Software Update C.09.30 Release Notes
Software Update C.09.30 Release Notes
Software Update C.09.30 Release Notes
30 Release Notes
for the HP ProCurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M
Topics:
■ Software Management (page 1)
■ Operation and Enhancements for Multimedia Traffic Control (IGMP) (page 43)
■ New: Menu Enhancement for Moving from Operator Access to Manager Access (page 54)
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
www.procurve.com
ii
Contents
Software Management
Downloading Switch Documentation and Software from the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CDP
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Outgoing Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Incoming CDP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Viewing and Changing the Switch’s Current CDP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 29
iii
New: IGMP Now Operates With or Without IP Addressing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Configuration Options for Forced Fast-Leave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Listing the Forced Fast-Leave Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Configuring Per-Port Forced Fast-Leave IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Querier Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Changing the Querier Configuration Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
iv
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Trunking (HP and Fast EtherChannel—FEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Release History
Release C.09.30 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Release C.09.29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Release C.09.28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Release C.09.27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Release C.09.26 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Release C.09.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Release C.09.19 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Release C.09.18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Release C.09.16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Release C. 09.14 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Release C.09.13 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Release C.09.12 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Release C.09.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Release C.09.09 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Release C.09.08 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Release C.09.07 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Release C.09.06 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Release C.09.05 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Release C.09.04 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Release C.09.03 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Release C.09.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Release C.08.23 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Release C.08.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Release C.08.21 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Release C.08.20 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
v
Release C.08.04 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release C.08.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release C.08.02 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release C.08.01 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release C.07.28 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release C.07.27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release C.07.26 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Release C.07.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Release C.07.24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Release C.07.23 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Release C.07.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Release C.07.21 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Release C.07.20 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Release C.07.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Release C.07.01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Release C.06.07 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Release C.06.06 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Release C.06.05 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Release C.06.04 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Release C.06.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Release C.06.02 (BETA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Release C.06.01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Release C.05.07 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Release C.05.06 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Release C.05.05 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Release C.05.04 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Release C.05.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Release C.05.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
vi
Software Management
To Download Product Documentation: You will need the Adobe® Acrobat® Reader to view,
print, and/or copy the product documentation.
1. Go to HP’s ProCurve Web site at http://www.procurve.co.
2. Click Customer Care > Support > Manuals.
3. Select the product for which you want documentation.
4. On the resulting web page, double-click on a document that you want.
5. When the document file opens, click on the disk icon in the Acrobat® toolbar and save a
copy of the file.
1
TACACS+ Authentication for Centralized Control
of Switch Access Security
TACACS+ authentication in an HP Switch 1600M, 2400M, 2424M, 4000M, or 8000M enables you to
use a central server to allow or deny access to the switch (and other TACACS-aware devices) in your
network. This means that you can use a central database to create multiple unique username/
password sets with associated privilege levels for use by individuals who have reason to access the
switch from either the switch’s console port (local access) or Telnet (remote access).
A3 or A4
B3 A1
Terminal "A" Directly
Switch 4000M A Accessing the Switch
A2 or Configured for Via Switch’s Console
TACACS+ Operation Port
Primary B2
TACACS+
Server
B4
B
B1
The switch passes the login
requests from terminals A and B Terminal "B" Remotely Accessing The Switch Via Telnet
to the TACACS+ server for
authentication. The TACACS+
Access Request A1 - A4 : Path for Request from
server determines whether to
Terminal A (Through Console Port)
allow access to the switch and
what privilege level to allow for TACACS Server B1 - B4: Path for Request from
a given access request. Response Terminal B (Through Telnet)
N o t es R e g a r d i n g S o f t w a r e R e l e a s e C . 0 9 . x x
The HP ProCurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M supports TACACS+ authentication, which allows
or denies access to a device on the basis of correct username/password pairs managed by the TACACS+ server. This
release does not support TACACS+ authorization or accounting services.
TACACS+ does not affect web browser interface access. To block unauthorized access through the web browser
interface, see “Controlling Web Browser Interface Access When Using TACACS+ Authentication” on page 21.
2
For more on general authentication operation, see “How Authentication Operates” on page 18.
■ TACACS+ Server: The server or management station configured as an access control server
for TACACS-enabled devices. To use TACACS+ with a TACACS-aware HP switch and any
other TACACS-capable devices in your network, you must purchase, install, and configure
a TACACS+ server application on a server or management station in the network. The
TACACS+ server application you install will provide various options for access control and
access notifications. For more on the TACACS+ services available to you, see the documen-
tation provided with the TACACS+ server application you will use.
■ Authentication: The process for granting user access to a device through entry of a user
name and password and comparison of this username/password pair with previously stored
username/password data. Authentication also grants levels of access, depending on the
privileges assigned to a user name and password pair by a system administrator.
• Local Authentication: This method uses passwords configured locally on the switch;
one each for manager-level (read-write) and operator-level (read-only) access to the
switch. You can assign local passwords through the Menu or web browser interfaces.
(The web browser interface also allows you to assign a local username.) Because this
method assigns passwords to the switch instead of to individuals who access the switch,
you must distribute the password information on each switch to everyone who needs
to access the switch, and you must configure and manage password protection on a per-
switch basis. In the default configuration, Local authentication is automatically available
in the switch. (For more on local authentication, see the password information in the
Configuration and Management Guide shipped with your switch.
• TACACS+ Authentication: This method enables you to use a TACACS+ server in your
network to assign a unique password, user name, and privilege level to each individual
or group who needs access to one or more TACACS-aware switches or other TACACS-
aware devices. This allows you to administer primary authentication from a central
server, and to do so with more options than you have when using only local authentica-
tion. (You will still need to use local authentication as a backup if your TACACS+ servers
become unavailable.) This means, for example, that you can use a central TACACS+
server to grant, change, or deny access to a specific individual on a specific switch
instead of having to change local password assignments on the switch itself, and then
have to notify other users of the change.
3
• No Security: The switch can be accessed by anyone without requiring authentication.
This is the case when TACACS+ is not enabled on the switch and a local, manager-level
password is not configured in the switch. Allowing the switch to operate in this mode is
not recommended because it compromises switch and network access security.
■ Release C.09.xx or later software running on your HP ProCurve switch 1600M, 2400M, 2424M,
4000M, or 8000M. Use the following method to view the current software version:
From the Main Menu, click on
1. Status and Counters . . .
1. General System Information
(Check the version number on the Firmware revision line.)
Web Browser Interface:
Click on the Identity tab.
■ A TACACS+ server application installed and configured on one or more servers or manage-
ment stations in your network. (There are several TACACS+ software packages available.)
■ A switch configured for TACACS+ authentication, with access to one or more TACACS+
servers.
N o t es
The effectiveness of TACACS+ security depends on correctly using your TACACS+ server application. For this reason
HP recommends that you thoroughly test all TACACS+ configurations used in your network.
TACACS-aware HP switches include the capability of configuring multiple backup TACACS+ servers. HP recommends
that you use a TACACS+ server application that supports a redundant backup installation. This allows you to configure
the switch to use a backup TACACS+ server if it loses access to the first-choice TACACS+ server.
In release C.09.xx, TACACS+ does not affect web browser interface access. See "Controlling Web Browser Interface
Access" on page 21.
4
General Authentication Setup Procedure
It is important to test the TACACS+ service before fully implementing it. Depending on the process
and parameter settings you use to set up and test TACACS+ authentication in your network, you
could accidentally lock all users, including yourself, out of access to a switch. While recovery is
simple, it may pose an inconvenience that can be avoided. To prevent an unintentional lockout, use
a procedure that configures and tests TACACS+ protection for one access type (for example, Telnet
access), while keeping the other access type (console, in this case) open in case the Telnet access
fails due to a configuration problem. The following procedure outlines a general setup procedure.
Note
If a complete access lockout occurs on the switch as a result of a TACACS+ configuration, see "Troubleshooting
TACACS+ Operation" on page 22 for recovery methods.
1. Familiarize yourself with the requirements for configuring your TACACS+ server application to
respond to requests from the selected switch. (Refer to the documentation provided with the
TACACS+ server software.) This includes knowing whether you need to configure an encryption
key. (See “Using the Encryption Key” on page 20.)
2. Determine the following:
■ The IP address(es) of the TACACS+ ■ The period you want the switch to wait for
server(s) you want the switch to use a reply to an authentication request
for authentication. If you will use before trying another server.
more than one server, determine
which server is your first-choice for ■ The username/password pairs you want
authentication services. the TACACS+ server to use for controlling
access to the switch.
■ The encryption key(s), if any, for
allowing the switch to communicate ■ The privilege level you want for each user-
with the server. You can use either a name/password pair administered by the
global key or a per-server key, TACACS+ server for controlling access to
depending on the encryption config- the switch.
uration in the TACACS+ server(s). ■ The passwords you want to use for local
■ The number of log-in attempts you authentication (one each for Operator
will allow before closing a log-in and Manager levels).
session. (Default: 3)
3. Plan and enter the TACACS+ server configuration needed to support TACACS+ operation for
Telnet access (login/read-only and enable/read-write) to the switch. This includes the username/
password sets for logging in at the read-only privilege level and the sets for logging in at the
read/write privilege level.
5
Note on Privilege Levels
When a TACACS+ server authenticates an access request from a switch, it includes a privilege level code for the
switch to use in determining which privilege level to grant to the terminal requesting access. The switch interprets a
privilege level code of "15" as authorization for the Manager (read/write) privilege level access. Privilege level codes
of 14 and lower result in Operator (read-only) access. Thus, when configuring the TACACS+ server response to a
request that includes a username/password pair that should have Manager privileges, you must use a privilege level
of 15. For more on this topic, refer to the documentation you received with your TACACS+ server application.
If you are a first-time user of the TACACS+ service, HP recommends that you configure only the
minimum feature set required by the TACACS+ application to provide service in your network
environment. After you have success with the minimum feature set, you may then want to try
additional features that the application offers.
4. Ensure that the switch has the correct local password for Manager access. (If the switch cannot
find any designated TACACS+ servers, the local manager and operator passwords can be used
as the second access control method, depending on the configuration.)
Caution
You should ensure that the switch has a local Manager password. Otherwise, if authentication through a TACACS+
server fails for any reason, then unprotected access will be available through the console port or Telnet.
5. Using a terminal device connected to the switch’s console port, configure the switch for
TACACS+ authentication only for Telnet Login (read-only) access and Telnet Enable access. At
this stage, do not configure TACACS+ authentication for console access to the switch, as you
may need to use the console for access if the configuration for the Telnet method needs
debugging.
6. Ensure that the switch is configured to operate on your network and can communicate with
your first-choice TACACS+ server. (At a minimum, this requires IP addressing and a successful
ping test from the switch to the server.)
7. On a remote terminal device, use Telnet to attempt to access the switch. If the attempt fails, use
the console access to check the TACACS+ configuration on the switch. If you make changes in
the switch configuration, check Telnet access again. If Telnet access still fails, check the
configuration in your TACACS+ server application for mis-configurations or missing data that
could affect the server’s interoperation with the switch.
6
8. After your testing shows that Telnet access using the TACACS+ server is working properly,
configure your TACACS+ server application for console access. Then test the console access.
If access problems occur, check for and correct any problems in the switch configuration, and
then test console access again. If problems persist, check your TACACS+ server application for
mis-configurations or missing data that could affect the console access.
Overview
The switch uses three screens for viewing and configuring TACACS+ operation. To access these
screens, go to the Authentication Services screen:
From the Main menu, select:
2. Switch Management Access Configuration (IP, SNMP, Console) . . .
7. Authentication Services
7
■ 2. TACACS+ Operation :
• Specifies the timeout (wait) period for a response to an authentication request (default:
5 seconds).
• Defines the (global) encryption key to use if per-server encryption keys are not assigned.
(If the TACACS+ servers do not use encryption keys, this parameter should remain
empty.) For more on encryption keys, see “Encryption Options in the Switch” on page 20.
■ 3. TACACS+ Servers:
• Identifies the IP address(es) of the TACACS+ servers to use and the order of priority in
which the switch searches for a TACACS+ server.
• Defines the per-server encryption key (if any) associated with each individual server. If
a global encryption key is also configured in the TACACS+ Operation screen, the key
configured per-server in the TACACS+ Servers screen overrides the global key.
8
Table 1. Primary/Secondary Authentication Table
C a u t i o n R e g a r d i n g t h e U s e of L o c a l f o r L o gi n P r i m a r y A c c e s s
During local authentication (which uses passwords configured in the switch instead of in a TACACS+ server), the
switch grants read-only access if you enter the Operator password, and read-write access if you enter the Manager
password. For example, if you configure authentication on the switch with Telnet Login Primary as Local and Telnet
Enable Primary as Tacacs, when you attempt to Telnet to the switch, you will be prompted for a local password. If
you enter the switch’s local Manager password (or, if there is no local Manager password configured in the switch)
you can bypass the TACACS+ server authentication for Telnet Enable Primary and go directly to read-write (Manager)
access. Thus, for either the Telnet or console access method, configuring Login Primary for Local authentication while
configuring Enable Primary for TACACS+ authentication is not recommended, as it defeats the purpose of using the
TACACS+ authentication. If you want Enable Primary log-in attempts to go to a TACACS+ server, then you should
configure both Login Primary and Enable Primary for Tacacs authentication instead of configuring Login Primary to
Local authentication.
9
To View or Configure the Authentication Parameters for either Console or Telnet
Access
This procedure displays and configures the switch’s authentication modes and the number of log-in
attempts to allow per session.
1. From the Main menu, select:
2. Switch Management Access Configuration (IP, SNMP, Console) . . .
7. Authentication Services
1. Authentication
Note
As described under “General Authentication Setup Procedure” on page 5, HP recommends that you configure, test,
and troubleshoot authentication via Telnet access before you configure authentication via console port access. This
helps to prevent accidentally locking yourself out of switch access due to errors or problems in setting up authenti-
cation in either the switch or your TACACS+ server.
2. Press [E] (for Edit) to move the cursor to the Login Attempts field (default: 3; range 1 - 10). To change
this value, type a new number.
10
3. Use the downarrow key to select the Login Primary field for the access method you are configuring
(Console or Telnet).
4. Use the Space bar to select the Login Primary authentication mode (TACACS or Local).
Note
For a particular access method (Console or Telnet), if you want to use the TACACS mode for Enable Primary, then HP
recommends that you configure both the Login Primary and the Enable Primary as Tacacs. See “Caution Regarding
the Use of Local for Login Primary Access” on page 9.
5. Use the rightarrow key to move the cursor to the Login Secondary column for the selected access
method (Console or Telnet), then use the Space bar to select the secondary authentication mode.
6. Use the rightarrow key to move the cursor to the Enable Primary column, then use the Space bar
to select the Enable Primary authentication mode (TACACS or Local).
7. Use the rightarrow key to move the cursor to the Enable Secondary column for the selected access
method (Console or Telnet), then use the Space bar to select the secondary authentication mode.
For example, if you use steps 2 through 7 to configure Login Attempts for 2 and Telnet access with
Tacacs and None for authentication modes in both Login and Enable access levels, the Authenti-
cation screen would appear as follows:
11
9. Do the following:
a. If you need to view or change the period the switch waits for a TACACS+ server to respond
to an authentication request, or if you need to view or configure a global encryption key, go
to “Viewing and Configuring the Timeout Period and (Global) Encryption Key” on page 12.
(For more on encryption keys, see “Encryption Options in the Switch” on page 20.)
b. To view or configure the IP address(es) of the specific TACACS+ server(s) the switch is
using for authentication services, or to view or configure server-specific encryption keys,
go to “Viewing and Configuring TACACS+ Servers and (Per-Server) Encryption Keys” on
page 13. (For more on encryption keys, see “Encryption Options in the Switch” on page 20.)
Viewing and Configuring the Timeout Period and (Global) Encryption Key
Timeout Period. After polling a TACACS+ server, the switch uses a configurable timeout period to
determine how long to wait for a response. (The default is five seconds.) If no response is received
during the timeout period, the switch tries again using a different TACACS+ server (if configured in
the TACACS+ Servers screen).
(Global) Encryption Key. When configured, the switch uses this optional key whenever you have
not configured a per-server key in the TACACS+ Servers screen (page 13). (For more on encryption
keys, see “Encryption Options in the Switch” on page 20.)
Note
Use a global encryption key only if all TACACS+ servers supporting authentication for a particular switch have keys
configured for that switch. If a TACACS+ server supporting the switch does not have an encryption key applicable to
the switch, then assigning a global key in the switch will block authentication support from that server.
12
Viewing and Configuring the Timeout Period and (Global) Encryption Key
To View or Configure the Timeout period and global encryption key:
1. From the Main menu, select:
2. Switch Management Access Configuration (IP, SNMP, Console) . . .
7. Authentication Services
2. TACACS+ Operation
Default: 5 Seconds
Range: 1 - 255 Seconds
Figure 5. The Default Screen for Changing Timeout and/or Configuring the Optional Global Encryption Key
2. To change the TACACS+ Operation parameters:
a. Press [E] (for Edit). The cursor moves to the Timeout field.
b. Type the timeout value you want (any value from 1 to 255 seconds).
3. To enter or change the (optional) global encryption key
a. Press the downarrow key to move the cursor to the Encryption Key field.
b. Type the global encryption key.
4. Press [Enter] to return to the Actions bar, then [S] (for Save) to save your configuration changes
and return to the Authentication Services Menu.
13
Using (Per-Server) Encryption Keys
If you are assigning the switch to a TACACS+ server that uses an encryption key, you should enter
that key next to the server’s IP address if either of the following is true:
■ You are not assigning a Global encryption key in the TACACS+ Operation screen (figure 5
on page 13).
■ You are assigning a global encryption key in the TACACS+ Operation screen, but the global
key is not the same as the key used by the server you are currently entering.
For more on encryption keys, see “Encryption Options in the Switch” on page 20.
2. TACACS+ Servers
Since a per-server key is not assigned to this server, the switch will use the global key for authentication
requests to this server (if the key is configured in the TACACS+ Operation screen). If there is no global key,
then authentication requests from the switch to this server will not include an encryption key.
14
a. Press [A] (for Add) to display this screen.
Figure 7. Screen for Adding TACACS+ Servers and Associated (Per-Server) Encryption Keys
b. Enter the desired IP address in the Server IP Address field.
c. If you want to configure an encryption key to use with authentication requests to this server,
press the downarrow key and type the key in the Encryption Key field. Otherwise, skip this step.
d. Press [Enter], then [S] (for Save) to save the new server IP and optional key in the switch’s
TACACS+ server configuration and return to the TACACS+ Server screen (figure 6).
3. To delete a server entry:
a. Go to the TACACS+ Server screen (figure 6) and highlight the IP address of the server you
want to delete.
b. Press [D] (for Delete). The screen then prompts you as shown below:
15
The switch prompts you to verify deletion of the selected TACACS+
server and (if configured) the associated per-switch encryption key.
To complete the deletion, use the Space bar to select Yes, then press
[Enter] to complete the deletion and return to the TACACS+ Server
screen.
This section describes how adding and deleting servers affects how the switch prioritizes TACACS+
servers for authentication requests.
■ When the server list contains multiple servers, the switch always tries to authenticate
TACACS+ requests through the first server on the list. If the first server does not respond,
then the switch tries the second server, and so-on. If none of the servers in the list respond,
then the switch tries to authenticate access through local passwords on the switch (if
secondary authentication is configured as Local for the access method being used).
■ When the TACACS+ Server list contains only one or two IP addresses, adding a third IP
address places that address at the end of the list. When the list is full (three IP addresses),
you must delete one address before you can add another.
■ If you delete an IP address from the list and then add a new IP address to the list, the switch
gives the new address the same priority as the deleted address. For example, if you have the
following list configured:
16
1.1.1.1
2.2.2.2
If you delete 1.1.1.1 and add 3.3.3.3, then 3.3.3.3 will have the highest priority and the list will
appear as follows:
3.3.3.3
2.2.2.2
■ If you delete multiple addresses and then add new addresses, the switch assigns priority as
follows:
a. The first new address receives the priority that belonged to the first of the deleted
addresses.
b. The second new address receives the priority that belonged to the second of the deleted
addresses, and so-on.
For example, suppose you have three addresses in the Server IP Address list:
Changing Server IP Address Priority While Keeping the Same List of Servers
1. Delete the server you want to move down in priority.
2. Delete the server you want to move up in priority.
3. Add the server you deleted in step 2.
4. Add the server you deleted in step 1.
17
How Authentication Operates
General Authentication Process Using a TACACS+ Server
Authentication through a TACACS+ server operates generally as described below. For specific
operating details, refer to the documentation you received with your TACACS+ server application.
Using figure 9, above, after either switch detects a logon request from a remote or directly connected
terminal, the following events occur:
1. The switch queries the first-choice TACACS+ server for authentication of the request.
• If the switch does not receive a response from the first-choice TACACS+ server, it
attempts to query a secondary server. If the switch does not receive a response from any
TACACS+ server, then it uses its own local username/password pairs to authenticate the
logon request. (See "Local Authentication Process", on page 19.)
• If a TACACS+ server recognizes the switch, it forwards a username prompt to the
requesting terminal via the switch.
2. When the requesting terminal responds to the prompt with a username, the switch forwards it
to the TACACS+ server.
3. After the server receives the username input, the server forwards a password prompt to the
requesting terminal via the switch.
18
4. When the requesting terminal responds to the prompt with a password, the switch forwards it
to the TACACS+ server and one of the following actions occurs:
• If the username/password pair received from the requesting terminal matches a user-
name/password pair previously stored in the server, then the server passes access
permission through the switch to the terminal.
• If the username/password pair entered at the requesting terminal does not match a
username/password pair previously stored in the server, access is denied. In this case,
the terminal is again prompted to enter a username and repeat steps 2 through 4. In the
default configuration, the switch allows up to three attempts to authenticate a login
session. If the requesting terminal exhausts the attempt limit without a successful
TACACS+ authentication, the login session is terminated and the operator at the
requesting terminal must initiate a new session before trying again.
■ "Local" is the primary authentication option for the access method being used.
■ TACACS+ is the primary authentication mode for the access method being used. However,
the switch was unable to connect to any TACACS+ servers (or no servers were configured)
AND Local is the secondary authentication mode being used.
For local authentication, the switch uses the operator-level and manager-level passwords previously
configured locally on the switch. (These are the passwords you can configure using the menu
interface or the web browser interface—which enables only the local password configuration).
■ If the operator at the requesting terminal correctly enters the password for either access
level, access is granted.
■ If the password entered at the requesting terminal does not match either password previ-
ously configured locally in the switch, access is denied. In this case, the terminal is again
prompted to enter a password. In the default configuration, the switch allows up to three
attempts. If the requesting terminal exhausts the attempt limit without a successful authen-
tication, the login session is terminated and the user at the requesting terminal must initiate
a new session before trying again.
Note
The switch’s menu allows you to configure only the local Operator and Manager passwords. In this case, all prompts
for local authentication will request only a local password. However, if you use the web browser interface to configure
usernames for local access, you will be prompted for both a local username and a local password during local
authentication.
19
TACACS+ does not affect web browser interface access. To block unauthorized access through the web browser
interface, see “Controlling Web Browser Interface Access When Using TACACS+ Authentication” on page 21.
■ Global key: A general key assignment in the TACACS+ server application that applies to all
TACACS-aware devices for which an individual key has not been configured.
■ Individual key: A unique key assignment in the TACACS+ server application that applies
to a specific TACACS-aware device.
Note
Configure a key in the switch only if the TACACS+ server application has this exact same key configured for the switch.
That is, if the key parameter in switch "X" does not exactly match the key setting for switch "X" in the TACACS+ server
application, then communication between the switch and the TACACS+ server will fail.
Thus, on the TACACS+ server side, you have a choice as to how to implement a key. On the switch
side, it is necessary only to enter the key parameter so that it exactly matches its counterpart in the
server. For information on how to configure a general or individual key in the TACACS+ server, refer
to the documentation you received with the application.
20
Note
If you configure both a global key and one or more per-server keys, the per-server keys will override the global key
for the specified servers.
■ Configure local authentication (a Manager user name and password and, optionally, an
Operator user name and password) on the switch.
■ Configure the switch’s Authorized IP Manager feature to allow web browser access only from
authorized management stations. (The Authorized IP Manager feature does not interfere with
TACACS+ operation.)
■ Disable web browser access to the switch by going to the System Information screen in the
Menu interface and configuring the Web Agent Enabled parameter to No.
Operating Notes
■ If you configure Authorized IP Managers on the switch, it is not necessary to include any
devices used as TACACS+ servers in the authorized manager list. That is, TACACS+ operates
regardless of any Authorized IP Manager configuration.
■ When the switch is not configured to use TACACS+ servers—or when the switch’s only
designated TACACS+ servers are not accessible— setting a local Operator password
without also setting a local Manager password does not protect the switch from manager-
level access by unauthorized persons.) See also the Caution on page 9.
21
Troubleshooting TACACS+ Operation
Event Log. When troubleshooting TACACS+ operation, check the switch’s Event Log (accessed
from the Main menu) for indications of problem areas.
All Users Are Locked Out of Access to the Switch. If the switch is functioning properly, but no
username/password pairs result in console or Telnet access to the switch, the problem may be due
to how the TACACS+ server and/or the switch are configured. Use one of the following methods to
recover:
■ Access the TACACS+ server application and adjust or remove the configuration parameters
controlling access to the switch.
■ Disconnect the switch from network access to any TACACS+ servers and then log in to the
switch using either Telnet or direct console port access. Because the switch cannot access
a TACACS+ server, it will default to local authentication. You can then use the switch’s local
Operator or Manager password to log on.
■ As a last resort, use the Clear/Reset button combination to reset the switch to its factory
default boot-up configuration. Taking this step means you will have to reconfigure the switch
to return it to operation in your network.
No Communication Between the Switch and the TACACS+ Server Application. If the
switch can access the server device (that is, it can ping the server), then a configuration error may be
the problem. Some possiblities include:
■ The server IP address configured in the switch’s TACACS+ Server screen may not be correct.
■ The encryption key configured in the server does not match the encryption key configured
in the switch. Verify the key in the server and compare it to the key configured in the switch.
■ The accessible TACACS+ servers are not configured to provide service to the switch.
Access Is Denied Even Though the Username/Password Pair Is Correct. Some reasons for
denial include the following parameters controlled by your TACACS+ server application:
■ The access attempt is through a port that is not allowed for the account.
■ The access attempt is outside of the timeframe allowed for the account.
22
■ The allowed number of concurrent logins for the account has been exceeded.
For more help, refer to the documentation provided with your TACACS+ server application.
Unknown Users Allowed to Login to the Switch. Your TACACS+ application may be configured
to allow access to unknown users by assigning them the privileges included in a default user profile.
Refer to the documentation provided with your TACACS+ server application.
System Allows Fewer Login Attempts than Specified in the Switch Configuration. Your
TACACS+ server application may be configured to allow fewer login attempts than you have
configured in the switch.
23
CDP
Introduction
In HP ProCurve switches running software version C.09.xx or later, CDP-v1 (Cisco Discovery
Protocol, version 1) provides data that aids SNMP-based network mapping utilities designed to
discover devices running CDP in a network. To make this data available, the switch transmits
information about itself via CDP packets to adjacent devices, and also receives and stores information
about adjacent devices running CDP. This enables each CDP device to receive and maintain identity
data on each of its CDP neighbors and pass this information off to an SNMP utility designed to query
the CDP area of the device’s MIB.
Note
To take advantage of CDP, you should have a working knowledge of SNMP operation and an SNMP utility capable of
polling the switches for CDP data. HP’s implementation of CDP places specific data into the switch’s Management
Information Base (MIB). However, retrieval of this data for network mapping is dependent on the operation of your
SNMP utility. Refer to the documentation provided with the utility.
This section describes CDP operation in the HP ProCurve Switches 1600M, 2400M, 2424M, 4000M,
and 8000M. For information on how to use an SNMP utility to retrieve the CDP information from the
switch’s CDP Neighbors table (in the switch’s MIB), refer to the documentation provided with the
particular SNMP utility. For information on the object identifiers in the CDP MIB, see “Viewing the
CDP Neighbor Table” on page 32.
CDP Terminology
■ CDP Device: A switch, server, router, workstation, or other device running CDP.
■ CDP-Aware: A device that has CDP in its operating code (with CDP either enabled or
disabled in that device).
24
■ CDP-Disabled: A CDP-aware device on which CDP is currently disabled.
■ Non-CDP Device: A device that does not have CDP capability in its operating code.
■ CDP Neighbor: A CDP device that is either directly connected to another CDP device or
connected to that device by a non-CDP device, such as some hubs.
Switch "B" Switch "D" Note: A given switch’s CDP Neighbor table
with CDP Running with CDP Running includes data only on neighbor CDP devices, but
CDP Neighbor Table CDP Neighbor Table not on that switch itself.
Figure 10. Example of How the Switches Store Data on Neighbor CDP Devices
Outgoing Packets
A switch running CDP periodically transmits a one-hop CDP packet out each of its ports. This packet
contains data describing the switch and, if the one-hop destination is another device running CDP,
the receiving device stores the sending device’s data in a CDP Neighbors table. The receiving device
also transmits a similar one-hop CDP packet out each of its ports to make itself known to other CDP
devices to which it is connected. Thus, each CDP device in the network provides data on itself to the
CDP neighbors to which it is directly connected. However, there are instances where a packet is
forwarded beyond the immediate neighbor, or simply dropped.
25
Accepts, but does not forward CDP
Switch "B" packets describing Switch "A". Also
CDP-Aware transmits CDP packets describing itself
Switch with (Switch "B") out all ports.
CDP Running
Non-CDP devices such as some hubs and other devices that do not have CDP capability are
transparent to CDP operation. (Other hubs are CDP-aware, but still forward CDP packets as if they
were transparent to CDP operation. See “CDP-Capable Hubs” on page 34.) However, an intervening
CDP-aware device that is CDP-disabled is not transparent. For example, in figure 12, the CDP
26
neighbor pairs are as follows: A/1, A/2, A/3, A/B, B/C. Note that "B" and "E" are not neighbors because
the intervening CDP-disabled switch "D" does not forward CDP packets; i.e. is not transparent to CDP
traffic. (For the same reason, switch "E" does not have any CDP neighbors.)
Port 17 Port 1
CDP Switch "C"
(CDP Running)
Port 3
CDP Neighbor Table "A", "1", "2", and "3" are CDP neighbors.
"A" and "B" are CDP neighbors.
Port | Data
-------|-------------------- "B" and "C" are CDP neighbors.
3 | Switch "B" data Because "D" is CDP-capable, but has
disabled CDP, it is not a CDP neighbor
to either "B" or "E".
Thus, based on the CDP packets it receives, each CDP device maintains a per-port data entry for each
of its neighbors that are running CDP, but not for other CDP devices that are accessible only through
a CDP neighbor. (See the relationship between switches A, B, and C in figure 12.) In other words, a
CDP device will have data on its immediate CDP neighbors (including those reached through a device
that is transparent to CDP), but not to other CDP devices in the network.
27
Table 2. How Devices Handle Incoming CDP Packets
Running CDP Stores neighbor data in CDP Neighbor table in the device MIB. Does not forward CDP
packet.
CDP Disabled Drops CDP packet. There is no CDP Neighbor table in the device MIB and no CDP neighbor
data is stored.
No CDP Capability Forwards CDP packet out all ports except the port on which the packet was received.
Router Running CDP Stores neighbor data in the CDP Neighbor table in the router’s MIB. Does not forward CDP
packet.
Non-CDP devices (that is, devices that are not capable of running CDP) are transparent to CDP
operation. However, an intervening CDP-aware device that is CDP-disabled is not transparent. For
example, in figure 12 (page 27), "B", "D", and "E" are not CDP neighbors because "D" (the intervening
CDP-disabled switch) does not forward CDP packets; i.e. is not transparent to CDP traffic. (For the
same reason, switch "E" does not have any CDP neighbors.)
Figure 12 (page 27) illustrates how multiple CDP neighbors can appear on a single port. In this case,
switch "A" has three CDP neighbors on port 1 because the intervening devices are not CDP-capable
and simply forward CDP neighbors data out all ports (except the port on which the data was
received).
■ Specify the hold time (CDP packet time-to-live) for CDP data delivered to neighboring CDP
devices. For example, in CDP switch "A" you can specify the hold time for switch "A" entries
in the CDP Neighbor tables of other CDP devices. (Default: 180 seconds)
■ Use the walkmib command to display the current contents of the switch’s CDP Neighbors
table (page 32).
28
Viewing and Changing the Switch’s Current CDP Configuration
Parameter Operation
Enable CDP Enabling CDP operation (the default) on the switch causes the switch to:
• Transmit CDP packets describing itself to other, neighboring CDP devices
• Add entries to its CDP Neighbors table for any CDP packets it receives from other, neighboring
CDP devices
Disabling CDP operation clears the switch’s CDP Neighbors table, prevents the switch from
transmitting outbound CDP packets to advertise itself to neighboring CDP devices, and causes
the switch to drop inbound CDP packets from other devices without entering the data in the CDP
Neighbors table in the switch’s MIB (Management Information Base).
CDP Hold Time The default hold time for the switch’s CDP packet information in the CDP Neighbors table of
another CDP device is 180 seconds (range: 10 - 255 seconds). This parameter is controlled in
the transmitting switch, and applies to to all outbound CDP packets the switch transmits.
CDP Transmit Interval The default interval the switch uses to transmit CDP packets describing itself to other, neighbor
devices is 60 seconds. (range: 5 - 254).
CDP Parameters
29
Figure 13. The Default System Information Screen
2. To change the CDP configuration, press [E] (for Edit), and then use the the downarrow key to
move to the CDP parameter you want to change.
• To enable or disable CDP operation, use the Space bar to select Yes or No.
• To change the CDP Hold Time or CDP Transmit Interval, type the desired time value in the
appropriate field.
3. Press [Enter] to return to the Actions line, then press [S] (for Save) to save your changes.
Switch "X" CDP Packets from Switch "X" to Switch "Y" Switch "Y"
Port A3
CDP Enabled CDP Enabled
Port 1
CDP Neighbor Table Port C5 STP Root Device
CDP Packets from
Port | Data Switch "Y" to Switch "X"
------|------------------
CDP Neighbor Table
A3 | Switch "Y"data
Port | Data
C5 | Switch "Y" data
------|------------------
1 | Switch "X" data
Port 8
STP block on port C5 of switch "X" blocks
outbound transmission of CDP packets from
switch "X", but does not block inbound
packets to switch "X" from switch "Y".
Figure 14. Example of How STP and the STP Root Device Affects CDP Packet Transmission
■ Switch "X" sends outbound CDP packets on the forwarding link, and the switch "Y" CDP
Neighbors table records switch "X" on only one port.
■ Switch "Y" sends outbound CDP packets on both links, and the switch "X" CDP Neighbors
table shows switch "Y" on both ports.
30
To summarize, in a CDP neighbor pair running STP with redundant links, if one of the switches is the
STP root, it transmits CDP packets out all ports connecting the two switches, while the other switch
transmits CDP packets out only the unblocked port. Thus, the STP root switch will appear on multiple
ports in the non-root switch’s CDP Neighbors table, while the non-root switch will appear on only
one port in the root switch’s CDP Neighbors table.
31
For example, in figure 15, port 1 on CDP switch "X" is connected to port 5 on CDP neighbor switch
"Y", with the indicated VLAN configuration on port 5:
Figure 15. Example of IP Address Selection when the CDP Neighbor Has Multiple VLANs with IP
Addresses
32
CDP Neighbor Data MIB Value
Device Name (ASCII string) In HP ProCurve switches, this is the value configured for the System Name parameter.
and Device MAC Address (MIB: cdpCacheDeviceId.<inbound port #>)
Source Port Number On the source (neighbor) device, the number of the port through which the CDP packet
was sent.
(MIB: cdpCacheDevicePort.<inbound port #>)
Displaying CDP Neighbor Data. Go to the switch’s command prompt and use the walkmib
command, as shown below.
1. From the Main Menu, select:
5. Diagnostics . . .
4. Command Prompt
2. Enter the following walkmib command:
walkmib cdpCacheEntry
For example, executing the above command in a Switch 8000M connected to two HP ProCurve
Series 2500 switches with CDP enabled produces a listing similar to that shown in figure 16:
33
DEFAULT_CONFIG: walkmib cdpCacheEntry
The first number after the MIB string is the HP 8000M port
on which the data point for that entry was received.
Operating Notes
Neighbor Maximum. The HP ProCurve switches support up to 60 neighbors in the CDP Neighbors
table.
Multiple CDP Devices on the Same Port. Multiple CDP devices can be neighbors on the same
port if they are connected to the switch through a non-CDP device, such as some hubs.
CDP Version Data. The HP ProCurve switches use CDP-v1, but do not include IP prefix information,
which is a router function; not a switch function.
Port Trunking with CDP. Where a static port trunk forms the link between the switch and another
CDP device, only one physical link in the trunk is used to transmit outbound CDP packets.
CDP-Capable Hubs. Some hubs are capable of running CDP, but also forward CDP packets as if the
hubs themselves were transparent to CDP. Such hubs will appear in the switch’s CDP Neighbor table
and will also maintain a CDP neighbor table similar to that for switches. For more information, refer
to the documentation provided for the specific hub.
34
Clearing the Switch’s CDP Neighbors Table. Use the switch’s System Information screen to
disable CDP on the switch and then re-enable it.
■ If there is more than one physical path between the switch and the other CDP device and
STP is running on the switch, then STP will block the redundant link(s). In this case, the
switch port on the remaining open link may not be a member of an untagged VLAN, or any
untagged VLANs to which the port belongs may not have an IP address.
■ The adjacent device’s CDP Neighbors table may be full. Refer to the documentation provided
for the adjacent CDP device to determine the table’s capacity, and then view the device’s
Neighbors table to determine whether it is full.
One or more CDP neighbors appear intermittently or not at all in the switch’s CDP
Neighbors table. This may be caused by more than 60 neighboring devices sending CDP packets to
the switch. Exceeding the 60-neighbor limit can occur, for example, where multiple neighbors are
connected to the switch through non-CDP devices such as many hubs.
The Same CDP Switch or Router Appears on More Than One Port in the CDP Neighbors
Table. Where CDP is running, a switch or router that is the STP root transmits outbound CDP packets
over all links, including redundant links that STP may be blocking in non-root devices. In this case,
the non-root device shows an entry in its CDP Neighbors table for every port on which it receives a
CDP packet from the root device. See “Effect of Spanning Tree (STP) On CDP Packet Transmission”
on page 30.
An IP Address of 127.0.0.1 Appears in the CDP Neighbors Table. This is the loopback IP
address, which a port places in outbound CDP packets if none of the VLANs to which the port belongs
has an IP address. (See “How the Switch Selects the IP Address To Include in Outbound CDP Packets”
on page 31.)
35
New Time Synchronization Protocol Options
Using time synchronization ensures a uniform time among interoperating devices. This helps you to
manage and troubleshoot switch operation by attaching meaningful time data to event and error
messages.
Formerly, TimeP was the only time protocol available for time synchronization in the HP ProCurve
Switches 1600M, 2400M, 2424M, 4000M, and 8000M. Beginning with software release C.09.xx, the
switches also offer SNTP (Simple Network Time Protocol) and a new Time Sync. mode parameter for
changing the time protocol selection (or turning off time protocol operation).
N o t es
• Although you can create and save configurations for both time protocols without conflicts, the switch allows only
one active time protocol at any time.
• Time synchronization is no longer active in the factory default configuration. You must first select the desired
protocol, and then enable it.
• In the factory-default configuration for release C.09.xx and later, the time synchronization method is set to None.
(In earlier releases, the default wasTimeP with DHCP enabled for acquiring a TimeP server address).
• If you configure SNTP operation in the switch, but later download a configuration created using a pre-C.09.xx
version of the software, the SNTP configuration will be replaced by the non-SNTP time synchronization settings
in the downloaded configuration file.
36
provided with your SNTP server application.) Once the switch detects a particular server, it
ignores time broadcasts from other SNTP servers unless the configurable Poll Interval expires
three consecutive times without an update received from the first-detected server.
Note
To use Broadcast mode, the switch and the SNTP server must be in the same broadcast domain.
■ Unicast Mode: The switch requests a time update from the configured SNTP server. This
option provides increased security over the Broadcast mode by specifying which time server
to use instead of using the first one detected through a broadcast.
Note that simply selecting a time synchronization protocol does not enable that protocol on the
switch unless you also enable the protocol itself (step 2, above).
37
SNTP: Viewing, Selecting, and Configuring
Table 4. SNTP Parameters
Time Sync Mode Used to select either SNTP, TIMEP, or None as the time synchronization method.
SNTP Mode
Disabled The Default. SNTP does not operate, even if specified by the Menu interface Time Sync. mode
parameter.
Unicast Directs the switch to poll a specific server for SNTP time synchronization. Requires aserver address.
Broadcast Directs the switch to acquire its time synchronization from data broadcast by any SNTP server to the
network broadcast address. The switch uses the first server detected and ignores any others.
However, if the Poll Interval expires three times without the switch detecting a time update from the
original server, the switch accepts a broadcast time update from the next server it detects.
Poll Interval In Unicast Mode: Specifies how often the switch polls the designated SNTP server for a time update.
(seconds) In Broadcast Mode: Specifies how often the switch polls the network broadcast address for a time
update.
Server Address Used only when the SNTP Mode is set to Unicast. Specifies the IP address of the SNTP server that
the switch accesses for time synchronization updates.
Server Version Default: 3; range: 1 - 7. Specifies the SNTP software version to use, and is assigned on a per-server
basis. The version setting is backwards-compatible. For example, using version 3 means that the
switch accepts versions 1 through 3.
38
Time Protocol Selection Parameter
– TIMEP
– SNTP
– None (Default)
• Use the Space bar to select the Unicast mode, then do the following:
i. Press the rightarrow key to move the cursor to the Server Address field.
ii. Enter the IP address of the SNTP server you want the switch to use for time synchro-
nization.
Note: This step replaces any previously configured server IP address.
39
iii. Press the downarrow key to move the cursor to the Server Version field. Enter the value
that matches the SNTP server version running on the device you specified in the
preceding step (step ii). If you are unsure which version to use, HP recommends leaving
this value at the default setting of 3 and testing SNTP operation to determine whether
any change is necessary.
iv. Press the rightarrow key to move the cursor to the Poll Interval field, then go to step 5.
5. In the Poll Interval field, enter the time in seconds that you want for a Poll Interval. (For Poll
Interval operation, see table 4, “SNTP Parameters”, on page 38.)
6. Press [Enter] to return to the Actions line, then [S] (for Save).
Time Sync. mode Used to select either TIMEP, SNTP, or None (the default) as the time synchronization method.
Timep Mode
Disabled The Default. Timep does not operate, even if specified by the Menu interface Time Sync. mode
parameter.
DHCP When Timep is selected as the time synchronization method, the switch attempts to acquire a Timep
server IP address via DHCP. If the switch receives a server address, it polls the server for updates
according to the Timep poll interval. If the switch does not receive a Timep server IP address, it cannot
perform time synchronization updates.
Manual When Timep is selected as the time synchronization method, the switch attempts to poll the specified
server for updates according to the Timep poll interval. If the switch fails to receive updates from the
server, time synchronization updates do not occur.
Server Used only when the TimeP Mode is set to Manual. Specifies the IP address of the TimeP server that
Address the switch accesses for time synchronization updates. You can configure one server.
Poll Interval Default: 720 minutes. Specifies the interval the switch waits between attempts to poll the TimeP server
(minutes) for updates.
40
Viewing and Configuring TimeP
To View, Enable, and Modify the TimeP Protocol:
1. From the Main Menu, select:
2. Switch Management Access Configuration (IP, SNMP, Console) . . .
1. IP Configuration
41
ii. Enter the IP address of the TimeP server you want the switch to use for time synchro-
nization.
Note: This step replaces any previously configured TimeP server IP address.
iii. Press the rightarrow key to move the cursor to the Poll Interval field, then go to step 5.
5. In the Poll Interval field, enter the time in minutes that you want for a TimeP Poll Interval.
Press [Enter] to return to the Actions line, then [S] (for Save) to enter the new time protocol
configuration in both the startup-config and running-config files.
42
Operation and Enhancements for Multimedia
Traffic Control (IGMP)
■ Querier: A required IGMP device that facilitates the IGMP protocol and traffic flow on a
given LAN. This device tracks which ports are connected to devices (IGMP clients) that
belong to specific multicast groups, and triggers updates of this information. With IGMP
enabled, the switch uses data from the queries to determine whether to forward or block
multicast traffic on specific ports. When the switch has an IP address on a given VLAN, it
automatically operates as a Querier for that VLAN if it does not detect a multicast router or
another switch functioning as a Querier.
Without IGMP enabled, the switch simply floods all IP multicast traffic it receives on a given VLAN
through all ports on that VLAN (except the port on which it received the traffic). This can result in
significant and unnecessary bandwidth usage in networks where IP multicast traffic is a factor. Data-
Driven IGMP reduces this problem by authorizing the switch to restrict multicast traffic only to ports
where a given multicast group should flow.
An IP multicast packet includes the multicast group (address) to which the packet belongs. When an
IGMP client connected to a switch port needs to receive multicast traffic from a specific group, it
joins the group by sending an IGMP report (join request) to the network. (The multicast group
specified in the join request is determined by the requesting application running on the IGMP client.)
When a networking device with IGMP enabled receives the join request for a specific group, it
forwards any IP multicast traffic it receives for that group through the port on which the join request
was received. To reduce unnecessary traffic, the networking device does not forward a given group’s
43
multicast packets to ports from which a join request for that group has not been received. (If the
switch or router has not received any join requests for a given multicast group, it drops the traffic it
receives for that group.)
Video Join Request
Switch 4000M
Server for group "A"
Forward from Host A1
Outbound Multicast on VLAN 3
Traffic from Video Server Drop
for Group "A" on VLAN 3
Host "A1"
No Join Request from
Host A2 on VLAN 3
Group "A" Multicast
Traffic for Host "A1"
Thus, after you enable IGMP on a VLAN configured in the switch, it continually listens for IGMP
messages and IP multicast traffic on all ports in the VLAN, and forwards IGMP traffic for a given
multicast address only through the port(s) on that VLAN where an IGMP report (join request) for
that address was received from an IGMP client device.
Note
IP multicast traffic groups are identified by IP addresses in the range of 224.0.0.0 to 239.255.255.255.
Incoming IGMP packets intended for reserved, or "well-known" multicast addresses automatically flood through all
ports (except the port on which the packets entered the switch). For more on this topic, see “The Switch Excludes
Well-Known or Reserved Multicast Addresses from IP Multicast Filtering” on page 53.
44
IGMP Function Available With IP Addressing Available Operating Differences Without an IP Address
Configured on the VLAN Without IP
Addressing?
Drop multicast group traffic for which there Yes None
have been no join requests from IGMP clients
connected to ports on the VLAN.
Age-Out IGMP group addresses when the last Yes Requires that another IGMP device in the VLAN has an IP
IGMP client on a port in the VLAN leaves the address and can operate as Querier. This can be a multi-
group. cast router or another switch configured for IGMP oper-
ation. (HP recommends that the VLAN also include a
Support Fast-Leave IGMP (below) and Forced Yes device operating as a backup Querier in case the device
Fast-Leave IGMP (page 47). operating as the primary Querier fails for any reason.
Fast-Leave IGMP
IGMP Operation Presents a "Delayed Leave" Problem. Where multiple IGMP clients are
connected to the same port on an IGMP device (switch or router), if only one IGMP client joins a
given multicast group, then later sends a Leave Group message and ceases to belong to that group,
the IGMP device retains that IGMP client in its IGMP table and continues forwarding IGMP traffic to
the IGMP client until the Querier triggers confirmation that no other group members exist on the
same port. This means that the switch continues to transmit unnecessary multicast traffic through
the port until the Querier renews multicast group status.
Fast-Leave IGMP Reduces Leave Delays. Fast-Leave IGMP automatically operates on a port if
an IGMP client connects to the port and there are no other end nodes detected on that port. In this
case, when the client leaves a multicast group, Fast-Leave IGMP automatically accelerates the
blocking of further, unnecessary multicast traffic from that group to the former IGMP client. This
improves performance by reducing the amount of multicast traffic going through the port to the IGMP
client after the client leaves a multicast group.
45
Automatic Fast-Leave Operation. If a switch port is :
a. Connected to only one end node
b. The end node currently belongs to a multicast group; i.e. is an IGMP client
c. The end node subsequently leaves the multicast group
Then the switch does not need to wait for the Querier status update interval, but instead immediately
removes the IGMP client from its IGMP table and ceases transmitting IGMP traffic to the client. (If
the switch detects multiple end nodes on the port, automatic Fast-Leave does not activate—
regardless of whether one or more of these end nodes are IGMP clients.)
In the next figure, automatic Fast-Leave operates on the switch ports for IGMP clients "3A" and "5B",
but not on the switch port for IGMP clients "7A" and 7B, Server "7C", and printer "7D".
Fast-Leave IGMP Server
automatically operates on
5A 7A 7B
the ports connected to Fast-Leave IGMP 3A
7C
IGMP clients 3A and 5A, activates on these
but does not operate on two ports.
the port connected to
Switch 7X because the Switch 7X
Switch 4000M detects Routing Printer
multiple end nodes on that Switch
port. 1 3 5 7 7D
Acting as
Querier Switch 4000M
Fast-Leave IGMP does
not activate on this port.
When client "3A" running IGMP is ready to leave the multicast group, it transmits a Leave Group
message. Because the switch knows that there is only one end node on port 3, it removes the client
from its IGMP table and halts multicast traffic (for that group) to port 3. If the switch is not the
Querier, it does not wait for the actual Querier to verify that there are no other group members on
port 3. If the switch itself is the Querier, it does not query port 3 for the presence of other group
members.
Note that Fast-Leave operation does not distinguish between end nodes on the same port that belong
to different VLANs. Thus, for example, even if all of the devices on port 7 in figure 20 belong to
different VLANs, Fast-Leave does not operate on port 7.
46
New: Forced Fast-Leave IGMP
Forced Fast-Leave IGMP speeds up the process of blocking unnecessary IGMP traffic to a switch
port that is connected to multiple end nodes. (This feature does not activate on ports where the switch
detects only one end node. Instead, the regular Fast Leave described in the preceding section
activates.) For example, in figure 20, even if you configured Forced Fast-Leave on all ports in the
switch, the feature would activate only on port 7 (which has multiple end nodes) when a Leave Group
request arrived on that port.
When a port having multiple end nodes receives a Leave Group request from one end node for a given
multicast group "X", Forced Fast-Leave activates and waits a small amount of time to receive a join
request from any other group "X" member on that port. If the port does not receive a join request for
that group within the forced-leave interval, the switch then blocks any further group "X" traffic to the
port.
47
Listing the Forced Fast-Leave Configuration
The Forced Fast-Leave configuration data is available in the switch’s MIB (Management Information
Base), and includes the state (enabled or disabled) for each port and the Forced-Leave Interval for
all ports on the switch.
To List the Forced Fast-Leave State for all Ports in the Switch. Go to the switch’s command
prompt and use the walkmib command, as shown below.
1. From the Main Menu, select:
5. Diagnostics . . .
4. Command Prompt
ii. Because you can list the Forced Fast-Leave state for all ports on the switch from any
VLAN, just press [Enter] to select the displayed VLAN.
3. Enter either of the following walkmib command options:
walkmib hpSwitchIgmpPortForcedLeaveState
- OR -
walkmib 1.3.6.1.4.1.11.2.14.11.5.1.7.1.15.3.1.5
The resulting display lists the Forced Fast-Leave state for all ports in the switch, by VLAN. (A
port belonging to more than one VLAN will be listed once for each VLAN, and if multiple VLANs
are not configured, all ports will be listed as members of the default VLAN.) The following
command produces a listing such as that shown in figure 21:
DEFAULT_CONFIG: walkmib hpSwitchIgmpPortForcedLeaveState
48
The 2 at the end of a port
listing shows that Forced
Fast-Leave is disabled on
the corresponding port.
The 1 at the end of a port
listing shows that Forced
Fast-Leave is enabled on
the corresponding port.
Figure 21. Example of a Forced Fast-Leave Listing where all Ports are Members of the Default VLAN
To List the Forced Fast-Leave State for a Single Port. (See the "Note on VLAN Numbers" on
page 47.)
Go to the switch’s command prompt and use the getmib command, as shown below.
1. From the Main Menu, select:
5. Diagnostics . . .
4. Command Prompt
49
The 2 shows that Fast Forced-Leave
is disabled on port 7.
The 7 specifies port 7.
The 1 indicates the default VLAN.
(See the "Note on VLAN Numbers"
on page 47.)
Figure 22. Example Listing the Forced Fast-Leave State for a Single Port on the Default VLAN
Configuring Per-Port Forced Fast-Leave IGMP on Ports. This procedure enables or disables
Forced Fast-Leave on ports in a given VLAN. (See the "Note on VLAN Numbers" on page .)
1. From the Main Menu, select:
5. Diagnostics . . .
4. Command Prompt
where:
1 = Forced Fast-Leave enabled
2 = Forced Fast-Leave disabled
For example, suppose that your switch has a one-port gigabit module in slot C, and the port is a
member of the default VLAN. In this case, the port number is "17". (See figure 21 on page 49.) To
enable Forced Fast-Leave on the Gigabit port, you would execute the following command and
see the result shown in figure 23:
50
DEFAULT_CONFIG: setmib hpSwitchIgmpPortForcedLeaveState.1.17 -i 1
Note
A Querier is required for proper IGMP operation. For this reason, if you disable the Querier function on a
the switch, ensure that there is an IGMP Querier (and, preferably, a backup Querier) available on the same
VLAN.
If the switch becomes the Querier for a particular VLAN (for example, the DEFAULT_VLAN), then
subsequently detects queries transmitted from another device on the same VLAN, the switch ceases
to operate as the Querier for that VLAN. If this occurs, the switch Event Log lists a pair of messages
similar to these:
I 01/15/01 09:01:13 igmp: DEFAULT_VLAN: Other Querier detected
I 01/15/01 09:01:13 igmp: DEFAULT_VLAN: This switch is no longer Querier
In the above scenario, if the other device ceases to operate as a Querier on the default VLAN, then
the switch detects this change and can become the Querier as long as it is not pre-empted by some
other IGMP Querier on the VLAN. In this case, the switch Event Log lists messages similar to the
following to indicate that the switch has become the Querier on the VLAN:
51
I 01/15/01 09:21:55 igmp: DEFAULT_VLAN: Querier Election in process
I 01/15/01 09:22:00 igmp: DEFAULT_VLAN: This switch has been elected as Querier
To enable the querier setting, select the Command Prompt from the Main Menu and enter this
command:
setmib hpSwitchIgmpQuerierState.<vlan number> -i 1
To view the current querier setting, select the Command Prompt from the Main Menu and enter this
command:
getmib hpSwitchIgmpQuerierState.<vlan number>
where:
<vlan number> is the sequential (index) number of the specific VLAN. If no VLANs are
configured, use “1”. For example:
getmib hpSwitchIgmpQuerierState.1
52
The Switch Excludes Well-Known or Reserved Multicast Addresses
from IP Multicast Filtering
Each multicast host group is identified by a single IP address in the range of 224.0.0.0 through
239.255.255.255. Specific groups of consecutive addresses in this range are termed "well-known"
addresses and are reserved for predefined host groups. IGMP does not filter these addresses, so any
packets the switch receives for such addresses are flooded out all ports assigned to the VLAN on
which they were received (except the port on which the packets entered the VLAN). The following
table lists the 32 well-known address groups (8192 total addresses) that IGMP does not filter on the
1600M, 2400M, 2424M, 4000M, and 8000M switches.
53
New: Menu Enhancement for Moving from
Operator Access to Manager Access
Prior to release C.09.xx, with both the Operator (read-only) and Manager (read-write) password
configured, if you entered the menu interface at the Operator level you had to log out and re-enter
the menu interface to move to the Manager level. Now, using the new Enable Manager Mode option in
the Operator-level Main menu, you can move directly to the Manager level by entering the correct
Manager password. To do so, go to the Main Menu, select list item 4, Enable Manager Mode, and,
when prompted, enter the appropriate password. If TACACS+ authentication is operating for read-
write access, you will be prompted for the Enable-Level password configured for the switch in the
TACACS+ server.
Figure 24. The Main Menu with the "Enable Manager Mode" Option
54
Configuring and Using HP ProCurve Stack
Management
HP ProCurve Stack Management (termed stacking in this document) enables you to use a single IP
address and standard network cabling to manage a group of up to 16 switches in the same subnet
(broadcast domain). Using stacking, you can:
■ Simplify management of small workgroups or wiring closets while scaling your network to
handle increased bandwidth demand.
■ Eliminate any specialized cables for stacking connectivity and remove the distance barriers
that typically limit your topology options when using other stacking technologies.
■ Add switches to your network without having to first perform IP addressing tasks.
Stack Consists of a Commander switch and any Member switches belonging to that Commander.
Commander A switch that has been manually configured as the controlling device for a stack. When this occurs, the
switch’s stacking configuration appears as Commander.
Candidate A switch that is ready to join (become a Member of) a stack through either automatic or manual methods.
A switch configured as a Candidate is not in a stack.
Member The switch that has joined a stack and is under the control of the stack’s Commander.
55
Before: Stack named After: Switch "B" joins the stack, thus changing from a
"Engineering" consists Candidate to a Member of the stack.
of Commander and
Switch "A". Switch "B" is Stack
a Candidate eligible to Stack Name:
join the stack. Stack Name: Engineering
Engineering
General Operation
After you configure one switch to operate as the Commander of a stack, additional switches can join
the stack by either automatic or manual methods. After a switch becomes a Member, you can work
through the Commander switch to further configure the Member switch as necessary for all of the
additional software features available in the switch.
The Commander switch serves as the entry point for access to the Member switches. For example,
the Commander’s IP address becomes the path to a Member. The Commander’s Manager password
controls access to a Member.
Figure 26. Example of Stacking with One Commander Controlling Access to Wiring Closet Switches
56
Interface Options. You can configure stacking through either the console menu interface or the
web browser interface. For information on how to use the web browser interface to configure
stacking, see the online Help for the web browser interface.
Changes to the Web Browser Interface for Commander Switches. Updating an HP ProCurve
switch to software release C.08.xx or later and configuring the switch as a Commander for stacking
introduces a modified web browser interface that differs in appearance from the version documented
in the Management and Configuration Guide you received with your switches. Note that this change
does not appear in the web browser interface for Candidate and Member switches, and switches on
which the Stacking option is disabled. See page 78.
Changes to the Console Interface. Updating an HP ProCurve switch to software release C.08.xx
or later adds the Stacking option as item 8 in the Main Menu.
57
Operating Rules for Stacking
General Rules
■ Stacking is an optional feature (enabled in the default configuration) and can easily be
disabled. Stacking has no effect on the normal operation of the switch in your network.
■ A stack requires one Commander switch. (Only one Commander allowed per stack.)
■ All switches in a particular stack must be in the same subnet (broadcast domain). A stack
cannot cross a router.
■ There is no limit on the number of stacks in the same subnet (broadcast domain), however
a switch can belong to only one stack.
■ If VLANs are enabled, stacking uses only the default VLAN on any switch, even if you change
the name and/or ID number of the default VLAN. (See "Stacking Operation with a Tagged
VLAN" on page 77.)
■ Stacking allows intermediate devices that do not support stacking. This enables you to
include devices that are distant from the Commander.
Member Switch
58
Specific Rules for Commander, Candidate, and Member Switches
Commander IP Addr: Requires an Only one The Commander’s Manager Standard SNMP community
assigned IP address Commander and Operator passwords are operation. The Commander
and mask for access switch is allowed assigned to any switch also operates as an SNMP
via the network. (Other- per stack. becoming a Member of the proxy to Members for all
wise an IP address is stack. SNMP communities config-
optional.) If you change the ured in the Commander.
Stack Name: Required Commander’s passwords, the
Commander propagates the
new passwords to all stack
Members.
Candidate IP Addr: Optional. No limit. Passwords optional. If the Uses standard SNMP
Configuring an IP Candidate becomes a stack community operation if the
address allows access Member, it assumes the Candidate has its own IP
via Telnet or web Commander’s Manager and addressing.
browser interface Operator passwords.
while the switch is not
a stack member. In the
factory default configu-
ration the switch auto-
matically acquires an
IP address if your
network includes DHCP
service.
Stack Name: N/A
Member IP Addr: Optional. Up to 15 Members When the switch joins the Belongs to the same SNMP
Configuring an IP per stack. stack, it automatically communities as the
address allows access assumes the Commander’s Commander (which serves
via Telnet or web Manager and Operator pass- as an SNMP proxy to the
browser interface words and discards any pass- Member for communities to
without going through words it may have had while a which the Commander
the Commander switch. Candidate. belongs). To join other
This is useful, for communities that exclude
example, if the stack Note: If a Member leaves a the Commander, the
Commander fails and stack for any reason, it retains Member must have its own
you need to convert a the passwords assigned to the IP addressing. Loss of stack
Member switch to stack Commander at the time membership means loss of
operate as a replace- of departure from the stack. membership in any commu-
ment Commander. nity that is configured only
Stack Name: N/A in the Commander. See
"SNMP Community Opera-
tion in a stack" on 76.
59
Note
In the default stack configuration, the Candidate Auto Join parameter is enabled, but the Commander Auto Grab
parameter is disabled. This prevents Candidates from automatically joining a stack prematurely or joining the wrong
stack (if more than one stack Commander is configured in a subnet or broadcast domain). If you plan to install more
than one stack in a subnet, HP recommends that you leave Auto Grab disabled on all Commander switches and
manually add Members to their stacks. Similarly, if you plan to install a stack in a subnet (broadcast domain) where
software release C.08.xx or later is running on switches not intended for stack membership, you should set the Stack
State parameter (in the Stack Configuration screen) to Disabled on those particular switches.
Depending on how Commander and Candidate switches are configured, Candidates can join a stack
either automatically or by manual assignment through the Commander. The following table shows
your control options for adding Members to a stack.
Table 8. Stacking Configuration Guide
*The Commander’s Manager and Operator passwords propagate to all Members when they individually join the stack.
60
The easiest way to automatically create a stack is to:
1. Configure a switch as a Commander.
2. Configure IP addressing and a stack name on the Commander.
3. Set the Commander’s Auto Grab parameter to Yes.
4. Connect Candidate switches (in their factory default configuration) to the network.
■ Default stacking configuration (Stack State set to Candidate, and Auto Join set to Yes)
■ Same subnet (broadcast domain) and default VLAN as the Commander (If VLANs are used
in the stack environment, see "Stacking Operation with a Tagged VLAN" on page 77.)
■ No Manager password
This section describes the general stack creation process. For the detailed configuration processes,
see pages 62 through 71.
1. Determine the naming conventions for the stack. You will need a stack name. Also, to help
distinguish one switch from another in the stack, you can configure a unique system name for
each switch. Otherwise, the system name for a switch appearing in the Stacking Status screen
appears as the stack name plus an automatically assigned switch number. For example:
For status
descriptions, see the
table on page 77.
61
2. Configure the Commander switch. Doing this first helps to establish consistency in your stack
configuration, which can help prevent startup problems.
• The Commander assigns its Manager and Operator passwords to any Candidate switch
that joins the stack.
• SNMP community names used in the Commander apply to stack members.
3. If you need to access Candidate switches through your network before they join the stack, assign
IP addresses to these devices. Otherwise, IP addressing is optional for Candidates and Members.
4. Make a record of any Manager passwords assigned to the switches (intended for your stack)
that are not currently members. (You will have to use these passwords to enable the protected
switches to join the stack.)
5. If you are using VLANs in the stacking environment, you must use the default VLAN for stacking
links. For more information, see "Stacking Operation with a Tagged VLAN" on page 77.
6. Ensure that all switches intended for the stack are connected to the same subnet (broadcast
domain). As soon as you connect the Commander, it will begin discovering the available
Candidates in the subnet.
• If you configured the Commander to automatically add Members (Auto Grab set to Yes),
then any discovered Candidates meeting the following criteria will automatically
become stack Members:
– Auto Join parameter set to Yes (the default)
– Manager password not configured
• If you configured the Commander to manually add Members (Auto Grab set to No—the
default), you can begin the process of selecting and adding the desired Candidates.
7. Ensure that all switches intended for the stack have joined.
8. If you need to perform specific configuration or monitoring tasks on a Member, use the console
interface on the Commander to select and access the Member.
A stack requires one Commander switch. If you plan to implement more than one stack in a subnet
(broadcast domain), the easiest way to avoid unintentionally adding a Candidate to the wrong stack
is to manually control the joining process by leaving the Commander’s Auto Grab parameter set to No
(the default).
1. Configure an IP address and subnet mask on the Commander switch.
2. Display the Stacking Menu by selecting Stacking in the Main Menu.
62
Figure 30. The Default Stacking Menu
3. Display the Stack Configuration menu by pressing [3] to select Stack Configuration.
63
Figure 32. The Default Commander Configuration in the Stack Configuration Screen
6. Enter a unique stack name (up to 15 characters; no spaces) and press the downarrow key.
7. Ensure that you have a correct the Auto Grab setting, then press the downarrow key:
• No (the default) prevents automatic joining by Candidates having their Auto Join set to Yes.
• Yes enables the Commander to automatically take a Candidate into the stack as a Member
if the Candidate has Auto Join set to Yes (the default Candidate setting).
8. Accept or change the transmission interval (default: 60 seconds), then press [Enter] to return
the cursor to the Actions line.
9. Press [S] (for Save) to save your configuration changes and return to the Stacking menu.
Your Commander switch should now be ready to automatically or manually acquire Member switches
from the Candidate list, depending on your configuration choices.
In its default stacking configuration, a Candidate switch can either automatically join a stack or be
manually added ("pulled") into a stack by a Commander, depending on the Commander’s Auto Grab
setting. You can also reconfigure a Candidate switch to either "push" the Candidate into membership
with a specific Commander’s stack, convert the Candidate to a stack Commander (for a stack that
does not already have a Commander), or to operate as a standalone switch without stacking. You can
also change a Candidate’s Auto Join or Transmission Interval settings. The following table lists the options:
Table 9. Candidate Configuration Options
64
Use Telnet or the web browser interface to access the Candidate if it has an IP address. Otherwise,
use a direct connection from a terminal device to the switch’s console port. (For information on how
to use the web browser interface, see the online Help provided for the browser.)
1. Display the Stacking Menu by selecting Stacking in the console Main Menu.
2. Display the Stack Configuration menu by pressing [3] to select Stack Configuration.
65
6. Press [S] (for Save) to save your configuration changes and return to the Stacking menu.
In the default configuration, you must manually add stack Members from the Candidate pool. Reasons
for a switch remaining a Candidate instead of becoming a Member include any of the following:
Unless the stack is already full, you can use the Stack Management screen to manually convert a
Candidate to a Member. If the Candidate has a Manager password, you will need to use it to make
the Candidate a Member of the stack.
1. To add a Member, start at the Main Menu and select:
8. Stacking...
4. Stack Management
66
The Commander automatically selects an
available switch number (SN). You have the
option of assigning any other available number.
Candidate List
Figure 36. Example of Stack Management Screen After New Member Added
67
Moving a Member From One Stack to Another
Where two or more stacks exists in the same subnet (broadcast domain), you can easily move a
Member of one stack to another stack if the destination stack is not full. (If you are using VLANs in
your stack environment, see "Stacking Operation with a Tagged VLAN" on page 77.) This procedure
is nearly identical to manually adding a Candidate to a stack (page 66). (If the stack from which you
want to move the Member has a Manager password, you will need to know the password to make
the move.)
1. To move a Member from one stack to another, go to the Main Menu of the Commander in the
destination stack and display the Stacking Menu by selecting
8. Stacking...
2. To learn or verify the MAC address of the Member you want to move, display a listing of all
Commanders, Members, and Candidates in the subnet by selecting:
2. Stacking Status (All)
You will then see the Stacking Status (All) screen:
Figure 37. Example of How the Stacking Status (All) Screen Helps You Find Member MAC Addresses
3. In the Stacking Status (All) screen, find the Member switch that you want to move and note its
MAC address, then press [B] (for Back) to return to the Stacking Menu.
4. Display the Commander’s Stack Management screen by selecting
4. Stack Management
68
(For an example of this screen, see figure 34 on page 66.)
5. Press [A] (for Add) to add the Member. You will then see a screen listing any available candidates.
(See figure 35 on page 67.) Note that you will not see the Member you want to add because it is
a Member of another stack and not a Candidate.)
6. Either accept the displayed switch number or enter another available number. (The range is 0
- 15, with 0 reserved for the Commander.)
7. Use the downarrow key to move the cursor to the MAC Address field, then type the MAC address
of the desired Member you want to move from another stack.
8. Do one of the following:
• If the stack containing the Member you are moving has a Manager password, press the
downarrow key to select the Candidate Password field, then type the password.
• If the stack containing the Member you want to move does not have a password, go to
step 9.
9. Press [Enter] to return to the Actions line, then press [S] (for Save) to complete the Add process
for the selected Member. You will then see a screen similar to the one in figure 34 on page 66,
with the newly added Member listed.
Note: If the message Unable to add stack member: Invalid Password appears in the console menu’s Help
line, then you either omitted the Manager password for the stack containing the Member or
incorrectly entered the Manager password.
Note: You can move a Member from one stack to another by entering the MAC address for the
destination stack Commander in the Member’s Commander MAC Address field. Using this method moves
the Member to another stack without a need for knowing the Manager password in that stack, but
also blocks access to the Member from the original Commander.
■ When a Candidate becomes a Member, its Auto Join parameter is automatically set to No. This
prevents the switch from automatically rejoining a stack as soon as you remove it from the
stack.
■ When you use the Commander to remove a switch from a stack, the switch rejoins the
Candidate pool for your subnet (broadcast domain), with Auto Join set to No.
■ When you remove a Member from a stack, its switch number (SN) becomes available for
assignment to another switch that you may subsequently add to the stack. The default switch
number used for an add is the lowest unassigned number in the Member range (1 - 15; 0 is
reserved for the Commander).
69
1. From the Main Menu, select:
8. Stacking...
4. Stack Management
Figure 38. Example of Stack Management Screen with Stack Members Listed
2. Use the downarrow key to select the Member you want to remove from the stack.
Figure 39. Example of Selecting a Member for Removal from the Stack
3. Type [D] (for Delete) to remove the selected Member from the stack. You will then see the
following prompt:
Figure 40. The Prompt for Completing the Deletion of a Member from the Stack
4. To continue deleting the selected Member, press the Space bar once to select Yes for the prompt,
then press [Enter] to complete the deletion. The Stack Management screen updates to show the
new stack Member list.
70
Accessing Member Switches To Make Configuration Changes and Monitor Traffic
After a Candidate becomes a Member, you can access its console interface for the same configuration
and monitoring that you would do through a Telnet or direct-connect access.
1. From the Main Menu, select:
8. Stacking...
5. Stack Access
Use the downarrow key to select the stack Member you want to access, then press [X] (for eXecute)
to display the console interface for the selected Member. For example, if you selected switch number
1 (system name: Coral Sea) in figure 41 and then pressed [X], you would see the Main Menu for the
switch named Coral Sea.
Figure 42. The eXecute Command Displays the Console Main Menu for the Selected Stack Member
71
2. You can now make configuration changes and/or view status data in the selected Member in the
same way that you would if you were directly connected or telnetting into the switch.
3. When you are finished accessing the selected Member, do the following to return to the
Commander’s Stack Access screen:
a. Return to the Member’s Main Menu
b. Press [0] (for Logout), then [Y] (for Yes).
c. Press [Return].
You should now see the Commander’s Stack Access screen. (For an example, see figure 41 on 71.)
Stack Status (This Switch) • Commander’s stacking • Member’s stacking configuration Candidate’s stacking
configuration • Member Status configuration
• Data on stack Members: • Data identifying Member’s
– Switch Number Commander:
– MAC Address – Commander Status
– System Name – Commander IP Address
– Device Type – Commander MAC Address
– Status
Stack Status (All) Lists devices by stack name Same as for Commander. Same as for
or Candidate status (if device Commander.
is not a stack Member).
Includes:
• Stack Name
• MAC Address
• System Name
• Status
72
Status for All Switches with Stacking Enabled. This procedure displays the general status of all
switches in the subnet (broadcast domain) that have stacking enabled.
1. Go to the console Main Menu for any switch configured for stacking and select:
8. Stacking ...
You will then see a Stacking Status screen similar to the following:
Figure 43. Example of Stacking Status for All Detected Switches Configured for Stacking
Commander Status. To display the status for a Commander, go to the console Main Menu for the
switch and select:
8. Stacking ...
73
Figure 44. Example of the Commander’s Stacking Status Screen
74
Figure 45. Example of a Member’s Stacking Status Screen
75
SNMP Community Operation in a Stack
Community Membership. When a Candidate becomes a Member of a stack, it automatically
becomes a Member of any SNMP community to which the Commander belongs, even though any
community names configured in the Commander are not propagated to the Member’s SNMP Commu-
nities screen. However, if a Member has its own (optional) IP addressing, it can belong to SNMP
communities to which other switches in the stack, including the Commander, do not belong. For
example:
SNMP Management Station Access to Members Via the Commander. To use a management
station for SNMP Get or Set access through the Commander’s IP address to a Member, you must
append @sw<switch number> to the community name. For example, in figure 47, you would use the
following command in your management station to access switch 1’s MIB using the blue community:
snmpget <MIB variable> 12.31.29.100 blue@sw1
Note that because the gray community is only on switch 3, you could not use the Commander IP
address for gray community access from the management station. Instead, you would access switch
3 directly using the switch’s own IP address. For example:
snmpget <MIB variable> 12.31.29.15 gray
Note that in the above example (figure 47) you cannot use the public community through the
Commander to access any of the Member switches. For example, you can use the public community
to access the MIB in switches 1 and 3 by using their unique IP addresses. However, you must use the
red or blue community to access the MIB for switch 2.
snmpget <MIB variable> 12.31.29.100 blue@sw2
76
Stacking Operation with a Tagged VLAN
To use a tagged VLAN in a stacking environment, the following criteria applies:
■ For each switch in the stack, the tagged VLAN must be the default VLAN on links used for
stacking. In the console interface, the default VLAN is the first VLAN listed in the VLAN
Names and VLAN Port Assignment screens. The web browser interface attaches a "Default"
label to the VLAN ID for the default VLAN.
■ The VLAN ID (VID) for the (tagged) default VLAN must be the same for all switches in the
stack. (The default VLAN name can differ among switches in the stack.)
Status Messages
Stacking screens display these status messages:
Candidate Auto-join Indicates a switch configured with Stack State set to None required
Candidate, Auto Join set to Yes (the default), and no
Manager password.
Candidate Candidate cannot automatically join the stack because Manually add the candidate to the
one or both of the following conditions apply: stack.
• Candidate has Auto Join set to No.
• Candidate has a Manager password.
Commander Down Member has lost connectivity to its Commander. Check connectivity between the
Commander and the Member.
Commander Up The Member has stacking connectivity with the None required.
Commander.
Mismatch This may be a temporary condition while a Candidate is Initially, wait for an update. If condi-
trying to join a stack. If the Candidate does not join, then tion persists, reconfigure the
stack configuration is inconsistent. Commander or the Member.
Member Down A Member has become detached from the stack. A Check the connectivity between
possible cause is an interruption to the link between the the Commander and the Member.
Member and the Commander.
Member Up The Commander has stacking connectivity to the Member. None required.
Rejected The Candidate has failed to be added to the stack. The candidate may have a pass-
word. In this case, manually add
the candidate. Otherwise, the stack
may already be full. A stack can
hold up to 15 Members (plus the
Commander).
77
Changes to the Web Browser Interface for Commander Switches
On a Commander, the web browser interface includes the Stack Access pull-down menu and buttons
shown below. For information on how to use the web browser interface to configure and manage
stacking, see the online Help for the web browser interface.
These three buttons appear only in the web browser interface for a switch configured as a
Commander. For more information, see the online Help provided for the web browser interface.
Figure 48. Example of a Web Browser Interface for a Switch Configured as a Commander
78
Using the Auto-10 Port Configuration Option
Auto-10 is a new port mode that allows the port to negotiate between half-duplex (Hdx) and full-
duplex (Fdx) while keeping speed at 10 Mbps. HP recommends Auto-10 for links between 10/100
autosensing ports connected with Cat 3 cabling. (Cat 5 cabling is recommended for 100 Mbps links.)
In the web browser interface, configure Auto-10 in the Port Configuration window. (Click on the
Configuration tab, then the [Port Configuration] button.
VLAN Enhancement to the Web Browser Interface. You can now enable or disable VLAN
support, and add, remove, and rename VLANs in the web browser interface. Click on Configuration,
then VLAN Configuration. (To change the number of VLANs allowed, you must still use the console
interface.)
79
Enhanced Multimedia Traffic Filtering
With IP Multicast (IGMP) enabled, ports listen to ("snoop") both IGMP messages and IP multicast
streams. Thus, the switch learns the multicast traffic stream MAC addresses and begins filtering the
stream right away. As soon as a "join" is heard from a client, the switch begins forwarding the
requested IP multicast traffic out the port from which the join was heard. Multicast traffic destined
for "reserved" IP multicast addresses is flooded out all ports.
80
FAQs from the HP ProCurve Web Site
This section provides answers to frequently asked questions regarding HP ProCurve Switch 1600M,
2400M, 2424M, 4000M, and 8000M operation.
Auto-Negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Below
Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Gigabit Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 87
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Trunking (HP and Fast EtherChannel—) . . . . . . . . . . 89
Auto-Negotiation
Q: Does the factory configure the 10/100 auto-sensing modules with auto-sensing enabled?
A: Yes.
The hub, switch, or router will correctly sense (not auto-negotiate) the 10Mbps or 100Mbps speed.
Since the end node was configured for a specific speed and duplex state, and therefore does not
negotiate, the hub, switch, or router will choose the communication mode specified by the 802.3u
standard, namely half-duplex.
With one device running at half-duplex and the device on the other end of the connection at full-
duplex, the connection will work reasonably well at low levels of traffic. At high levels of traffic the
full-duplex device (end node, in this case) will experience an abnormally high level of CRC or
alignment errors. The end users usually describe this situation as, "Performance seems to be
approximately 1Mbps!." Often, end nodes will drop connections to their servers.
81
In this same situation, the half-duplex device will experience an abnormally high level of late
collisions.
The network administrator must take care to verify the configuration of each network device during
installation. Also, check the operational mode of each network device. That is, check both how you
configured it and also that it comes up as you expect, for example, at 10Mbps/half-duplex.
Cabling
Q: Can I use category 3 cables with the HP ProCurve Switch 100/1000Base-T Module?
A: No, only category 5 100-ohm UTP or STP cables are supported. In fact, for the most robust
connections you should use cabling that complies with the Category 5E specifications, as described
in Addendum 5 to the TIA-568-A standard (ANSI/TIA/EIA-568-A-5).
Q: What is the maximum length for cables used with the HP ProCurve Switch 100/1000Base-
T Module?
A: The maximum length is 100 meters using category 5, 100-ohm UTP or STP cable. This distance is
correct for the IEEE 802.3ab specification.
Features
Q: What are the differences between the HP ProCurve Switch 2424M (product number
J4093A) and the HP ProCurve Switch 2400M (product number J4122A)?
A: The HP ProCurve Switch 2424M has 24 10/100Base-TX autosensing ports like the HP ProCurve
Switch 2400M, but the HP ProCurve Switch 2424M also has a module slot that can be used for stacking,
gigabit connectivity or port expansion.
Q: What would a topology look like that has a maximum meshed switch hop count of 5?
A: Up to 12 switches are supported in a switch mesh domain ( See the Management and Configuration
Guide), and a maximum meshed switch hop count of five is allowed in the path connecting two nodes
via a switch mesh domain topology.
"Hops" refers to inter-switch links, not the number of switches crossed. The limit is 5 meshed links.
The rest of this discussion will use the word links instead of hops. In the diagram below, the numbers
and arrows above the switches show the link count value in the mesh protocol packets. There are
six switches between End Node A and End Node B, but only five links:
82
link count: 0 1 2 3 4
The switches learn the mesh topology by sending mesh protocol packets to each other. Each switch
initiates this learning process by sending a mesh protocol packet with a link count of zero. When its
neighbor switch receives this packet, the neighbor increments the link count (for example, from zero
to one), then propagates the packet to the next switch. Switches do not send mesh protocol packets
with a link count of 5 or larger.
In the diagram above, you can see that Switch 1 sends a mesh protocol packet containing a link count
of zero. Switch 2 receives it and sends a mesh protocol packet with a link count of one. Switch 3
receives it and sends a mesh protocol packet with a link count of two. And so on.
Note that if we were to violate the mesh link count limit by adding a 7th switch between Switch 6
and End Node B, then Switch 7 would not receive any mesh protocol packets from Switch 1. Since
Switch 7 would be unaware of the Switch 1, end nodes on Switch 1 would not be able to communicate
with end nodes on Switch 7.
83
Not Sent 4 3 2 1 0
In this topology, we appear to have redundant connections. Switch 1 is connected to Switch 7 through
the upper link, and again through the "lower" link. You can see that Switch 7 learns that it is directly
connected to Switch 1 through the "lower" link.
Switch 1 and Switch 7 do not know that they have a connection through the upper link, since mesh
protocol packets will not travel across that many links. All traffic between End Node A and End Node
B will travel along the lower link. In other words, we do not have a usable redundant link, since the
topology is illegal.
In the diagram above, if the lower link becomes broken, we get the situation shown below:
Not Sent 4 3 2 1 0
In the above topology, Switch 7 knows that it no longer receives mesh protocol packets from Switch
1 (through the lower link), but it does not know that it has an alternate path through the upper link.
Connectivity between End Node A and End Node B is lost, and the mesh protocol cannot recover it.
Conclusion: For the switch mesh to work properly you must satisfy both limits:
84
Gigabit Stacking
Q: Does the HP ProCurve Switch 2424M support stacking?
A: The HP ProCurve Switch 2424M has a slot for the two port HP ProCurve Switch 2424M Gigabit
Stacking Module (product number J4130A). This module stacks up to 7 switches with the HP
ProCurve Switch 2424M Gigabit Stacking Kit (product number J4116A). One stacking module must
be purchased for each switch and one stacking kit must be purchased for every stack of two switches.
The stacking module can also be used as a dual gigabit uplink module with the HP ProCurve Gigabit-
SX Transceiver (product number J4131A) and/or the HP ProCurve Gigabit-LX Transceiver (product
number J4132A). In addition, the following modules, which are supported in the HP ProCurve Switch
8000M, 4000M, 2400M, and 1600M, are also supported in the HP ProCurve Switch 2424M for uplink
connectivity or for additional desktop ports:
Q: Can the HP ProCurve Switch 2424M Gigabit Stacking Module (product number J4130A)
be used in the HP ProCurve Switch 8000M, 4000M, 2400M or 1600M?
A: No, this stacking module was designed specifically for the HP ProCurve Switch 2424M. It will not
slide into a slot on any other switch. But the optional modules supported on the HP ProCurve Switch
8000M, 4000M, 2400M, and 1600M are supported on the HP ProCurve Switch 2424M.
Q: Does the HP ProCurve Switch 2424M Gigabit Stacking Module support trunking?
A: Yes, the HP ProCurve Switch 2424M Gigabit Stacking Module supports trunking. Port trunk links
can be configured only between like media types:
■ HP ProCurve Switch 2424M Gigabit Stacking Kit transceiver with HP ProCurve Switch 2424M
Gigabit Stacking Kit transceiver
Modules
See also “Gigabit Stacking” on page 85 and “Cabling” on page 82.
85
Q: What is the supported distance of the Gigabit-SX module?
A:
The distances noted above are correct for the IEEE Draft P802.3z/D4.2 (Gigabit Draft 4.2) specifica-
tion.
The better the quality of the cable, the greater the modal bandwidth and the greater the distance
supported.
86
Q: What configuration options are available on the HP ProCurve Switch 100/1000Base-T
Module?
A: Three options are available:
■ Auto - The module auto negotiates connection speed (100 or 1000Mbps), communication
mode (full or half duplex), and MDI or MDI-X port operation.
■ 100 Full - The module is forced to 100Mbps speed and the communication mode is set to full
duplex.
■ 100 Half - The module is forced to 100Mbps speed and the communication mode is set to half
duplex.
Note
If you configure the port to one of the fixed 100Mbps modes, the port will then operate only as an MDI-X port.
Q: What should I do if my switch (which has switched ports to the desktop) reports many
Spanning Tree Protocol (STP) topology changes, even if I am not having connectivity
problems?
A: You can view how many topology changes are occurring by looking at the Topology Change Count
in the Status and Counters—Spanning Tree Information screen on your HP ProCurve Switch 8000M,
4000M, 2424M, 2400M, or 1600M.
STP was developed to manage switch-to-switch links, or bridge-to-bridge links as they were initially
called. For most of STP's lifetime, a topology change was a serious event as it indicated a change in
the LAN topology. It also indicated a likelihood that STP had to bring (at least) a portion of the LAN
down for awhile in order to rebuild a new working topology. Of course, in a LAN we expect the
topology to change only rarely.
Over the past few years, the cost of switch ports has dropped dramatically. Users can now afford to
dedicate switch ports to end nodes.
Once an STP topology is stable, establishing an Ethernet link on a switch port results in a topology
change. This happens every time a user powers up their PC (assuming that the PC is directly
connected to a switch port), resets the PC, or brings up the PC's network stack. The establishment
of this link causes the topology change count to increment in:
1. the switch to which the end node is directly attached; and
2. "upstream" switches. That is, the root switch and the switches between the root switch and the
switch to which the end node is directly connected.
87
This scenario does not result in any topology issues or changes. It does not result in any loss of
connectivity in the LAN. If the incrementing of your topology change count is due to this type of
scenario, you do not need to take any action.
The above discussion applies to Hewlett-Packard switches in general and HP ProCurve switches in
particular when configured in STP Normal mode. When an HP ProCurve switch's port is configured
in STP Fast mode, the switch will not increment the topology change count as a result of link changes
on that port. Please see the switch's Management and Configuration Guide for details on normal and
fast modes.
Q: When I power on my PC, I get the message "a file server could not be found." How do I
fix that?
A: This is a well-known issue given the following situation:
1. The PC is directly-connected to a switch.
2. The PC is running Novell's VLMs or Client32.
3. The switch has Spanning Tree Protocol (STP) enabled.
In this situation, when the directly-connected PC is powered on, the switch senses linkbeat on that
port. This causes the switch to go through the four Spanning Tree states: blocking, listening, learning,
and forwarding. It takes 30 seconds for the switch to complete that sequence and begin forwarding
packets to and from that port. During those 30 seconds, Novell sends 3 requests for a server, then
stops looking. By the time Spanning Tree completes its job, Novell reports that "a file server could
not be found."
In the Fall of 1998, HP released switch firmware (version C.05.07 or greater) with an enhancement
to resolve this timing problem between Novell and STP. The enhancement allows users to configure
Spanning Tree so that it does not go through the 4 states, on a port-by-port basis. Instead, for those
configured ports, Spanning Tree will immediately begin forwarding packets to and from the port.
This allows Novell clients to communicate with the server as soon as the network card (NIC) is
enabled. After that, the switch continues to listen for and send Spanning Tree packets on those
88
configured ports. This protects the user who might inadvertently connect a hub or switch to that port
and create a network loop—Spanning Tree will detect the loop after a short time, since the port listens
for and sends STP packets on that port.
Troubleshooting
Q: Why won't my iMac, which is directly attached to an HP ProCurve switch, NetBoot from
an OS X Server, even though it worked correctly when my iMac was plugged directly into
a hub?
A: This issue is not specific to HP switches. Rather, it is a timing problem in early versions of the
iMac Boot ROM. Apple Computer, Inc has fixed this NetBoot issue by releasing both an updated Boot
ROM image and Mac OS X Server version 1.2. Please advise customers with iMac NetBoot issues to
contact Apple Computer, Inc Technical Support.
If the switch (or routing switch or router) has Spanning Tree Protocol enabled, see Apple Computer,
Inc's Tech Info Library entry "Spanning Tree Protocol: AppleTalk Issues" at http://til.info.apple.com/
techinfo.nsf/artnum/n30922
Q: Can the HP ProCurve Switch 8000M, 4000M, 2424M, 2400M, or 1600M connect to the
HP AdvanceStack Switch 2000 or 800T with HP Port Trunking?
A: Yes. The HP Port Trunking implemented in the HP ProCurve Switch 8000M, 4000M, 2424M, 2400M,
and 1600M has been enhanced from the version implemented in the HP AdvanceStack Switch 2000
and 800T. But you can still connect any of these switches together using HP Port Trunking.
VLANs
Q: How many VLANs can be configured on the HP ProCurve Switch 8000M, 4000M, 2424M,
2400M, and 1600M?
A: These switches support up to 30 VLANs when using software version C.06.06 or later.
89
Q: What is the recommended way to connect multiple VLANs between a routing switch and
a layer 2 switch?
A: The diagram below illustrates the question.
VLAN1 VLAN2
130.64.100.54 130.64.101.102
130.64.100.103 130.64.101.103
VLAN1 VLAN2
130.64.100.103 130.64.101.103
The following HP switches provide VLANs and have a single MAC/Ethernet address (filtering) table:
Switch 800T, 2000, 1600M, 2400M, 2424M, 4000M, 8000M. In the diagram above we show a Switch
8000M, but the following discussion applies to all of the switches listed in the previous sentence. The
HP ProCurve Routing Switch 9304M, 9308M, or 6308M-SX, as a default gateway, has a single MAC
address (for all of its VLANs) if using virtual Ethernet interfaces. In the diagram above we show a
9304M, but this could be a 9308M or 6308M-SX as well.
Let's consider PC "A" attempting to send an IP packet to PC "B". PC "A" will send the 8000M a packet
with the 9304M's MAC address in the destination field. If the 8000M has not yet learned this MAC
address, the 8000M will flood the packet out all of its VLAN1 ports, including the VLAN1 link to the
9304M. The 9304M will then route the packet toward PC "B" via its link with the 8000M's VLAN2
connection. The 8000M will enter the 9304M's MAC address into its MAC address table as located in
VLAN2. The 8000M will also forward the packet to PC "B".
Let's consider a second packet that PC "A" sends to PC "B". PC "A" sends the packet, again addressed
to the 9304M's MAC address, to the 8000M. The 8000M will check its address table and find that the
9304M appears to be located on VLAN2. Since the 8000M believes that this MAC address is not located
on VLAN1, the switch will discard the packet.
Later, when the 9304M transmits a packet to the 8000M via the VLAN1 link, the 8000M will update its
address table to indicate that the 9304M's MAC address is located in VLAN1 instead of VLAN2. As
you can see, the 8000M's location information for the 9304M's MAC address will vary over time
between VLAN1 and VLAN2. For this reason, some packets directed through the 8000M for the
9304M's MAC address will be discarded. Performance may appear to be poor or connectivity may
appear to be broken.
90
To avoid this issue, simply use one cable between the 8000M and the 9304M instead of two, making
sure that the two VLANs use tags on that link, as shown below.
VLAN1 VLAN2
130.64.100.54 130.64.101.102
130.64.100.103 130.64.101.103
VLAN1 VLAN2
130.64.100.103 130.64.101.103
91
Release History
Unless otherwise noted, each new release includes the features added in all previous releases.
Release C.09.30
Problems Resolved in Release C.09.30
■ MIB (PR_1000748742) — Performing a walkmib after adding IP addresses to multiple
VLANs yields inconsistent results; output appears to be incorrectly labeled. The instrumen-
tation of ipAdEntIfIndex now properly reflects the VLAN assignments of the IP addresses.
This is a follow-up fix to PR_1000422526.
Release C.09.29
Problems Resolved in Release C.09.29
■ MIB (PR_1000422526) — Performing "walkmib" after adding IP addresses to multiple
VLANS yields inconsistent results. Workaround: Rebooting corrects the inconsistent
walkmib results.
Release C.09.28
Problems Resolved in Release C.09.28
■ Web (PR_1000321457) — When the client is running Sun Java 1.5.0 or later, the IP Stack
Management in the Web User Interface may become unresponsive.
Release C.09.27
Problems Resolved in Release C.09.27 (never released)
■ Web UI (PR_1000302797) — When the client is running Sun Java 1.5.0 or later, the Web
User Interface may become unresponsive.
92
Release C.09.26
Problems Resolved in Release C.09.26
■ STP (PR_1000307280) — Inconsistent or incorrect STP data.
■ Telnet (PR_1000311257) — NMAP SYN scan will temporarily prevent Telnet access
Release C.09.22
Problems Resolved in Release C.09.22
■ Linktest (PR_1000001639) — The switch will respond to “linktest” packets that have a
broadcast or multicast MAC destination address.
■ Meshing (PR_92500) — CDP packets will not forward properly through a mesh when CDP
is disabled, resulting in a CDP packet loop.
■ Meshing (PR_93999) — A meshed switch may experience a loop during very high traffic
levels and large amounts of port toggling (Link Up, Down, Up,…).
■ Security (PR_87930/Switch 4520) — The switch will allow a user set up as ‘Operator’ the
same privileges as ‘Manager’.
■ Task Manager (PR_1000002122) — The switch may suspend an arbitrary task (e.g.
TELNET, STP, etc.) in the event a memory corruption occurs.
■ VLAN (PR_1000004334) — If VLANs are not enabled, then at the time the user enables
VLAN monitoring only ports with Link will pass traffic. Ports that later get Link will not pass
traffic. Statistics will report (good) transmits and receives even for ports that are not passing
traffic.
■ Web Interface (PR_88745) — A user may not be able to add a new VLAN after a VLAN is
deleted.
■ Web Interface (PR_92078) — Page may not fully load after making changes under the
Device Features tab.
■ Web Interface (PR_98500) — With Sun Java 1.3.1, the browser window may spontaneously
close.
■ Web Interface (PR_98919) — With Java 1.4.2.1, "clear changes" button doesn't clear STP.
■ Web Interface (PR_1000000449) — With Sun java 1.3.1/1.4.1, nothing will display when
the users clicks on the VLAN Configuration button.
■ Web Interface (PR_1000000452) — Resetting the switch leads to the URL aol.co.uk.
93
Release C.09.19
Problems Resolved in Release C.09.19
■ Bus Error (PR_83099) — Bus error: HW Addr=0x29283030 IP=0x002086ac
Task='mSnmpCtrl' Task ID=0x165ae00.
■ CDP/DISL (PR_92800) — The switch does not forward CDP or DISL packets when CDP
is disabled.
■ Counters (PR_87569) — The ifHC ('High Capacity') MIB objects, for example ifHCInOc-
tets, will return a maximum of 32 bits, rather than the correct 64 bits.
■ Crash (PR_87763) — SNMP related memory leak where if the switch loses enough memory,
it will crash with a message similar to:
SubSystem 0 went down: 04/17/02 08:07:45 Software exception at
malloc.c:270 -- in 'mAdMgrCtrl', task ID = 0xa04ac0 -> Out of memory
or
SubSystem 0 went down: 04/04/02 14:23:42 Bus error: HW Addr=0x700a041c
IP=0x00122ca0 PCW:0x00000003 ACW:0x00001001 Task='eDrvPoll' Task
ID=0xaf17f0 pfp: 0x00af1cf0 sp:0x00af1d70 rip:0x00122ca0
■ IGMP (PR_87564) — Switch improperly checka whether the value in the IP DA and/or
Group Address is actually a legal IP Mcast before taking IGMP action on it.
■ IGMP (PR_87564) — Updated the mechanism for what IP address we use when we send
out Group-Specific Queries.
■ IGMP (PR_87564) — When an IGMPv3 Join has one of the Reserved IP Mcast addresses
in it the packet is double-forwarded, eventually causing the switch to run out of packet
buffers.
■ IGMP (PR_87768) — Enhancement to the IGMP Receive-Query code causing the switch
to identify and ignore any Proxy Queries. Regular Queries will be treated the same as always.
■ Meshing (PR_90509) — Under certain conditions, loops can occur in a mesh topology.
■ Meshing (PR_91807) — If a meshed link goes down, the meshed switches may not learn
any new DAs until the switches are reset.
94
■ Meshing / Performance (PR_87904) — When a mesh link is over-subscribed, meshing is
migrating traffic too slowly from that link to an alternate link that is not over-subscribed.
■ SNMP (PR_88645) — Added support for sending traps with non-PUBLIC community
names.
■ SNTP (PR_87773) — The SNTP Server remains at version 3 regardless of the configuration
setting.
■ SNTP / Performance (PR_89815) — Setting the SNTP broadcast mode from time sync to
Unicast or TIMEP will result in CPU usage spiking to 99% and free packet buffers eventually
depleting down to zero.
■ TimeP (PR_87602) — The TimeP configuration is disabled after upgrading from C.08.XX
to C.09.XX.
■ VTP (PR_87565) — Changes made to not re-forward VTP packets if they arrive on a blocked
port.
■ Web/Config (PR_87770) — Web interface allows a user to create a VLAN with an ID of zero.
Release C.09.18
Problems Resolved in Release C.09.18
■ 100/1000Base-T module (PR_92257) — The HP J4115B 100/1000Base-T module may have
connectivity problems with certain Intel Pro/1000 and other Broadcom 5703 or 5704 based
NICs. These problems are often exhibited when the affected NIC workstation is either power
cycled or the NIC driver is disabled then re-enabled. During the failure, the link LED may
be lit, although no frames will be received by either side.
95
Release C.09.16
Problems Resolved in Release C.09.16
■ Address Learning/Forwarding Problems (Switch_4545) — When monitoring is enabled
on a switch and subsequently disabled, switch ports that were inactive while monitoring was
enabled will not learn new MAC addresses after monitoring is disabled. Also, forwarding
does not occur on these ports.
■ Agent Hang (Switch_4523) — The Agent hangs if 28 or more ASCII characters, (same or
different ASCII characters), are entered into the password field at login access to the switch.
■ CDP (Switch_4546) — When Cisco Discovery Protocol (CDP) is disabled, the switch does
not forward CDP packets.
■ Meshing (Switch_4568) — Certain mesh configurations may cause switch mesh ports to
not properly establish link with their mesh neighbors. This will prevent the switch from
establishing itself into the mesh. The switch's event log will also improperly indicate that
ldbal (mesh) ports are established.
■ Performance (Switch_4512) — Slow performance and possible packet loss when switch
is connected to Intel 10/100 NICs.
■ SNTP/TimeP (Switch_4559) — Polling interval units not updated when changing config-
uration from SNTP (seconds) to TimeP (minutes) via the menu.
■ TFTP (Switch_4534) — A TFTP PUT of a browse file larger than approximately 80K may
starve other processes in the switch while the TFTP transfer is being processed. Symptoms
include Telnet timeouts, Ping timeouts, and toggling of mesh ports during the TFTP transfer.
■ VTP (Switch_4518) — Cisco's VTP (VLAN Trunk packets) are not forwarded.
96
Release C. 09.14 (BETA)
Problems Resolved in Release C.09.14
■ Agent Hang (Switch_4524) — Agent processes (such as console, telnet, STP, ping, etc.)
may stop functioning. This agent hang has been associated with the CERT SNMPv1
"encoding" test #1150.
(Various) Packet Buffer Leak: If the MAC Address Table is full, the switch may exhibit any of the
following problems:
1. MAC addresses don't age out.
2. New MAC addresses are not learned.
3. Switch runs out of Packet Buffers.
4. Switch stops forwarding traffic.
Release C.09.13
Problems Resolved in Release C.09.13
■ Agent Hang (Switch_4515) — Agent processes (such as console, telnet, STP, ping, etc.)
may stop functioning when the IGMP querier function is disabled, and then re-enabled, on a
VLAN that does not have an IP address configured.
■ Buffer Leak (Switch_4517) — If IGMP is enabled, the switch may run out of packet buffers
under certain conditions.
■ IGMP (Switch_4516) — Interoperability issues with some Cisco devices (such as some
Cisco Catalyst 5000 & 6000 series switches) cause IGMP groups to be aged out of the switch's
IGMP tables prematurely.
■ Stack overrun (Switch_4498) — Code Red worm causes the switch to overrun its stack.
[There is no external switch symptom to the Code Red worm.]
■ XPUT/PUT (SWITCH_4482) — The CLI help text shows the wrong options for the XPUT
and PUT commands.
97
Release C.09.10
Problems Resolved in Release C.09.10
■ Crash/Bus Error (SWITCH_4514) — An SNMP Get request of a specific long OID can
result in a bus error, an agent hang, or a switch crash with a message similar to:
-> Software_exception at svc_misc.s:379 -- in mCdpCtrl
malloc_else_fatal() ran out of memory
This crash has been associated with the CERT SNMPv1 "Req-app" test suite.
Release C.09.09
Problems Resolved in Release C.09.09
■ Crash (SWITCH_4479) — With meshing enabled, the switch may crash with a message
similar to:
Software exception at memrpt.c:440 -- in 'mSnmpCtrl', task ID = 0x835f40
Note: The ProCurve switch’s CDP packets are legal both before and after this modification.
■ Crash (SWITCH_4492) — With meshing enabled, the switch may crash when a packet
buffer is freed more then once, with a message similar to:
Software exception at alloc_free.c - in 'eDrvPoll' buf_free: corrupted
buffer
■ Meshing (SWITCH_4493) — MAC addresses that should be aged out are sometimes still
in the address table when meshing is enabled. This does not result in connectivity problems.
98
Release C.09.07 (BETA)
■ Minor modifications to internal switch functions.
■ IGMP (SWITCH_2997) — The Switch stops sending IGMP Queries on some Vlans when
Querier.
■ Buffer Leak (SWITCH_4471) — A message buffer leak occurs when the switch receives
a TACACS+ 'DISC' character.
■ CDP (SWITCH_4468) — The switch sends the wrong MAC address for itself in CDP
packets.
■ Memory Leak and Crash (SWITCH_4472) — If the "Send Authentication Traps" trap
receiver parameter on a Member switch is set to "Yes", it will cause a memory leak on the
Stack Commander switch. The memory leak can eventually cause a crash. The specific
details of the crash vary.
■ SNTP (SWITCH_4466) — In the "Internet (IP) Service configuration screen", the value for
the "SNTP Unicast Server Address" parameter is displayed incorrectly after a reboot.
■ SNTP (SWITCH_4467) — The SNTP server IP address is listed as 0.0.0.0 in the "browse"
output after a reboot. The value in the "config" output is correct.
99
■ Stack Management (SWITCH_4476) — The Commander switch hangs when the switch
is queried by the WhatsUp Gold utility.
■ Telnet (SWITCH_4458) — The command "xget config" from a telnet session seems to
"lock" the configuration file until reboot.
■ Menu (SWITCH_4464) — In the System Information configuration screen, the user cannot
get the cursor to go to the "MAC Age Interval" field using the up or down arrow keys.
■ TACACS+ (SWITCH_2169) — In the Help screen for "TACACS+ Operation", the "Possible
Values" for the Encryption Key is stated as "Up to ?? alphanumeric characters". The value
"??" was replaced with 58, the actual number of characters allowed.
Release C.09.02
Problems Resolved in Release C.09.02
■ Adds the following new features (documented in the "Software Update C.09.xx Release
Notes", available on the WWW):
100
• TACACS+
• CDP (Cisco Discovery Protocol)
• SNTP
• Improved IGMP Capabilities
■ Another new feature is CIDR Support. This feature allows the switch to be assigned an
address in the "all zeros subnet" and in the "all ones subnet". Also supported is the ability to
set the subnet mask to a supernet value (CIDR). This is a subnet mask that is shorter than
the class default mask.
N O T E : T h e c o n f i g f i l e s a v e d u n d e r v e r s i o n C . 0 9 . X X i s N O T b a c k w a r d - c o m pa t i bl e
w i t h p r e v i o u s s o f t w a r e v e r s i on s . T h e us e r i s a d v i s e d t o s a v e a c op y o f t h e p r e -
0 9 . 0 2 c o n f i g f i l e B E F O R E U P G R A D I N G t o C .0 9 . 0 2 o r g r e a t e r, i n c a s e t h e r e i s ev e r
a n ee d t o r e v e r t b ac k t o p r e - 0 9 . 0 2 s o f t w ar e . I n s t r u c t i o n s f or s a v i n g a c op y o f t h e
c o nf i g f i l e a r e f o u n d i n t he " F i l e Tra n s f e r s " c h a p t e r i n t h e M a n ag e m e nt a nd
C o n f i g u r a t i o n G u i d e t h a t s hi p p e d w i t h t h e s w i t c h .
■ STP (VARIOUS) — Resolves several issues with STP, including: setting STP parameters via
SNMP disables Spanning Tree, ability to configure the (reserved) spanning tree multicast
address as a multicast filter address, bus error, and a switch crash with a message similar to:
-> Software exception at stp_ctrl.c:154 -- in 'mStpCtrl'
101
Release C.08.23 (BETA)
Problems Resolved in Release C.08.23
■ Auto-10 (SWITCH_4429) — When a switch port configured for "auto-10" is connected to
a NIC configured for 100 half duplex or 100 full duplex, the switch port comes up at 100half
instead of 10half. [Fix is: switch port comes up at 10 Mbps. Result: switch detects a speed
mismatch, disables the port, and generates an event log message similar to: fault: port 7 -
Disabled due to speed mismatch. See help.]
■ Hotswap Crash (SWITCH_4434) — When a module is removed from a switch slot, and a
module with different port count is inserted into that slot, the switch may crash with an NMI
message similar to:
NMI occurred: IP=0x00063c6c PCW:0x001c0003 ACW:0x00001002
Task='mSnmpCtrl' Task ID=0x85bd40
■ TFTP (SWITCH_4432) — Some error messages are not displayed in the event log.
Release C.08.22
Problems Resolved in Release C.08.22
■ Auto-TFTP (SWITCH_4423) — Change made to streamline the Auto-TFTP operation.
102
Release C.08.04 (BETA)
Problems Resolved in Release C.08.04
■ DHCP/Bootp (SWITCH_4415) — When a switch is configured to use DHCP/Bootp to
obtain an IP address, and the DHCP/Bootp server defines a config file for the switch to get
via TFTP - if the config file has that same setting (use DHCP/Bootp to obtain an IP address)
the switch will go into a loop, continually rebooting and getting the config file via TFTP.
Release C.08.03
Problems Resolved in Release C.08.03
■ Web-browser interface (SWITCH_4392) — When using ProCurve Stack Management to
communicate with a Stack Member, the web-browser interface appears to "hang" if connec-
tivity is lost between Commander and Member.
■ Stack Management (SWITCH_4390) — Using SNMP to set the Stack Name on a Stack
Member fails.
103
N O T E : T h e c o n f i g f i l e s a v e d u n d er v e r s i o n C . 0 8 . 0 1 i s N O T b ac k w a r d - c o m p a t i b l e
with previous software versions. The user is advised to save a copy of the pre-
08.01 conf i g f i l e B EFO RE U PG RA DI NG t o C . 0 8 . 0 1 o r g r e a t e r, i n c a s e t h er e i s e v e r
a n e e d t o r e v e r t b a c k t o p r e - 0 8 . 0 1 s o f t w a r e . I n s t r u c t i on s f o r s a v i n g a c o p y o f
t h e co n f i g f i l e a r e f o un d i n t h e " F i l e Tra n s f e r s " c h ap t er i n t he M a n a ge m e n t a nd
C o n f i g u r a t i o n G ui d e t h a t s h i p p e d w i t h t h e s w i t c h .
Release C.07.27
Problems Resolved in Release C.07.27
■ Adds support for the J4115B ProCurve 100/1000Base-T (Gigabit-T) Module, model B.
■ ABC (SWITCH_4288) — A "gratuitous ARP" is not forwarded when ABC is enabled for IP.
This affects features such as MC ServiceGuard and Routing Switch redundant management
module failover, because the new MAC-to-IP mapping must be forwarded to all endnodes
that need to learn of the change.
■ Crash/SNMP (SWITCH_4224) — A "walkmib" performed on the FEC trunk table can crash
the switch. Also, the FEC trunk index may be wrong for a given FEC trunk number.
104
Release C.07.26
Problems Resolved in C.07.26
■ Switch "lockup" (SWITCH_3783) — When a switch port configured for 10Mbps half-
duplex operation is connected to a device configured for 100Mbps (half or full) operation,
the switch port incorrectly shows link enabled and constant activity. After a short time
interval in this condition (usually between 10 to 30 minutes) the switch stops forwarding
traffic on all other (correctly-configured) ports. [Fix is to disable the port and generate an
event log message similar to: fault: port 7 - Disabled due to speed mismatch. See help.]
Release C.07.25
Problems Resolved in Release C.07.25
■ Crash (SWITCH_4082) — The switch may reboot when a user adds a new VLAN name via
a telnet session.
Release C.07.24
Problems Resolved in Release C.07.24
■ Adds new features: Support for 400 RMON Alarm Table traps, and support for 100 total traffic/
security filters.
■ Event Log & Meshing (SWITCH_3902) — After a mesh port recovers from a topology
error (e.g. a hub connected between two switches configured for meshing), there is no event
log entry to indicate that the mesh link is re-enabled.
■ Meshing & Addresses (SWITCH_3870) — The mesh will not learn a new MAC address
if the incoming packet's source MAC address is equal to the destination MAC address. (Some
UNIX systems send out such a packet upon bootup.)
■ Meshing & Broadcasts (SWITCH_3873) — The first broadcast packet from any device
is not correctly forwarded through a mesh. This can result in DHCP failures when the server
is across a mesh from an endnode, for example.
105
■ Token Ring Cabling (SWITCH_3872) — Spanning Tree Protocol (STP) does not correctly
identify a "loopback" situation on an individual port. For example, if a twisted-pair port uses
token ring cabling, and that cable is not connected to a live device, the token ring connector
creates a short-circuit from transmit to receive. [Fix is that STP will identify this as a loop,
and block the port.]
Release C.07.23
Problems Resolved in Release C.07.23
■ SNMP (SWITCH_3575) — The MIB2 IP route table can become corrupted, causing
problems when multiple VLANs are configured. (Related to SWITCH_3473.)
Release C.07.22
Problems Resolved in Release C.07.22
■ VLANs (SWITCH_3473) — The configuration of 30 VLANs that use DHCP can cause the
switch to become unable to forward traffic to the VLANs.
106
■ ABC (SWITCH_3453) — Proxy ARP feature of Automatic Broadcast Control no longer
functions (due to previous SWITCH_3410 fix).
■ XMODEM (SWITCH_3442) — The Switch 2424M's console inactivity timer (with default
value = 10 minutes) causes XMODEM download of switch software to fail. [NOTE: This bug
fix description was erroneously omitted from the "readc723.txt" and earlier bug fix lists.]
Release C.07.02
Problems Resolved in Release C.07.02
■ ABC (SWITCH_3410) — With Automatic Broadcast Control enabled for IP, unanswered
ARPs generate extra broadcast traffic.
■ Command prompt (SWITCH_3413) — Switch crashes if too many characters are entered
at the command prompt.
■ IP (SWITCH_3424) — Switch does not properly handle an IP "all subnets" broadcast, and
may send ICMP "unreachable" messages.
■ Web-browser interface (SWITCH_3404) — Port configuration and port status are not
updated, when the configuration changes are made via the web-browser interface.
Release C.07.01
Problems Resolved in Release C.07.01
■ Adds the following new features (documented in the "Software Update C.07.XX Release
Notes", available on the WWW):
• Port Security
• Authorized IP Managers
• Class of Service (CoS)
107
• New Command-Line Interface (CLI) commands (see "Read Me First", on the WWW)
■ 10/100Base-T Module (SWITCH_3398) — Newer versions of the J4111A ProCurve
Switch 10/100Base-T Modules use a pair of 2MB memory chips, which are incorrectly
interpreted as a pair of 1MB chips. The result is slow performance through that module.
■ Browse (SWITCH_2816) — Cannot TFTP (using "put" command) the browse from the
switch.
■ Command prompt (SWITCH_3310) — Typing "help exit" causes the switch to exit back
to the Diagnostics Menu.
■ Config (SWITCH_3354) — When a switch module is removed and the switch is not
rebooted, port configuration changes cannot be saved.
■ Crash (SWITCH_3335) — Switch crashes with this message: system: Fault:03 subType:02
IP:0x00189358 PCW:0x00000003The following combination of events can cause this crash:
1. Switch module is replaced with a different module and switch is not rebooted
2. Switch is accessed via the web-browser interface
■ IGMP (SWITCH_3218) — Switch does not identify PIM routers that comply with the new
PIM specification which no longer uses IGMP packets.
■ Meshing (SWITCH_3149) — After configuring a mesh port, the IGMP Service and VLAN
Port Assignment configuration screens do not list the newly-configured mesh port until
switch is rebooted.
■ SNMP (SWITCH_1415) — After configuring a trap receiver a warm start trap is sent out,
even though the switch has not rebooted.
■ VLAN (SWITCH_3023) — Outbound tagged packets are always sent with priority = 0.
■ Walkmib (SWITCH_2935) — If more than one filter is configured, walkmib does not
always display all the filter parameters.
108
Release C.06.07 (BETA)
Problems Resolved in Release C.06.07
■ Gigabit Stacking Module (SWITCH_3309) — If the transceiver type is changed in the
module, the transceiver may not re-establish link after the module is hotswapped (for the
J4093A ProCurve Switch 2424M only).
■ IGMP (SWITCH_3361) — IGMP "join" reports are not forwarded to routers if IGMP is
disabled and then re-enabled.
Release C.06.06
■ Modification of Lab troubleshooting commands.
(These commands are not available to the switch operator.)
■ Telnet (SWITCH_3278) — When viewing the switch's event log from a telnet session, the
session may halt ("lock up").
■ Crash (SWITCH_3267) — The switch may crash with an NMI error when a J4130A Switch
2424M Gigabit Stacking Module is inserted into a J4093A ProCurve Switch 2424M that is
powered on.
109
Release C.06.03
■ Adds support for the J4116A Switch 2424M Gigabit Stacking Kit (for the J4093A ProCurve
Switch 2424M only).
■ LEDs (SWITCH_3252) — Power supply LEDs are reversed. The LED for power supply #2
lights when power supply #1 is installed, and vice versa.
■ Timep (SWITCH_3242) — If a negative number is configured in the "Time Zone" field (to
denote minutes East of GMT), two things happen:
1. the negative number is ignored, giving a switch time equal to GMT, and
2. the switch does not poll the Timep server after the initial time setting.
■ Timep and VLANs (SWITCH_3038) — The switch can only reach a timep server that is
on the first VLAN in the "VLAN Names" list. This is true even if that VLAN has been renamed
from "DEFAULT_VLAN", or has a VLAN ID other than 1.
110
Release C.06.01
Problems Resolved in Release C.06.01
■ First release for the J4093A ProCurve Switch 2424M.
■ Also, adds new feature: Support for 30 VLANs on a switch. NOTE: The config file saved
under version C.06.01 is NOT backward-compatible with previous software versions. The
user is advised to save a copy of the pre-06.01 config file BEFORE UPGRADING to C.06.01
or greater, in case there is ever a need to revert back to pre-06.01 software. Instructions for
saving a copy of the config file are found in the "File Transfers" chapter in the Management
and Configuration Guide that shipped with the switch.
■ BOOTP (SWITCH_3179) — The switch will go into a continual reboot loop, when ALL the
following conditions are true:
1. Switch is configured to use BOOTP, and
2. BOOTP server is set up to download a config file to the switch, and
3. The config file on the BOOTP server is configured to use BOOTP, and
4. The software version running on the switch is different than the software version that created
the config file on the BOOTP server.
■ Crash (SWITCH_3214) — Switch may crash with a "bus error" when hot-swapping a
Gigabit-SX card.
■ Filters (SWITCH_3225) — Under heavy traffic loads, dynamically modifying filters can
cause those filters to malfunction.
■ Selftest (SWITCH_3208) — With a 10/100 EISA NIC in an HP-UX D-class server - if the
server is plugged into the switch when the switch reboots, the switch module fails selftest.
■ VLANs (SWITCH_3235) — Given several configured VLANs, the act of deleting a VLAN
that is in the middle of the list (i.e. not the first or the last one), causes filters, network
monitoring port, and meshing to malfunction.
111
Release C.05.07
Problems Resolved in Release C.05.07
■ Adds new features: Spanning Tree "fast" mode, and the ability to enable the switch as a TFTP
server to retrieve its config, using one of these case-sensitive commands:
setmib hpSwitchIpTftpMode.0 -i 1 (disable tftp server, the default)
setmib hpSwitchIpTftpMode.0 -i 2 (enable tftp server)
■ BOOTP (SWITCH_3134) — Switch does not read the "T144" field in the bootptab file, so
the switch fails to download its config file via BOOTP.
NOTE: Additional versions of C.05.xx were distributed during C.06.xx development. Therefore, bugs
fixed in the first few versions of C.06.xx may have also been fixed in the additional C.05.xx versions.
These bugs were fixed in the additional C.05.xx versions:
SWITCH_3208 SWITCH_3235
Also, C.05.10 includes C.05.09 fixes, and C.05.09 includes C.05.08 fixes.
112
Release C.05.06
Problems Resolved in Release C.05.06
■ Adds support for the HP ProCurve Switch Gigabit-LX module (J4114A).
■ Flow control (SWITCH_3151) — With flow control enabled, switch drops multicast and
broadcast packets.
Release C.05.05
Problems Resolved in Release C.05.05
■ Resolves the problems listed below.
Release C.05.04
Problems Resolved in Release C.05.04
■ Adds support for the HP ProCurve Switch 4000M/2400M.
■ Meshing (VARIOUS) — Resolves several issues with switch meshing, involving memory,
path cost, state (established or not), failed connectivity across the mesh, rebooting, and
erroneous report of loops during extremely high traffic.
■ SNMP (SWITCH_3082) — Switch does not give SNMP replies for PDUs greater than 484
bytes.
113
Release C.05.03
Problems Resolved in Release C.05.03
■ Resolves the problems listed below.
Release C.05.02
■ First release for the HP ProCurve Switch 8000M/1600M.
114
© 2001, 2008 Hewlett-Packard Development
Company, LP. The information contained
herein is subject to change without notice.
August 2008
Manual Part Number
5969-2375