HP 5800 User manual

HP 5820X & 5800 Switch Series
Fundamentals
Configuration Guide
Abstract
This document describes the software features for the HP 5820X & 5800 Series products and guides you
through the software configuration procedures. These configuration guides also provide configuration
examples to help you apply software features to different network scenarios.
This documentation is intended for network planners, field technical support and servicing engineers, and
network administrators working with the HP 5820X & 5800 Series products.
Part number: 5998-1620
Software version: Release 1211
Document version: 6W102-20130520

Legal and notice information
© Copyright 2013 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without prior
written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional
warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

iii
Contents
Configuring the CLI······················································································································································ 1
Entering the CLI ·································································································································································1
Command conventions·····················································································································································2
Undo form of a command················································································································································3
CLI view description··························································································································································3
Entering system view················································································································································4
Exiting the current view ···········································································································································4
Returning to user view··············································································································································4
Using online help ······························································································································································5
Entering commands ··························································································································································6
Editing command lines·············································································································································6
Entering incomplete keywords ································································································································6
Configuring command aliases································································································································6
Configuring CLI hotkeys···········································································································································7
Redisplaying entered but not submitted commands ·····························································································8
Checking command line errors ·······································································································································9
Using command history····················································································································································9
Accessing history commands ··································································································································9
Configuring the history buffer size ······················································································································ 10
Controlling the CLI display············································································································································ 10
Multi-screen display ·············································································································································· 10
Filtering output information ·································································································································· 11
Configuring user privilege and command levels ········································································································ 14
Configuring a user privilege level ······················································································································· 15
Switching user privilege level······························································································································· 18
Modifying the level of a command ····················································································································· 20
Saving the current configuration ·································································································································· 21
Displaying and maintaining CLI ··································································································································· 21
Login methods ····························································································································································22
Users and user interfaces ·············································································································································· 23
Numbering user interfaces ··································································································································· 24
CLI login······································································································································································25
Logging in through the console port ···························································································································· 25
Configuration requirements·································································································································· 25
Login procedure····················································································································································· 26
Console login authentication modes ··················································································································· 28
Configuring none authentication for console login ··························································································· 29
Configuring password authentication for console login ··················································································· 30
Configuring scheme authentication for console login ······················································································· 32
Configuring common settings for console login (optional) ··············································································· 35
Logging in through Telnet·············································································································································· 36
Telnet login authentication modes ······················································································································· 37
Configuring none authentication for Telnet login ······························································································ 38
Configuring password authentication for Telnet login ······················································································ 40
Configuring scheme authentication for Telnet login ·························································································· 41
Configuring common settings for VTY user interfaces (optional)······································································ 44
Configuring the device to log in to a Telnet server as a Telnet client······························································ 46
Logging in through SSH ················································································································································ 47

iv
Configuring the SSH server·································································································································· 47
Configuring the SSH client to log in to the SSH server ····················································································· 50
Logging in through modems ········································································································································· 51
Configuration requirements·································································································································· 51
Login procedure····················································································································································· 52
Modem login authentication modes···················································································································· 54
Configuring none authentication for modem login···························································································· 55
Configuring password authentication for modem login···················································································· 56
Configuring scheme authentication for modem login ······················································································· 58
Configuring common settings for modem login (optional)················································································ 61
Displaying and maintaining CLI login ························································································································· 63
Web login ··································································································································································64
Overview········································································································································································· 64
Configuring HTTP login ················································································································································· 65
Configuring HTTPS login ··············································································································································· 66
Displaying and maintaining web login ······················································································································· 68
Web login example······················································································································································· 68
HTTP login example ·············································································································································· 68
HTTPS login example ············································································································································ 69
NMS login··································································································································································72
Overview········································································································································································· 72
Configuring NMS login················································································································································· 72
Configuring SNMPv1 and SNMPv2c settings ··································································································· 73
Configuring SNMPv3 settings······························································································································ 74
NMS login example ······················································································································································ 74
User login control·······················································································································································77
Overview········································································································································································· 77
Configuring login control over Telnet users················································································································· 77
Configuration preparation ··································································································································· 77
Configuring source IP-based login control over Telnet users ············································································ 77
Configuring source and destination IP-based login control over Telnet users ················································ 78
Configuring source MAC-based login control over Telnet users······································································ 78
Source MAC-based login control configuration example················································································· 79
Configuring source IP-based login control over NMS users······················································································ 80
Configuration preparation ··································································································································· 80
Configuring source IP-based login control over NMS users············································································· 80
Source IP-based login control over NMS users configuration example ·························································· 81
Configuring source IP-based login control over web users ······················································································· 82
Configuration preparation ··································································································································· 82
Configuring source IP-based login control over web users··············································································· 82
Logging off online web users ······························································································································· 83
Source IP-based login control over web users configuration example···························································· 83
Configuring FTP··························································································································································84
Overview········································································································································································· 84
Operation······························································································································································· 84
Configuring the FTP client ············································································································································· 85
Establishing an FTP connection···························································································································· 85
Operating FTP server directories ························································································································· 87
Operating FTP server files ···································································································································· 87
Using another username to log in to an FTP server ··························································································· 88
Maintaining and debugging an FTP connection································································································ 89
Terminating an FTP connection···························································································································· 89
FTP client configuration example························································································································· 89

v
FTP client configuration example························································································································· 91
Configuring the FTP server ············································································································································ 92
Configuring FTP server operating parameters ··································································································· 92
Configuring authentication and authorization on the FTP server ····································································· 93
FTP server configuration example························································································································ 94
FTP server configuration example························································································································ 96
Displaying and maintaining FTP··································································································································· 98
Configuring TFTP························································································································································99
Overview········································································································································································· 99
Operation······························································································································································· 99
Configuring the TFTP client ·········································································································································100
Displaying and maintaining the TFTP client ··············································································································101
TFTP client configuration example······························································································································102
TFTP client configuration (IRF mode) example ··········································································································103
File management····················································································································································· 105
Filename formats ·················································································································································105
Performing directory operations ·································································································································105
Displaying directory information ·······················································································································106
Displaying the current working directory··········································································································106
Changing the current working directory···········································································································106
Creating a directory············································································································································106
Removing a directory··········································································································································106
Performing file operations···········································································································································107
Displaying file information ·································································································································107
Displaying file contents·······································································································································107
Renaming a file····················································································································································107
Copying a file······················································································································································107
Moving a file························································································································································107
Deleting a file ······················································································································································108
Restoring a file from the recycle bin··················································································································108
Emptying the recycle bin ····································································································································108
Performing batch operations·······································································································································108
Performing storage media operations ·······················································································································109
Managing storage media space ·······················································································································109
Displaying and maintaining the NAND flash memory ···················································································109
Setting prompt modes··················································································································································110
File operation example················································································································································111
Configuration file management ····························································································································· 112
Overview·······································································································································································112
Types of configuration ········································································································································112
Configuration file format and content ···············································································································113
Coexistence of multiple configuration files·······································································································113
Startup with the configuration file······················································································································114
Saving the running configuration ·······························································································································114
Enabling configuration file auto-save················································································································114
Selecting save mode for the configuration file·································································································114
Setting configuration rollback·····································································································································117
Configuration task list ·········································································································································117
Configuring parameters for saving the running configuration ·······································································118
Enabling automatic saving of the running configuration ················································································119
Manually saving the running configuration······································································································120
Setting configuration rollback ····························································································································120
Specifying a startup configuration file to be used at the next system startup························································121

vi
Backing up the startup configuration file···················································································································121
Deleting a startup configuration file to be used at the next startup········································································122
Restoring a startup configuration file ·························································································································122
Displaying and maintaining a configuration file ······································································································123
Configuring software upgrade······························································································································· 124
Overview·······································································································································································124
Software upgrade methods·········································································································································125
Upgrading the boot ROM program through a system reboot·················································································126
Upgrading the boot file through a system reboot·····································································································127
Upgrading IRF member switch boot file ····················································································································128
Software upgrade by installing hotfixes ····················································································································129
Patch and patch file ············································································································································129
Patch types ···························································································································································129
Patch status···························································································································································129
Configuration prerequisites ································································································································132
One-step patch installation·································································································································133
Step-by-step patch installation····························································································································133
Step-by-step patch uninstallation························································································································134
Displaying and maintaining the software upgrade··································································································134
Software upgrade configuration examples···············································································································134
Immediate upgrade configuration example ·····································································································134
Hotfix configuration example·····························································································································136
Configuring ISSU ···················································································································································· 138
Overview·······································································································································································138
ISSU process ························································································································································139
Boot file version rollback ····································································································································140
Configuring ISSU ·························································································································································141
Configuration task list ·········································································································································141
Prerequisites for performing ISSU······················································································································141
Enabling version compatibility check················································································································142
Configuring ISSU·················································································································································143
Configuring the ISSU version rollback timer·····································································································145
Performing manual version rollback··················································································································146
Displaying and maintaining ISSU······················································································································146
ISSU configuration example ·······································································································································146
Current network status and requirements analysis···························································································146
Configuration procedure ····································································································································148
ISSU upgrade preparation ·································································································································150
Performing compatible ISSU upgrade···············································································································154
Performing incompatible ISSU upgrade ···········································································································155
Configuring device management··························································································································· 157
Overview·······································································································································································157
Configuring the device name ·····································································································································157
Configuring the system clock ······································································································································157
Displaying the system clock ·······························································································································158
Enabling the display of copyright information··········································································································161
Configuring banners····················································································································································161
Input modes··························································································································································162
Banner configuration example···························································································································162
Configuring the exception handling method ············································································································163
Rebooting the device ···················································································································································163
Configuring scheduled tasks·······································································································································165
Configuring a scheduled task—Approach 1 ···································································································165

vii
Configuring a scheduled task—Approach 2 ···································································································166
Configuring the fan ventilation direction···················································································································167
Configuring the detection timer··································································································································167
Configuring temperature alarm thresholds for a member device ···········································································167
Clearing the 16-bit interface indexes not used in the current system·····································································169
Identifying and diagnosing pluggable transceivers ·································································································169
Identifying pluggable transceivers·····················································································································170
Diagnosing pluggable transceivers···················································································································170
Displaying and maintaining device management configuration ············································································171
Automatic configuration ········································································································································· 173
Overview·······································································································································································173
Typical automatic configuration network ··················································································································173
How automatic configuration works ··························································································································174
Work flow ····························································································································································174
Using DHCP to obtain an IP address and other configuration information ··················································175
Obtaining the configuration file from the TFTP server ·····················································································176
Executing the configuration file··························································································································178
Support and other resources ·································································································································· 179
Contacting HP ······························································································································································179
Subscription service ············································································································································179
Related information······················································································································································179
Documents····························································································································································179
Websites ······························································································································································179
Conventions ··································································································································································180
Index ········································································································································································ 182

1
Configuring the CLI
CLI enables you to interact with your device by typing text commands. At the CLI, instruct your device to
perform a given task by typing a text command and then pressing Enter. Compared with the graphical user
interface (GUI) where you can use a mouse to perform configurations, the CLI allows you to enter more
information in one command line.
Figure 1 CLI example
Entering the CLI
HP devices provide multiple methods for entering the CLI, such as through the console port, through Telnet,
or through SSH. For more information, see “Login methods.”

2
Command conventions
Command conventions help you understand command meanings. Commands in HP product manuals
comply with the conventions listed in Table 1.
Table 1 Command conventions
Convention Descri
p
tion
Boldface Bold text represents commands and keywords you enter literally as shown.
Italic Italic text represents arguments you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n> The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
NOTE:
The keywords of HP command lines are case insensitive.
Use clock datetime time date as an example to understand the meaning of the command line parameters
according to Figure 2.
Figure 2 Read command line parameters
For example, enter the following at the CLI of your device and press Enter to set the device system time to 10
o’clock 30 minutes 20 seconds, February 23, 2010.
<sysname> clock datetime 10:30:20 2/23/2010
Read any command that is more complicated by referring to Table 1.

3
Undo form of a command
The undo form of a command restores the default, disables a function, or removes a configuration.
Almost all configuration commands have an undo form. For example, info-center enable enables the
information center and undo info-center enable disables the information center.
CLI view description
Commands are grouped into different classes by function. To use a command, you must enter the class view
of the command.
CLI views adopt a hierarchical structure. See Figure 3.
•After logging in to the switch, you are in user view. The prompt of user view is <device name>. In user
view, perform display, debugging, and file management operations, set the system time, restart your
device, and perform FTP and Telnet operations.
•Enter system view from user view. In system view, configure parameters such as daylight saving time,
banners, and short-cut keys.
•From system view, enter different function views. For example, enter interface view to configure interface
parameters, create a VLAN and enter its view, enter user interface view to configure login user
attributes, create a local user and enter local user view to configure the password and level of the local
user, and enter OSPF view to configure OSPF parameters.
NOTE:
Enter ?in any view to display all commands that can be executed in this view.
Figure 3 Command line views
……

4
Entering system view
When you log in to the device, you automatically enter user view, where <Device name> is displayed.
Perform limited operations in user view, for example, display operations, file operations, and Telnet
operations.
To perform further configuration for the device, enter system view.
Ste
p
Command
Remarks
1. Enter system view from user
view. system-view Required
Available in user view
Exiting the current view
The CLI is divided into different command views. Each view has a set of specific commands and defines the
effective scope of the commands. The commands available to you at any given time depend on the view you
are in.
Follow the step below to exit the current view:
Task Command
Remarks
1. Return to the parent view from the
current view. quit
Required.
Available in any view.
In user view, quit stops the current connection
between the terminal and the device.
In public key code view, use public-key-code end to return to the parent view (public key view).
In public key view, use peer-public-key end to return to system view.
Returning to user view
This feature allows you to return to user view from any other view, without using quit command repeatedly.
Alternately, press Ctrl+Z to return to user view from the current view.
Follow the step below to exit to user view:
Ste
p
Command
Remarks
1. Return to user view. return Required.
Available in any view except user view.

5
Using online help
Enter a question mark (?) to obtain online help. See the following examples.
1. Enter ?in any view to display all commands available in this view and brief descriptions of these
commands. For example:
<sysname> ?
User view commands:
archive Specify archive settings
backup Backup next startup-configuration file to TFTP server
boot-loader Set boot loader
bootrom Update/read/backup/restore bootrom
cd Change current directory
…Omitted…
2. Enter part of a command and a ? separated by a space.
If ?is at the position of a keyword, the CLI displays all possible keywords with a brief description for
each keyword. For example:
<sysname> terminal ?
debugging Send debug information to terminal
logging Send log information to terminal
monitor Send information output to current terminal
trapping Send trap information to terminal
If ?is at the position of an argument, the CLI displays a description about this argument. For example:
<sysname> system-view
[sysname] interface vlan-interface ?
<1-4094> VLAN interface
[sysname] interface vlan-interface 1 ?
<cr>
[sysname] interface vlan-interface 1
The string <cr> indicates that the command is a complete command. Execute the command by pressing
Enter.
3. Enter an incomplete character string followed by a ?. The CLI displays all commands starting with the
entered character(s).
<sysname> c?
cd
cfd
clock
cluster
copy
<sysname> display cl?
clipboard
clock
cluster

6
Entering commands
Editing command lines
Table 2 lists some shortcut keys you can use to edit command lines.
Table 2 Editing functions
Ke
y
Function
Common keys If the edit buffer is not full, pressing a common key inserts the character at the
position of the cursor and moves the cursor to the right.
Backspace Deletes the character to the left of the cursor and moves the cursor back one
character.
Left arrow key or Ctrl+B The cursor moves one character space to the left.
Right arrow key or Ctrl+F The cursor moves one character space to the right.
Tab
If you press Tab after entering part of a keyword, the system automatically
completes the keyword:
•If finding a unique match, the system substitutes the complete keyword for
the incomplete one and displays it in the next line.
•If there is more than one match, press Tab repeatedly to view in cycles all
keywords starting with the character string you entered.
•If there is no match, the system does not modify the incomplete keyword
and displays it again in the next line.
Entering incomplete keywords
Enter a command comprising incomplete keywords that uniquely identify the complete command.
In user view, for example, commands starting with an sinclude startup saved-configuration and
system-view.
•To enter system view, enter sy.
•To set the configuration file for next startup, enter st s.
Press Tab to have an incomplete keyword automatically completed.
Configuring command aliases
The command alias function allows you to replace the first keyword of a command with your preferred
keyword. For example, if you configure show as the replacement for the display keyword, then to run display
xx, enter the command alias show xx.
The following guidelines apply when configuring a command alias:
•Define and use a command alias. The command is not restored in its alias format.
•When you define a command alias, the cmdkey and alias arguments must be in their complete form.
•When you enter an incomplete keyword that partially matches both a defined alias and the keyword of
a command, the alias takes effect. To execute the command whose keyword partially matches your
entry, enter the complete keyword. When you enter a character string that partially matches multiple
aliases, the system gives you prompts.

7
•If you press Tab after you enter the keyword of an alias, the original format of the keyword is displayed.
•Replace only the first keyword of a non-undo command instead of the complete command; and replace
only the second keyword of undo commands.
To configure command aliases:
Ste
p
Command
Remarks
1. Enter system view. system-view —
2. Enable the command alias
function. command-alias enable
Required
Disabled by default, which means you
cannot configure command aliases.
3. Configure a command alias. command-alias mapping
cmdkey alias
Required
Not configured by default.
Configuring CLI hotkeys
Ste
p
Command
Remarks
1. Enter system view. system-view —
2. Configure CLI
hotkeys.
hotkey { CTRL_G |
CTRL_L | CTRL_O |
CTRL_T | CTRL_U }
command
Optional
By default, the Ctrl+G, Ctrl+L and Ctrl+O hotkeys
are associated with pre-defined commands and
the Ctrl+T and Ctrl+U hotkeys are not.
•Ctrl+G corresponds to display
current-configuration.
•Ctrl+L corresponds to display ip routing-table.
•Ctrl+O corresponds to undo debugging all.
3. Display hotkeys. display hotkey Available in any view.
See Table 3 for hotkeys reserved by the system.
Table 3 Hotkeys reserved by the system
The hotkeys in this table above are defined by the switch. If the same hotkeys are defined by the terminal
software you use to interact with the switch, the hotkeys defined by the terminal software take effect.
Hotke
y
Function
Ctrl+A Moves the cursor to the beginning of the current line.
Ctrl+B Moves the cursor one character to the left.
Ctrl+C Stops performing a command.
Ctrl+D Deletes the character at the current cursor position.
Ctrl+E Moves the cursor to the end of the current line.
Ctrl+F Moves the cursor one character to the right.
Ctrl+H Deletes the character to the left of the cursor.
Ctrl+K Terminates an outgoing connection.
Ctrl+N Displays the next command in the history command buffer.

8
Hotke
y
Function
Ctrl+P Displays the previous command in the history command buffer.
Ctrl+R Redisplays the current line information.
Ctrl+V Pastes the content in the clipboard.
Ctrl+W Deletes all characters in a continuous string to the left of the cursor.
Ctrl+X Deletes all characters to the left of the cursor.
Ctrl+Y Deletes all characters to the right of the cursor.
Ctrl+Z Exits to user view.
Ctrl+] Terminates an incoming connection or a redirect connection.
Esc+B Moves the cursor to the leading character of the continuous string to the left.
Esc+D Deletes all characters of the continuous string at the current cursor position and to
the right of the cursor.
Esc+F Moves the cursor to the front of the next continuous string to the right.
Esc+N Moves the cursor down by one line (available before you press Enter)
Esc+P Moves the cursor up by one line (available before you press Enter)
Esc+< Specifies the cursor as the beginning of the clipboard.
Esc+> Specifies the cursor as the ending of the clipboard.
Redisplaying entered but not submitted commands
If your command input is interrupted by output system information, use this feature to redisplay the previously
entered but not submitted commands.
If you have no input at the command line prompt and the system outputs system information such as logs, the
system will not display the command line prompt after the output.
If the system outputs system information when you are typing interactive information (not YES/NO for
confirmation), the system will not redisplay the prompt information but a line break after the output and then
display what you have entered.
To enable redisplaying of entered but not submitted commands:
Step Command Remarks
1. Enter system view. system-view —
2. Enable redisplaying of
entered but not submitted
commands.
info-center synchronous
Required.
Disabled by default.
For more information about info-center
synchronous, see Network Management and
Monitoring Configuration Guide.

9
Checking command line errors
If a command contains syntax errors, the CLI reports error information.
Table 4 Common command line errors
Error information Cause
% Unrecognized command found at '^' position. The command was not found.
% Incomplete command found at '^' position. Incomplete command
% Ambiguous command found at '^' position. Ambiguous command
Too many parameters Too many parameters
% Wrong parameter found at '^' position. Wrong parameters
Using command history
The CLI automatically saves the commands recently used in the history command buffer. Access and execute
them again.
Accessing history commands
Task Command
Result
Display history commands. display history-
command Displays valid history commands you used.
Display the previous history
command.
Up arrow key or
Ctrl+P Displays the previous history command, if any.
Display the next history command. Down arrow key or
Ctrl+N Displays the next history command, if any.
NOTE:
Use arrow keys to access history commands in Windows 200X and XP Terminal or Telnet. However, the
up and down arrow keys are invalid in Windows 9X HyperTerminal, because they are defined differently.
Use Ctrl+P or Ctrl+N instead.
•The commands saved in the history command buffer are in the same format in which you entered the
commands. If you enter an incomplete command, the command saved in the history command buffer
is also an incomplete one.
•If you execute the same command repeatedly, the switch saves only the earliest record. However, if you
execute the same command in different formats, the system saves them as different commands. For
example, if you run display cu repeatedly, the system saves only one command in the history command
buffer. If you execute the command in the format of display cu and display current-configuration
respectively, the system saves them as two commands.
•By default, the CLI can save up to 10 commands for each user. To set the capacity of the history
command buffer for the current user interface, use history-command max-size. (For more information
about history-command max-size, see “Logging in to the switch commands.”

10
Configuring the history buffer size
To configure the history buffer size:
Ste
p
Command
Remarks
Enter system view system-view —
Enter user interface view
user-interface { first-num1
[ last-num1 ] | { aux | vty }
first-num2 [ last-num2 ] }
—
Set the maximum number of
commands that can be saved in the
history buffer
history-command max-size
size-value
Optional
By default, the history buffer can
save up to 10 commands.
NOTE:
For more information about user-interface and history-command max-size, see “Logging in to the switch
commands.”
Controlling the CLI display
Multi-screen display
Controlling multi-screen display
If the output information spans multiple screens, each screen pauses after it is displayed. Perform one of the
following operations to proceed.
Action Function
Press Space Displays the next screen.
Press Enter Displays the next line.
Press Ctrl+C Stops the display and the command execution.
Press <PageUp> Displays the previous page.
Press <PageDown> Displays the next page.
By default, each screen displays up to 24 lines. To change the maximum number of lines displayed on the
next screen, use screen-length. For more information about screen-length, see “Logging in to the switch
commands.”

11
Disabling multi-screen display
Use the following command to disable the multi-screen display function. All of the output information is
displayed at one time and the screen is refreshed continuously until the last screen is displayed.
Ste
p
Command
Remarks
Disable the multi-screen display
function screen-length disable
Required
By default, a login user uses the
settings of the screen-length. The
default settings of the screen-length
command are: multiple-screen
display is enabled and up to 24
lines are displayed on the next
screen.
This command is executed in user
view, and takes effect for the current
user only. When the user re-logs into
the switch, the default configuration
is restored.
Filtering output information
Use regular expressions in display commands to filter output information.
The following methods are available for filtering output information:
•Enter the begin, exclude, or include keyword plus a regular expression in the display to filter the output
information.
•When the system displays the output information in multiple screens, use the slash (/), hyphen (-), or plus
(+) with a regular expression to filter subsequent output information. The slash character (/) equals the
keyword begin, the character hyphen (-) equals the keyword exclude, and the character plus (+) equals
the keyword include.
The following definitions apply to the begin, exclude, and include keywords:
•begin: Displays the first line that matches the specified regular expression and all lines that follow.
•exclude: Displays all lines that do not match the specified regular expression.
•include: Displays all lines that match the specified regular expression.

12
A regular expression is a case-sensitive string of 1 to 256 characters. It supports the following special
characters.
Character Meanin
g
Remarks
^string Starting sign. string appears only at
the beginning of a line.
For example, regular expression “^user” only
matches a string beginning with “user," not
“Auser."
string$ Ending sign. string appears only at
the end of a line.
For example, regular expression "user$” only
matches a string ending with “user," not “userA."
.
Matches any single character, such
as a single character, a special
character, and a blank.
For example, “.s” matches “as” and “bs."
*
Matches the preceding character or
character group zero or multiple
times.
For example, “zo*” matches “z” and “zoo”;
“(zo)*” matches “zo” and “zozo."
+
Matches the preceding character or
character group one or multiple
times
For example, “zo+” matches “zo” and “zoo," but
not “z."
| Matches the preceding or
succeeding character string
For example, “def|int” only matches a character
string containing “def” or “int."
_
If it is at the beginning or the end of a
regular expression, it equals ^ or $.
In other cases, it equals comma,
space, round bracket, or curly
bracket.
For example, “a_b” matches “a b” or “a(b”; “_ab”
only matches a line starting with “ab”; “ab_” only
matches a line ending with “ab."
-
It connects two values (the smaller
one before it and the bigger one
after it) to indicate a range together
with [ ].
For example, “1-9” means 1 to 9 (inclusive); “a-h”
means a to h (inclusive).
[ ] Matches a single character
contained within the brackets.
For example, [16A] matches a string containing
any character among 1, 6, and A; [1-36A] matches
a string containing any character among 1, 2, 3, 6,
and A (- is a hyphen).
“]” can be matched as a common character only
when it is put at the beginning of characters within
the brackets, for example [ ]string]. There is no such
limit on “[."
() A character group. It is usually used
with “+” or “*."
For example, (123A) means a character group
“123A”; “408(12)+” matches 40812 or
408121212. But it does not match 408.
\index
Repeats the character string
specified by the index. A character
string refers to the string within ()
before \. index refers to the
sequence number (starting from 1
from left to right) of the character
group before \. If only one character
group appears before \, index can
only be 1; if n character groups
appear before index, index can be
any integer from 1 to n.
For example, (string)\1 repeats string, and a
matching string must contain stringstring.
(string1)(string2)\2 repeats string2, and a
matching string must contain string1string2string2.
(string1)(string2)\1\2 repeats string1 and string2
respectively, and a matching string must contain
string1string2string1string2.

13
Character Meanin
g
Remarks
[^] Matches a single character not
contained within the brackets.
For example, [^16A] means to match a string
containing any character except 1, 6 or A, and the
matching string can also contain 1, 6 or A, but
cannot contain these three characters only. For
example, [^16A] matches “abc” and “m16," but
not 1, 16, or 16A.
\<string Matches a character string starting
with string.
For example, “\<do” matches word “domain” and
string “doa."
string\> Matches a character string ending
with string.
For example, “do\>” matches word “undo” and
string “abcdo."
\bcharacter2
Matches character1character2.
character1 can be any character
except number, letter or underline,
and \b equals [^A-Za-z0-9_].
For example, “\ba” matches “-a” with “-“ being
character1, and “a” being character2, but it does
not match “2a” or “ba."
\Bcharacter
Matches a string containing
character and no space is allowed
before character.
For example, “\Bt” matches “t” in “install," but not
“t” in “big top."
character1\w
Matches character1character2.
character2 must be a number, letter,
or underline, and \wequals
[^A-Za-z0-9_].
For example, “v\w” matches “vlan," with “v” being
character1, and “l” being character2. v\w also
matches “service," with “i” being character2.
\W Equals \b.
For example, “\Wa” matches “-a," with “-” being
character1, and “a” being character2, but does not
match “2a” or “ba."
\
Escape character. If a special
character listed in this table follows
\, the specific meaning of the
character is removed.
For example, “\\” matches a string containing “\,"
“\^” matches a string containing “^," and “\\b”
matches a string containing “\b."
Other manuals for 5800
2
This manual suits for next models
3
Table of contents
Other HP Switch manuals

HP
HP A5500 HI Series User manual

HP
HP FlexFabric 5930-32QSFP+ User manual

HP
HP A5120 Series Instruction Manual

HP
HP J9079A User manual

HP
HP Aruba 4100i Installation instructions

HP
HP StorageWorks 2/8-EL - SAN Switch Instruction Manual

HP
HP StorageWorks 2/32 - SAN Switch Instruction Manual

HP
HP 1920 Gigabit Ethernet Switch Series User manual

HP
HP StorageWorks 2/16 User manual

HP
HP ProCurve 1600M Configuration guide