Go to Solution. Please I have a problem of inter-vlan routing, I have a core and two switches in each room floor. I created a vlan 11 and I give him an IP address and i enabled the ip routing in the core and in the switches in each room floor and I can not have the router with another VLAN and most all other vlan are not router, please how do??? Unauthorized use of this system can result in civil and criminal penalities!
The Switch will not change anything on the vlan tagging of the packet. Packets that do have a vlan tag with this vlan id will bei ignored.
Packets without tag will be handled by the untagged vlan on this port like said above. An access port is a port that only carries untagged traffic. It could be untagged traffic in any VLAN. A trunk port is a port that carries more than one VLAN. Turn on suggestions.
Configuring TACACS+ on the switch
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Showing results for. Search instead for.
Did you mean:. Contact Email us Tell us what you think. Log In. New Discussion. Tagged vs. Can anyone explain the true purpose of tagged vs. A real world example would be very helpful. I have read the documentation, but it is not really clear. Any help with this will be greatly appreciated. All forum topics Previous Topic Next Topic.
Trusted Contributor. The terminology of tagging is confusing if you don't have some understanding of how the protocol works. A tagged port will normally carry traffic for multiple VLANs from the switch to other network devices such as an upstream router or an edge switch In Cisco terminology this is called trunking, HP have no specific term for it.HP 1810G-24 switch startup
Hope this clears any confusion for you! Hi Robert, In the simplest form, I used to remember a 'Tagged' port as an inter-switch link and an 'Untagged' port as a host port. When you configure a port as 'Tagged' you are telling the switch to place an You want to use interface 24 to connect the switches. Where there is a will there is a way Thank you for taking the time to respond.
Configure a HP ProCurve switch
I just want to be clear. Are you saying that a physical ethernet cable is needs to be connected from port 20 to port 10 on the same switch to enable communication between VLAN 10 and VLAN 20? If so, I am assuming a physical cable would only be needed if IP Routing was not enabled on the switch?
Thank you for your help.Would you like to learn how to do a HP Switch initial configuration? Switch - 24 Ports. Switch - 48 Ports. Open Rack. Patch Panel. Punch Down Tool. CAT 6 Box. RJ Connectors. Patch Cord. Crimp, Cut and Strip Tool. Wire Tracker. Cable Tester. Despite having a good knowledge related to computer networks and even have some certifications on the subject, Luke, a year-old IT analyst has just received a mission to deploy a new network using only HP switches.
Don't forget to subscribe to our youtube channel named FKIT. HP Switch - Vlan. HP Switch - Voice Vlan. HP Switch - Trunk. HP Switch - Link Aggregation. HP Switch - Firmware Upgrade. HP Switch - Password Recovery.This how to will talk through the steps of connecting to a switch with a console cable, setting an IP address, turning on spanning tree, creating and tagging VLANs and setting a time server.
This How to was written using an older version of the firmware, that I believe is still being shipped on ProCurve swtiches firmware version up to but not including version Version 15 brings a new GUI which I will do a how to guide on later- however the steps are pretty much the same, you just need to guess where everything is in the GUI. This will get you going in a very basic setup, I've kept it simple and used the GUI for newbies, but there is a wealth of things ProCurve switches can do.
I can set new switches up to my needs, but if you are making big changes and not feeling confident e. Connect to the console port of your switch via a serial cable.
Get the COM address of your serial port from device manager. At this point, also connect both the laptop and switch to the network so they both get a lease on the same range. It's just a standalone. Run PuTTY, and select the 'serial' radio button. Enter the COM port from step 1, and enter the speed You can save these settings if you wish for a later session. Press enter until it prompts you for a username. The default username and password are blank, so just press enter at each.
Change the settings here by using the arrow keys to select a field and space to toggle through the options. Here I chose Unicast mode and set my SmoothWall box as the time server. This is important as it allows the switch to write information back to Spiceworks! You can also use software to write configurations to the switches. However, SNMP is a plain text phrase, and the default string of 'public' is commonly used, so I recommend changing it, and restricting write access if you are not using software to write to the switch.
On my network, I have removed public in favour of a custom string nameset it to manager so Spiceworks can get more infobut set write access to restricted for security purposes. We are now going to carry out the rest of the configuration in the web GUI.
In the console Window, go back to the main menu, then choose '0. Confirm by pressing y then enter, then the console window closes. Open up a browser Window and enter the IP address you wrote down in step 3. If you use a proxy server, add the IP address as a proxy bypass you can use wildcards if you have to edit a lot of switches via the GUI. Enter the switches name, location, and the name of the tech responsible for it congratulations, that's probably you!
VLANs are powerful tools. As a rule, I don't tag VLANs on switches where they are not needed, as there is no need for the additional traffic on those switches. Specify a friendly name, and the If we have a device that isn't VLAN You can make multiple changes at once. Click 'Apply'. This is useful as you can set a scan range in Spiceworks that only uses that subnet make sure Spiceworks can see that subnet.
I also have a folder with shortcuts to all my switch GUIs on the desktop of the Spiceworks server, for quick access.After clear password after pressing buttons, what username is to be entered after enable mode. Turn on suggestions. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Showing results for. Search instead for. Did you mean:. Contact Email us Tell us what you think.
Log In. New Discussion. Occasional Contributor. Tags: Password reset. All forum topics Previous Topic Next Topic.
Trusted Contributor. See the section "If you lose a password". Regards, Ralph. Respected Contributor. Holding the clear button for a few seconds will do the trick. Occasional Advisor. Hi Johanness, An easy way of resetting the ypur password is to press the clear button then voila, your password is gone. Occasional Visitor.
Is it possible to reset the password remotely.
ProCurve Networking Engineer. Hi, If you have disabled password clearing and factory reset on your device, you must contact HP support to recover from a lost password. The steps for this operation are: 1. The offset value for the password recovery feature is obtained by entering pwrecover at the password prompt. When this password is used, the switch generates a new random offset that is used to authenticate the new password.
Customers can disable this password-recovery scheme with the no frontpanelsecurity password-recovery command.
Showing results for. Search instead for. Did you mean:. Contact Email us Tell us what you think. Log In. New Discussion. Occasional Advisor. I'm trying to disable TFTP on some of my switches. I'm obviously going to update my firmware but it has to be scheduled since the network would be down and I need to get this disabled asap. Thanks for the help. All forum topics Previous Topic Next Topic. Respected Contributor. Hi John, The command is: no tftp server no tftp client for sure.
May be you are not in config status? I tried both of your suggestions. If I type in tftp? I am in the config section - after I logged in I type 'config' and it now shows me as My switch name I did the same thing on my switches with newer firmware and it works just fine.
These few switches I have are the older firmware and apparently these commands aren't in there. So I'm trying to find another way to disable it until I can upgrade the firmware. Honored Contributor. When features are missing, it's quite likely they are going to stay that way. The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise.
Please make sure that you are posting in the form of a question. Please enter a question. Skip to main content. See All Buying Options. Have one to sell? Sell on Amazon. Image Unavailable Image not available for Color:. Available from these sellers. This fits your. Have a question? There was a problem completing your request.
Please try your search again later. Product information Product Dimensions 8 x International Shipping This item is not eligible for international shipping. Technical Specification User Manual [pdf ]. Feedback If you are a seller for this product, would you like to suggest updates through seller support?
Would you like to tell us about a lower price? See questions and answers. Customer reviews. How does Amazon calculate star ratings? The model takes into account factors including the age of a rating, whether the ratings are from verified purchasers, and factors that establish reviewer trustworthiness.
No customer reviews.This example shows the default authentication configuration. The aaa authentication command configures access control for the following access methods:. This means that if the primary method fails, authentication is denied.
You are placed directly into operator or manager mode, depending on your privilege level. The server grants privileges at the operator privilege level. If the primary authentication method fails, determines whether to use the local password as a secondary method or to disallow access. Specifies the maximum number of login attempts allowed in the current session.
Specifies the access method used when authenticating. Available only if the primary method of authentication for the access being configured is local.
NOTE: If you do not specify this parameter in the command line, the switch automatically assigns the secondary method as follows:. If the primary method is tacacsthe only secondary method is local. If the primary method is localthe default secondary method is none. Privileges are represented by the numbers 0 through 15, with zero allowing only operator privileges and requiring two logins and 15 representing root privileges.
The root privilege level is the only level that will allow manager level access on the switch. Check the Shell box. Check the Privilege level box and set the privilege level to 15 to allow "root" privileges.
This allows you to use the single login option. For example, if you configure authentication on the switch with Telnet Login Primary as Local and Telnet Enable Primary as Tacacs, when you attempt to Telnet to the switch, you will be prompted for a local password.
The following is a set of access options and the corresponding commands to configure them:. The tacacs-server command configures these parameters:. Designating backup servers provides for a continuation of authentication services in case the switch is unable to contact the first-choice server.
An optional encryption key. In some applications, the term "secret key" or "secret" may be used instead of "encryption key". If the switch sends an authentication request, but does not receive a response within the period specified by the timeout value, the switch resends the request to the next server in its Server IP Addr list, if any. NOTE: As described in General authentication setup procedureHP recommends that you configure, test, and troubleshoot authentication via Telnet access before you configure authentication via console port access.
Configures an optional global encryption key. Removes the optional global encryption key. This does not affect any server-specific encryption key assignments. A switch uses a global encryption key only with servers with no server-specific key.
Locally authenticated clients goes through local authorization. Locally authenticated clients go through local authorization. Uses the same method as Authentication and Authorization. Enables authorization for all commands. This is the default option. When a server stops responding, the switch ignores this for a given amount of time and proceeds immediately to the next backup.