Dear HPN Community,
Hope you all think that abouthpnetworking.com is providing good information. But there is always more . . .
Today I learned some great new information sources from my colleague Chris Young.
First web site is:
This site provides two great auto configuration generation tools. One is for IRF and other one for HP 830 wireless controllers. The author of this site is also programmer behind tool named glarn. Glarn is part of HPN SDN App Store.
The second web site is:
This web site provides full focus on HP IMC. The site provides forums but also github with scripts and adapters for third party products. Really valuable information.
Would be great if everyone can share his/her great information sources!
IRF is used on Comware switches (and some routers as well now) to virtualize 2 or more devices as 1 virtual device.
This is a very convenient way to simplify the network setup and management. Although IRF is very easy in the daily use, we should not forget that it actually runs on multiple physical switches, so the under the hood, multiple switch ASICs and forwarding tables have to be kept in sync.
This post covers a scenario where IRF needs some additional configuration in order to make sure it still behaves as “1” switch. Continue reading
On the Unified Wireless controllers, it is common to enable the auto-ap and auto-persistent features to make it easy to adopt new Access Points.
The new APs will be discovered and auto-registered as AP template based on the AP MAC Address. It is easier if the AP can be given a more user-friendly name.
This post shows how an existing AP template can be renamed.
With the Unified controllers, the APs which come online will dynamically get their configuration from the controller when they establish the LWAPP tunnel.
When AP based feature are configured, such as AP provisioning or AP-based user authentication (de-central authentication), it can be useful to understand and see what is going on on the AP. The APs have a console port, but this console port cannot be used once the AP has established the LWAPP tunnel.
This post shows how the administrator can enable console and telnet access to the AP. Continue reading
HP Comware switches have had IRF (Intelligent Resilient Framework) for years, and it was the basis of more simplified network topologies. Now it seems HP is preparing a next-generation of IRF !
Posted in Comware7, IRF
Tagged comware7, irf
HP has released firmware R3507P22 for the Unified wireless controller portfolio (830/850/870 appliance controllers and 20G module).
Sample of the 870 controller:
Several new features have been included, 2 interesting new features are:
- Support for vlan-pool at the AP-group configuration level
- Includes an Apple Bonjour gateway proxy and filtering solution
Dear network community,
Last week HP had great ETSS event. As promised after my HPN Scripting session at ETSS I would launch the HPN-Scripting repository on GitHub (https://github.com/networkingdvi/HPN-Scripting). All the example scripts from the presentation are uploaded and scripts I received from Thomas Kubica and Chuck Dilts. From the repository you can download all the scripts you want and use them for your need. It would be really great if we get community that starts to actively be part of the GitHub and add scripts. Think about following topics:
– HPN TCL scripts
– HPN Python scripts
– Scripts to use on HPN infrastructure
– IMC eAPI scripts
– HPN SDN controller scripts
If you want to join and add value to this repository and start adding your scripts please provide me your GitHub username and you’ll be added as contributor.
Let’s make great community!!!
Looking forward for all your inputs!
Regards, Dobias van Ingen
Dear network community,
Based on the feedback of Lindsay Hill on my last post I created a HPN Scripting GitHub repository. The repository is completely free with MIT license. After HP ETSS event next week I’ll post my scripts under this repository. The GitHub repository can be found via following URL:
HPN Scripting on GitHub
Let’s hope and try to drive this blog and repository to create HPN community that shares, supports and have fun.
Regards, Dobias van Ingen
Dear HP Network Community,
My name is Dobias van Ingen and I’m working within HP for almost 15 years. I’ve always been in networking and Unix / Linux infrastructures. Currently I’m leading an EMEA pre-sales overlay team with strong technical focus on HP Networking. My comments, views and opinions are all my own and do not reflect those of my employer.
Multiple HP network devices provide support for API’s or scripting languages. Hereby a few examples: Continue reading
For HP Blade enclosures, the 6125XLG can be used as a non-blocking 10G blade server access switch with 4x40G uplink ports. Since it is based on Comware 7 (very similar to the 5900AF model, but in a blade switch form factor), 2x 6125XLG switches in the blade enclosure can be configured to operate in a single IRF system.
This is a follow-up on the post which shows the basic 802.1x authentication. Make sure to read that post first before continuing with the this local authentication article:
This post configuration will result in:
- Decentral (local AP) authentication: AP forwards all 802.1x directly to the RADIUS server
- Decentral (local AP breakout) forwarding: AP forwards all user data directly with a VLAN tag to the Switch Port connecting the AP
The post assumes you have completed the central 802.1x configuration already (see link above), so only additional changes to that configuration are listed here.
This post is a sample configuration of an 802.1x WPA2/AES WLAN service on the HP Unified Wireless platform.
This configuration assumes:
- Central authentication: AP forwards all 802.1x over the LWAPP tunnel to the Access Controller (AC). The AC is the radius client
- Central forwarding: AP forwards all user data over the LWAPP tunnel to the AC. the wired network will see the wireless mac address coming in from the AC switch port.
This post covers a simple portal web interface customization, which will provide a “Free Access” option for guest users.
Some organizations do not want to administer guest accounts, but simply want to display a legal disclaimer which should be accepted and then allow internet access.
These are the basic configuration steps:
In this post a quick configuration overview of a new feature of the Unified controllers:
Central (guest) portal authentication with local (AP) data breakout after passing authentication.
This is very convenient for customers with remote sites, where the remote site has a local internet connection but no wireless controller available. So they want to have a Guest SSID with a portal authentication (which will be centrally provided by the AC), and after a guest passes authentication, it will be assigned to a local-breakout VLAN. This means the (remote site) AP will directly put the guest into the local guest internet VLAN (after passing authentication).
This post covers the HP Unified Wireless controller (AC) portal configuration in a scenario of an extended L2 guest subnet configuration.
There are 2 scenario’s to handle guest IP subnets:
- A new IP subnet, where the AC is the default gateway, performs portal authentication and then routes/NATs the guest traffic to the internet.
- An existing IP subnet, provided by an existing guest Internet router. The guest internet router will provide DHCP and NAT services for the guests. The AC just needs to provide portal authentication services. Guests who have passed portal authentication, will be L2 forwarded by the AC (not routed).
This post covers the second scenario: Extending the external internet router IP subnet as the guest subnet. Continue reading