Preview

Best Practice

Powerful Essays
Open Document
Open Document
6167 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Best Practice
Configuration of HP ProCurve Devices in a Campus Environment

Best Practice Document

Produced by CESNET led working group on Network monitoring (CBPD111) Authors: Tomas Podermanski, Vladimir Zahorik March 2010

© TERENA 2010. All rights reserved. Document No: Version / date: Original language : Original title: Original version / date: Contact: GN3-NA3-T4-CBPD111 March 2010 Czech “Configuration of HP ProCurve Devices in a Campus Environment” Version 1.2 of 3 December 2009 tpoder@cis.vutbr.cz, zahorik@cis.vutbr.cz

CESNET bears responsibility for the content of this document. The work has been carried out by a CESNET led working group on Network monitoring as part of a joint-venture project within the HE sector in the Czech Republic. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 23 8875, relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3)'.

2

Table of Contents
Table of Contents Executive Summary 1 Basic Settings and Operations 1.1 Switch Access 1.2 Resetting to Factory Default 1.3 Firmware Upgrade 1.4 Setting Hostname 1.5 Setting Passwords 1.6 Time Zone 1.7 Time Servers 1.8 Default Gateway 1.9 Switch Management Access Addresses 1.10 Remote Logging 1.11 Basic SNMP Configuration 1.12 Authentication by Radius Servers 1.13 SSH to Access the Switch Management 1.14 Limiting Access via Insecure Protocols 2 L2 Configuration 2.1 Setting the Communication Parameters of the Switch Port 2.1.1 Speed and Communication Parameters 2.1.2 Port Trunking, LACP 2.1.3 Broadcast Limit 2.1.4 Spanning Tree 2.1.5 Discovery of Physical Topology (LLDP, CDP) 2.2 VLAN Configuration 2.2.1 Assigning Ports to VLAN 2.2.2 GVRP - Automatic VLAN Broadcasting 2.2.3 IGMP Configuration 2.2.4 MLD

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    When installing a switch you want to figure out where to put the switch first, then you will want to decide whether you are going to use an internal AC power supply or by connecting the Cisco 600W AC RPS which is optional to the RPS connector on the switch. You are then going to want to use the Command Line Interface to configure the switch. The console port on the back can be connected to a management station. This is normally a PC or you can use a modem with a supplied RJ-45-to-RJ-45 rollover console cable and the appropriate adapter. A new switch comes with no password installed. A password has to be installed in order to access the configuration or switch management interfaces. If you don’t put a password on it, you can’t access the configuration until the switch joins a cluster or you install a password.…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Recently, it was brought to my attention that there are concerns about some activities on the network that can be considered less than trustworthy. Specifically, the concerns are regarding network traffic called ping sweeps and port scans. I’m putting together this paper to explain how ping sweeps and port scans impact our network traffic.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Westover Wire Works

    • 497 Words
    • 2 Pages

    References: Rosenthal, R., & Rippy, D. E. (1976). The network measurement machine: a data collection device for measuring the performance and utilization of computer networks.…

    • 497 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Skill questions

    • 318 Words
    • 2 Pages

    1. Explain the difference between passing a piece of data “by value” and passing a piece of data “by reference.”…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This manual and any accompanying Systech software are copyrighted by Systech International, Inc. Any reproduction and/or distribution without prior written consent from Systech is strictly prohibited. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other product names mentioned in this publication are trademarks of their respective companies. Please refer to the license agreement for details. SYSTECH INTERNATIONAL® is a trademark of SYSTECH International. SYSTECH TIPS®, TIPS®, SYSTECH SENTRI®, SYSTECH ADVISOR®, and SYSTECH GUARDIAN® are registered trademarks of SYSTECH International, Inc. Copyright© 2009 SYSTECH International. All Rights Reserved. All Systech products and applications are standards-based and 21 CFR Part 11 compliant. We follow GAMP guidelines in our business processes. Systech supports GS1 Global Standards. Liability Disclaimer: Systech Sentri®, Systech Advisor® and Systech Guardian® are warranted in accordance with the product license. System configuration, the application being performed, operator control and other related factors will affect product performance and implementation may vary among users. The instructions in this manual do not claim to cover all details or variations in the equipment, procedure, or process described, or to provide directions for meeting every possible contingency during installation, operation, or maintenance. When additional information is required to satisfy a problem not covered sufficiently for your purpose, please contact Systech’s Customer Support Help Desk at 1-800-847-7435. Need help? Call our Customer Support Help Desk for any Systech product or service information at:…

    • 59076 Words
    • 237 Pages
    Satisfactory Essays
  • Good Essays

    Uploads Uploads Teja

    • 783 Words
    • 3 Pages

    The constantly increasing applications of computers in technological development demand more efficient networking. Coming from a background of Computer Science Engineering, I have developed a fascination to probe into the arena of Networking in general and Computer Networks in particular which posses a challenging task in interconnecting PC’s and Laptops. This cultivated my interest to take Computer Science Engineering as my major during the graduate studies.…

    • 783 Words
    • 3 Pages
    Good Essays