EasyManua.ls Logo

HP 2530 User Manual

HP 2530
111 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #13 background imageLoading...
Page #13 background image
Syntax:
[no] dhcp-snooping database [file <tftp://<ip-address>/<ascii-string>>]
[delay <15-86400>] [timeout <0-86400>]
DetailTaskParameter
Maximum filename length = 63
characters.
Must be in Uniform Resource Locator (URL) format
“tftp://ip-address/ascii-string”.
file
Default = 300 seconds.Number of seconds to wait before writing to the
database.
delay
Default = 300 seconds.Number of seconds to wait for the database file
transfer to finish before returning an error. A value
of zero (0) means retry indefinitely.
timeout
A message is logged in the system event log if the DHCP binding database fails to update. To
display the contents of the DHCP snooping binding database, enter this command:
Syntax:
show dhcp-snooping binding
Example 8 The DHCP snooping binding database contents
HP Switch(config)# show dhcp-snooping binding
MacAddress IP VLAN Interface Time left
------------- --------------- ---- --------- ---------
22.22.22.22.22.22 10.0.0.1 4 6 1600
NOTE: If a lease database is configured and the switch reboot completes quickly, the switch
drops all DHCP packets until the lease database is read. If the switch cannot read the lease database
from the tftp server, it waits until that operation times out and then starts forwarding DHCP packets.
Clearing DHCP snooping statistics
Syntax:
clear dhcp-snooping statistics
Clears all the statistics counters for DHCP snooping; the counters are reset to zero.
Enabling debug logging
To enable debug logging for DHCP snooping, use this command:
Syntax:
[no] debug dhcp-snooping [ agent | event | packet ]
TaskParameter
Displays DHCP snooping agent messages.agent
Displays DHCP snooping event messages.event
Displays DHCP snooping packet messages.packet
DHCP is not configurable from the WebAgent or menu interface.
If packets are received at too high a rate, some may be dropped and need to be re-transmitted.
Configuring advanced threat protection 13

Table of Contents

Other manuals for HP 2530

Question and Answer IconNeed help?

Do you have a question about the HP 2530 and is the answer not in the manual?

HP 2530 Specifications

General IconGeneral
LayerLayer 2
Operating Temperature32°F to 113°F (0°C to 45°C)
ModelHP 2530
Power over Ethernet (PoE)PoE+
ManagementWeb interface, CLI, SNMP
Memory128 MB flash
Input Voltage100-240 VAC
Jumbo Frame SupportYes
Operating Humidity15% to 95% non-condensing

Summary

1 Updates for the HP Switch Software Access Security Guide

Configuring advanced threat protection

Covers advanced threat protection features like DHCP snooping, Dynamic ARP protection, and Instrumentation monitor.

DHCP snooping

Details DHCP snooping for preventing DoS attacks by distinguishing trusted and untrusted ports.

Dynamic ARP protection

Explains how to protect networks from ARP poisoning attacks using dynamic ARP protection.

Dynamic IP Lockdown

This feature prevents IP source address spoofing by enforcing IP-to-MAC bindings.

Using the instrumentation monitor

How to use the instrumentation monitor to detect security anomalies and irregular operations.

Configuring RADIUS server support for switch services

Introduction

Explains configuring CoS, rate-limiting, and ACL client services via a RADIUS server.

Configuring and using dynamic (RADIUS-assigned) access control lists

Describes applying RADIUS-assigned ACLs to filter IP traffic from authenticated clients.

2 Updates for the HP Switch Software IPv6 Configuration Guide

Access Control Lists (ACLs)

Details configuring, applying, and editing static IPv6 ACLs for traffic filtering.

ACL applications

Covers filtering traffic from hosts, subnets, and applying ACLs at network edges.

RADIUS-assigned ACLs

Explains ACLs configured on a RADIUS server and assigned to authenticated clients.

Planning and configuring ACLs

Outlines steps for identifying ACL actions, designing ACLs, and applying them.

ACL operation

Describes how ACLs apply to ports, trunks, and filter traffic types.

Guidelines for planning ACL structure

Covers determining ACL application points and the order of ACEs for resource efficiency.

ACL configuration structure

Details the basic structure of an ACL, including identity, remarks, and ACEs.

Related product manuals