IBM NH2025-10 manual Virtual Networking, Deleting a VBC, Del-vbc-domain

Page 53

Configuring, Modifying, and Monitoring the Unit

Deleting a VBC

del-vbc-domain

del-vbc-domain {runnvram} <domain_id>

The domain_id parameter is the vbc id number as identified by get-vbc-tbl.

Example

SYS_telnet>del-vbc-domain run 1

Delete Runtime Virtual Broadcast Domain entry - OK Runtime VLAN mode is VBC Domain

RUNTIME VIRTUAL BROADCAST DOMAIN TABLE

===========================================

Ports

11111111 7 VBC 12345678 1 2: ----+++- -

NOTE: When you use the set-vbc-domain command with the all parameter, both the runtime and nvram databases are changed. In case you need to delete the mentioned vbc entries, you should run the del-vbc-domain command twice with run and nvram parameters.

Virtual Networking

Virtual Networking provides the capability to view user communities as a large set of disconnected, yet potentially connectable stations. This allows you to develop and apply your own criteria for grouping users within isolated work groups.

After such groups are created considering these criteria, the groups are actually implemented via hardware and software that, in effect, provide a Virtual Bridging function between all the member stations in a particular group. This collection of stations, referred to as a Virtual LAN, shares a common multicast domain. Members of different Virtual LANs can only communicate via Routers.

In the Figure, most stations are members of a particular Virtual LAN and have a particular Virtual LAN Number (VLN 2, 3, 4, etc.). Those stations not in a particular Virtual LAN are automatically members of the “Default Virtual LAN”. MAC-layer unicast and multicast traffic propagating within this virtual topology can be separated into two groups: traffic passing between stations within the same Virtual LAN, and traffic passing across Virtual LAN boundaries.

Unicast traffic moving within a Virtual LAN is propagated from its source, directly to its destination. Other stations are not exposed to this traffic (in contrast to repeated environments) unless they ultimately share physical segments with either the source or destination specified in a particular dialog. Multicast traffic is passed to all stations in the Virtual LAN, as if all stations were connected to a single multi-port switch. Traffic cannot pass between Virtual LANs without the aid of a Router. These internetworking devices must be physically connected to the network with a separate physical interface for each Virtual LAN.

45

Image 53
Contents Page Page CE Mark Standards ComplianceFCC Notice Page Contents Configuring, Modifying, and Monitoring the Unit Iii Statistics General View OverviewNetwork Management Systems ApplicationsManagement Feature SummaryPerformance/Configuration Page Installing the Unit Installing and Setting Up the UnitRack Mounting Front PanelRear Panel Installing Modules in the UnitEM2003-2FO Modules for NHEM2003-1GE Input Supply Connecting Power to the UnitEM2003-8TP Em2003-2GEGrounding Connecting Ethernet DevicesConnecting Your Network Page Logging Into the Command Line Interface Connecting to the Management PortSetting the IP Address Getting StartedAccessing the Command Line Interface Remotely Verifying the InstallationSYSconsole set-ip SYSconsole ping 192.1.1.1Command Conventions Using the Command Line InterfaceCommand Line Help Getting Command Parameter HelpSYSconsole ping 129.1.1.7 ? Getting Command Group HelpUsing Command Wildcards SYSconsoleget-co Retrieving Command HistoryConnectivity matrix Nonexistent Command Command Line ErrorsSYSconsole pin Command ‘pin’ not found Incorrect Number of ParametersConsole Commands Configuring, Modifying, and Monitoring the UnitCompletes command Help-kbdBanner LoginClear LogoutSet-passwd Sys-stat System CommandsCold-reset Warm-resetGet-stst-level Set-stst-levelSet-tftp-srvr Get-tftp-srvrSet-tftp-mode Get-tftp-modeIP Configuration IP CommandsGet-ip Get-ip-cfgSet-ip Setting an IP addressSet-ip-cfg IP broadcast SYSconsoleBootp Configuration Erasing an IP ConfigurationConfiguring a Gateway Get-arp-tbl Address Resolution Protocol ARPDel-arp-entry Add-arp-entryDisplaying the Port Configuration Port configurationGet-arp-stats Get-port-cfg dport pipe allSet-port-state Setting the port configurationSet-port-cfg Set-fctrl Setting the flow controlGet-fctrl Setting the EtherChannel Configuration Getting the EtherChannel ConfigurationEtherChannel Get-ec-tblSet Port Priority Deleting the EtherChannel Configuration del-ecPort Priority Get Port Priority Modifying the Switch PolicyVlan Priority Get-priority-port-cfgHow the STP Topology Stabilizes Spanning Tree Protocol STPSpanning Tree Parameters Selecting a Designated Switch/BridgeRoot Bridge Manually Designating a Root BridgeSpanning Tree Commands Using STP to Manage Redundant LinksTopology Change Notification Bpdu Spanning Tree and Vlan restrictionsViewing Bridge Parameters Configuring the BridgeGet-st-bcfg Max Age set-br-maxageSetting Port Configuration Viewing the Port ConfigurationHello Time set-br-hellot Get-st-pcfgSet-prt-pcost dport pathcost Set-prt-enb port-number enabledisableSet-prt-prio 4 Priority was changed for port SYSconsole Aging Configuration Switching CommandsLearning Table Get-lt-ageGet-lt-16 Get-lt-entryFind-lt-addr Adding Static Entries Deleting EntriesSetting the VBC mode Viewing the VBC ModeVirtual Broadcast Domain Creating VBC DomainsGet-vbc-matrix Viewing VBC MatrixGet-vbc-tbl Deleting a VBC Virtual NetworkingDel-vbc-domain Del-vbc-domain runnvram domainidSetting the Vlan Mode Viewing the Vlan ModeSYSconsoleset-vlan-mode run tag Set run Vlan mode tag OK Important ConsiderationsViewing the Isvlan Mode Inter-Switch Vlan or IsvlanTag Field Format Principles of IsvlanServer Port Setting a Tagged PortRemoving a Tagged Port Creating a Server PortCreating a Vlan Viewing Vlan ConfigurationRemoving a Server Port Del-vlan Deleting a VlanGet-vlan-entry Viewing the Management Tag Vlan ManagementModifying the Management Tag Deleting the Management from a VlanPhysical configuration schema VLAN, Server-port, Example of ConfigurationVlan Server Port ConfigurationApplication Creating a Vlan with Port ManagementPayroll Vlan Configuration Vlan ConfigurationFinance Vlan Configuration Checking the ConfigurationPing Commands Utilities CommandsPort mirroring PingSaving the Configuration Setting the Monitoring PortMonitoring with monitor Stopping MonitoringErasing the Nvram configuration Viewing the Nvram ConfigurationSetting the Frame Generator Frame GeneratorStopping the Frame Generation Snmp basic configurationNBase-Xyplex Snmp Support Setting the Read or Write Community Snmp Community String CommandsViewing the Community String Get-commViewing the Authentication Trap Status Setting Authentication TrapsSetting the Authentication Trap Snmp TrapsAdd-trap Configuring the Trap StationsGet-traps Example Statistics Clearing the Switch CountersGetting Collisions on a Port Clr-cntGetting the Packet Size Distribution Rmon StatisticsGetting Rmon Statistics Group for a Port Getting the Management Counters Page Trouble Shooting Mailservice@mrv.com Commands Quick Reference ARP Commands Ping CommandsEtherChannel Commands Snmp CommandsVirtual LAN Commands Switching Database CommandsPort Monitoring Port Configuration CommandsSwitching Statistics Commands Spanning Tree Commands Page Snmp System Default ValuesPage Download Procedure Server mode Appendix B Firmware Download Using TftpDownload Procedure Client Mode ∙ set-tftp-mode client Tftp Recovery Breaking into the BootROMCompatibility Appendix C Technical SpecificationsStandards Compliance

NH2025-10 specifications

The IBM NH2025-10 is a powerful and versatile network appliance designed to meet the growing demands of modern IT infrastructures. It serves as a cornerstone for businesses seeking to enhance their networking capabilities, streamline operations, and leverage advanced technologies. Built with a focus on reliability and performance, the NH2025-10 packs a wide range of features that cater to various use cases, from data centers to enterprise environments.

At the heart of the NH2025-10 is its robust hardware architecture, which integrates high-speed processors and ample memory resources. This combination ensures that the device can handle significant data throughput, making it an ideal solution for organizations that require fast and efficient data processing. Its state-of-the-art virtualization capabilities enable multi-tenancy, allowing organizations to run multiple applications and services seamlessly.

One standout feature of the NH2025-10 is its advanced security framework. It incorporates tools for threat detection and mitigation, firewall protection, and secure access controls. These features work in tandem to provide a fortified network environment, critical for safeguarding sensitive data. With an intuitive user interface, administrators can easily configure and manage security policies, ensuring compliance with industry regulations.

The NH2025-10 also supports cutting-edge networking technologies, including Software-Defined Networking (SDN) and Network Function Virtualization (NFV). These technologies enhance flexibility and scalability, allowing businesses to adapt their networks as requirements evolve without substantial hardware upgrades. The integration of machine learning algorithms further optimizes network performance, offering predictive analytics that can preemptively address potential issues.

In terms of connectivity, the device is equipped with multiple ports, including 10 Gigabit Ethernet and support for various media types, ensuring compatibility with existing infrastructure. This flexibility makes integration straightforward, allowing organizations to derive maximum value from their investments while minimizing disruption to ongoing operations.

Moreover, the NH2025-10 is designed with energy efficiency in mind. Its innovative thermal management ensures optimal performance with reduced power consumption, aiding organizations in their sustainability efforts.

Overall, the IBM NH2025-10 stands as a comprehensive solution for entities looking to elevate their networking strategies. Its combination of advanced features, security protocols, and adaptive technologies positions it as a vital asset in today's increasingly digital landscape.