associated with an IP subnet.

    Each VLAN is associated with an IP subnet. In the example network, VLAN 10 is associated with 10.1.10.0/24, VLAN 20 with 10.1.20.0/24, and VLAN 30 with 10.1.30.0/24. All VLANs are located within the larger 10.1.0.0/16 subnet. Note: In this course, Classless Inter-Domain Routing (CIDR) is used to express network IP addresses. In place of the subnet mask, CIDR uses a prefix length, which indicates how many bits are in the network portion of the address. For more information about CIDR, see Request for Comments (RFC) 1519 (http://www.ietf.org/rfc/rfc1519.txt).

  • Getting Started with HP Switching and Routing

    3 4 Rev. 13.31

    Module 3: VLANS

    Need for VLANs on todays network

    Introduction Now that you have a basic understanding of what VLANs are, you should consider why companies use them. Security Todays networks provide services for different groups of users, such as employees, partners, and visitors. If all of these users are on the same subnet, it is easier for users to compromise security. For example, visitors might be able to view employees data as that data is transmitted across the network. They might try to access data center servers when they should only access the Internet. You can (and should) implement security to prevent unauthorized users from accessing these servers. However, users might still be able to launch scans, use a protocol analyzer to view traffic on the wire, or launch attacks. Companies can use VLANs to isolate traffic and help to ensure users only have access to the resources to which they should be granted access, increasing security. Broadcast domain An Ethernet network is, by definition, a broadcast domain. Devices on Ethernet networks send broadcasts to discover other devices or to provide information about themselves.

  • VLANs

    Rev. 13.31 3 5

    Broadcasts are forwarded to all devices in the broadcast domain, which defines the portion of the network to which devices can send traffic at the Data Link layer. A routing switch or router is required to route data between broadcast domains. In a large broadcast domain, broadcasts can negatively affect the endpoints that must process them and consume bandwidth. VLANs improve network performance. They break large broadcast domains into smaller broadcast domains, ensuring that every devices broadcasts do not flood the entire network infrastructure.

  • Getting Started with HP Switching and Routing

    3 6 Rev. 13.31

    Module 3: VLANS

    Example of network segmentation with VLANs

    Introduction Now you will look at an example of how a network designer might use VLANs to segment a company network. In this example, the company is using subnet 10.1.0.0/16. The network designer must plan the VLANs and IP addresses in tandem. Each VLAN will be associated with a unique IP subnet, and each department will be assigned to one or more VLANs. Phase 1: Design For the IP addressing scheme, each subnet will have a subnet mask of 255.255.255.0 (/24), which means that the network address uses the first three octets: The first octet for all subnets is 10 because the company is using

    private addresses in the 10.0.0.0/8 block. The second octet is being used as a site identifier. In the scenario above,

    1 has been assigned to identify this building. For other buildings, the company uses different values in the second octet.

    The third octet includes the VLAN ID. Each department or type of user will be assigned a different VLAN ID.

    The fourth octet is the host portion of the IP address. Certain addresses are reserved; 1 to 30 are used for servers, printers, and other shared network devices.

  • VLANs

    Rev. 13.31 3 7

    Users workstations can receive IP addresses in the 30 to 180 range. The remaining host numbers are reserved for future expansion. Phase 2: Guests The network designer knows that guests will need to access the network, primarily so that they can connect to the Internet while they are on-site. The network designer assigns VLAN 10 and subnet 10.1.10.0/24 to guests. Phase 3: IT The network designer assigns the IT group VLANs 1 and 5. VLAN 1 is