Blade ICE G8124-E manual STP/PVST+ Mode, Port States, Ports, Trunk Groups, and VLANs

Page 111

BLADEOS 6.5.2 Application Guide

STP/PVST+ Mode

Using STP, network devices detect and eliminate logical loops in a bridged or switched network. When multiple paths exist, Spanning Tree configures the network so that a switch uses only the most efficient path. If that path fails, Spanning Tree automatically sets up another active path on the network to sustain network operations.

BLADEOS STP/PVST+ mode implements IEEE 802.1D (1998) Spanning Tree Protocol (STP) with enhancements that allow each VLAN to be assigned to one of 127 available STGs. STP/PVST+ uses IEEE 802.1Q for tagging STP data on a per-VLAN basis, and is compatible with Cisco PVST+ mode. For Cisco R-PVST/R-PVST+ compatibility, see “Per-VLAN Rapid Spanning Tree Groups” on page 126).

The relationship between ports, trunk groups, VLANs, and Spanning Trees is shown in Table 11.

Table 11 Ports, Trunk Groups, and VLANs

Switch Element

Belongs To

 

 

Port

Trunk group,

 

or one or more VLANs

 

 

Trunk group

One or more VLANs

 

 

VLAN (non-default)

One VLAN per STG,

 

or in enhanced modes:

 

￿ RSTP: All VLANs are in STG 1

 

￿ PVRST: One VLAN per STG

 

￿ MSTP: Multiple VLANs per STG

 

 

Port States

STP/PVRST+ mode employs a sequence of port states in the process: Listening, Learning, and Forwarding or Blocking. This process can result in inherent delays for resolving network paths.

To mitigate delays, you can use Port Fast Forwarding (see “Port Fast Forwarding” on page 114) to permit a port that participates in STP/PVST+ to bypass the Listening and Learning states and enter directly into the Forwarding state. While in the Forwarding state, the port listens to the BPDUs to learn if there is a loop and, if dictated by normal STG behavior (following priorities, and so on), the port transitions into the Blocking state.

This feature permits the G8124 to interoperate well within Rapid Spanning Tree networks.

BMD00220, October 2010

Chapter 8: Spanning Tree Protocols ￿ 111

Image 111
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide Preface Who Should Use This GuideWhat You’ll Find in This Guide Part 2 Securing the Switch Part 5 IP Routing Part 8 Monitoring Additional ReferencesTypographic Conventions Typographic ConventionsAaBbCc123 How to Get Help Part 1 Getting Started Part 1 Getting Started Administration Interfaces Switch AdministrationBrowser-Based Interface Command Line InterfaceUsing the Switch Management Ports RS G8124# configure terminalEstablishing a Connection Exit EnableConfigure the default gateway. If using IPv4 Using the Switch Data PortsConfigure the management IP interface/mask. Using IPv4 Configure the VLAN, and enable the interfaceRS G8124config# no access telnet enable Using TelnetUsing SSH to Access the Switch Using Secure ShellRS G8124config# access https enable Using a Web BrowserG8124config# access http enable G8124config# no access http enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Domain-Specific Bootp Relay Agent Configuration Global Bootp Relay Agent ConfigurationUser Access Levels Switch Login LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Information Needed for Setup Initial SetupRestarting Setup Default Setup OptionsStopping and Restarting Setup Manually Stopping SetupSetup Part 1 Basic System Configuration When Setup is started, the system promptsEnter the hour of the current system time at the prompt Setup Part 2 Port Configuration Enter the minute of the current time at the promptTurn Spanning Tree Protocol on or off at the prompt Enter new Vlan tag support d/e System prompts you to configure the next Vlan Setup Part 3 VLANsSetup Part 4 IP Configuration To keep the current setting, press EnterIP Interfaces System prompts you to configure another interface Default Gateways System prompts you to configure another default gatewayIP Routing When prompted, decide whether to restart Setup or continue Setup Part 5 Final StepsOptional Setup for Telnet Support Apply and save the configurations# /cfg/sys/access/tnet Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Secure Shell and Secure Copy Securing AdministrationConfiguring SSH/SCP Features on the Switch To Enable or Disable the SSH FeatureTo Enable or Disable SCP Apply and Save To Copy the Switch Configuration File to the SCP Host Configuring the SCP Administrator PasswordUsing SSH and SCP Client Commands To Log In to the SwitchTo Load a Switch Configuration File from the SCP Host To Apply and Save the ConfigurationScp ad4.cfg scpadmin@205.178.15.157putcfg Encryption To Copy the Switch Image and Boot Files to the SCP HostTo Load Switch Configuration Files from the SCP Host SSH and SCP Encryption of Management MessagesSSH/SCP Integration with Radius Authentication Generating RSA Host and Server Keys for SSH AccessSecurID Support SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SSH Using SecurID with SCPEnd User Access Control Considerations for Configuring End User AccountsStrong Passwords Validating a User’s Configuration User Access ControlSetting up User IDs Defining a User’s Access LevelRS G8124# show access User Listing Current UsersLogging into an End User Account Radius Authentication and Authorization Authentication & Authorization ProtocolsRS G8124config# radius-server port UDP port number How Radius Authentication WorksConfiguring Radius on the Switch Configure the Radius secretRS G8124# show radius-server Radius Authentication Features in BladeosSwitch User Accounts Radius Attributes for Bladeos User PrivilegesBLADEOS-proprietary Attributes for Radius How TACACS+ Authentication Works TACACS+ AuthenticationTACACS+ Authentication Features in Bladeos Default TACACS+ Authorization LevelsAlternate TACACS+ Authorization Levels Accounting Command Authorization and LoggingConfiguring TACACS+ Authentication on the Switch Configure the TACACS+ secret and second secretRS G8124config# tacacs-server port TCP port number Configuring the Ldap Server Ldap Authentication and Authorization# ldap-server port Configuring Ldap Authentication on the SwitchConfigure the domain name # ldap-server retransmit # ldap-server timeoutAccess Control Lists RS G8124config# access-control list Regular ACL number ?RS G8124config# access-control list6 IPv6 ACL number ? Summary of Packet Classifiers Well-Known Protocol TypesIcmp Igmp Tcp Udp Well-Known TCP flag values Well-Known Application PortsSummary of ACL Actions Assigning Individual ACLs to a PortACL Order of Precedence ACL Metering and Re-Marking MeteringRe-Marking ACL Port Mirroring RS G8124config# access-control list ACL number mirror portRS G8124config# access-control vmap VMap number mirror port RS G8124config# access-control list ACL number statisticsAdd ACL 2 to port EXT2 ACL Configuration ExamplesACL Example Add ACL 1 to port EXT1Vlan Maps RS G8124config-if#access-control list6RS G8124config# access-control vmap Vmap ID ? Non-serverportsServerportsnon-serverports Broadcast Storms Using Storm Control FiltersConfiguring Storm Control RS G8124config-if#dest-lookup-threshold packet ratePart 3 Switch Basics Part 3 Switch Basics VLANs VLANs Overview VLANs and Port Vlan ID NumbersVlan Numbers Use the following command to set the port Pvid Pvid NumbersRS G8124# show interface information Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs with VLAN-Tagged Gigabit Adapters Multiple VLANs with Tagging AdaptersMultiple VLANs Example Features of this Vlan are described belowVlan Configuration Example Enable tagging on uplink ports that support multiple VLANsConfigure the VLANs and their member ports Private Vlan Ports Private VLANsVerify the configuration Configuration GuidelinesConfiguration Example Configure a secondary Vlan and map it to the primary VlanBladeos 6.5.2 Application Guide Ports and Trunking Port Trunk Group Trunking OverviewBefore You Configure Static Trunks Trunk Group Configuration Rules Example below, three ports are trunked between two switchesPort Trunking Example # show portchannel information Follow these steps on the G8124 a. Define a trunk groupLayer 3 IPv4/IPv6 source IP address Configurable Trunk Hash AlgorithmLayer 2 destination MAC address Layer 2 source and destination MAC addressLink Aggregation Control Protocol Actor vs. Partner Lacp configurationConfiguring Lacp Set the Lacp modeRS G8124 # show lacp information Spanning Tree Protocol Modes Spanning Tree ProtocolsGlobal STP Control Depending on your preferred STG configurationsRS G8124config# spanning-tree mode disable RS G8124config# spanning-tree mode pvstrstppvrstmstSTP/PVST+ Mode Port StatesPorts, Trunk Groups, and VLANs RS G8124config# spanning-tree stp x bridge priority Bridge Protocol Data UnitsBridge Priority Fast Uplink Convergence Port PriorityPort Path Cost Port Fast Forwarding Fast Uplink Configuration GuidelinesConfiguring Fast Uplink Convergence RS G8124config# spanning-tree uplinkfastSimple STP Configuration SwitchBlocks Link Server RS G8124config-if#spanning-tree stp 1 path-cost Restores Link ServerPer-VLAN Spanning Tree Groups Using Multiple Instances of Spanning Tree GroupSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration Configuring Multiple STGs RS G8124config# spanning-tree stp 2 vlan 2,3RS G8124config# spanning-tree stp 2 vlan RS G8124config# spanning-tree stp 2 vlan Rapid Spanning Tree Protocol Port State ChangesRstp vs. STP Port states RS G8124config# spanning-tree mode rstp Rstp Configuration GuidelinesRstp Configuration Example Configure STP Group 1 parametersConfiguring Pvrst RS G8124config# spanning-tree mode pvrstPer-VLAN Rapid Spanning Tree Groups Multiple Spanning Tree Protocol Mstp RegionCommon Internal Spanning Tree Mstp Configuration Guidelines Mstp Configuration ExampleAssign VLANs to Spanning Tree Groups Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Link Type RS G8124config-if# no spanning-tree link-type typePort Type and Link Type Edge PortBladeos 6.5.2 Application Guide QoS Overview Quality of ServiceQoS Model Shows the basic QoS model used by the switchSummary of ACL Actions Using ACL FiltersACL Metering and Re-Marking Differentiated Services Concepts Using Dscp Values to Provide QoSPer Hop Behavior HighestLowest Network Control Default QoS Service LevelsQoS Levels CriticalRS G8124config# qos dscp re-marking Dscp Re-Marking and MappingRS G8124# show qos dscp Dscp Re-Marking Configuration Example Enable Dscp re-marking on a portRS G8124config-if#qos dscp dscp-remarking Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Available Profiles Deployment ProfilesDeployment Mode Comparison Selecting Profiles Automatic Configuration ChangesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtualizing the NIC for Multiple Virtual Pipes on Each Link Virtual NICsDefining Server Ports Enabling the vNIC FeatureVNIC ID Correlation VNIC IDs on the SwitchVNIC IDs VNIC Interface Names on the ServerVNIC Bandwidth Metering Outer and Inner Vlan Tags VNIC GroupsBladeos 6.5.2 Application Guide To Backup Disables associated server portsVNIC Teaming Failover For failover on affected VNICs only Upon Port 1 link failure, the switch To BackupConsider the following example configuration VNIC Configuration ExampleConfigure the external trunk to be used with vNIC group Enable the vNIC feature on the switchDefine the server ports Add ports, trunks, and virtual pipes to their vNIC groups VNICs for iSCSI on Emulex Eraptor RS G8124config# vnic port 1 indexRS G8124config# vnic port 2 index RS G8124config# vnic port 3 indexVMready VM Group Types VE CapacityLocal VM Groups Configuring a Local VM GroupRS G8124config# no virt vmgroup VM group number ? RS G8124config# virt vmprofile edit profile name ? Distributed VM GroupsVM Profiles RS G8124config# no virt vmgroup VM group number profile Initializing a Distributed VM GroupAssigning Members Removing Member VEs Synchronizing the ConfigurationAssigning a vCenter Virtualization Management ServersG8124# virt vmware scan RS G8124config# no virt vmware vcspecVCenter Scans Deleting the vCenterVMware Operational Commands Exporting ProfilesVirt vmware ? Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode VM Policy Bandwidth Control Commands RS G8124config# virt vmpolicy vmbwidth VM MACindexUUIDVM Policy Bandwidth Control Bandwidth Policies vs. Bandwidth Shaping VMready Information Displays Local VE InformationRS G8124# show virt vm G8124# show virt vm RS G8124# show virt vmware hosts VCenter Hypervisor HostsVCenter VEs VCenter VE DetailsRS G8124# show virt vmware vms VMready Configuration Example Enable the VMready featureSpecify the VMware vCenter IPv4 address Define the VM group Bladeos 6.5.2 Application Guide Fibre Channel over Ethernet on FCoE and CEEEnhanced Transmission Selection on FCoE Topology Fibre Channel over EthernetBladeos 6.5.2 Application Guide FCoE Requirements Converged Enhanced Ethernet Turning CEE On or OffEffects on Link Layer Discovery Protocol Effects on 802.1p Quality of Service CEE Effects on 802.1p DefaultsDefault ETS Bandwidth Allocation Effects on Flow Control Global FIP Snooping Settings FCoE Initialization Protocol SnoopingFIP Snooping for Specific Ports Port FCF and ENode Detection FCoE Connection TimeoutRS G8124config# fcoe fips port ports fcf-mode autoonoff RS G8124config# no fcoe fips timeout-aclFCoE VLANs FCoE ACL RulesOperational Commands Viewing FIP Snooping InformationFor example RS G8124config# fcoe fips port 3 fcf-mode off FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 enable RS G8124config# fcoe fips port 2 fcf-mode onPriority-Based Flow Control Global Configuration Port-Based PFC Configuration PFC Configuration ExampleG8124config# Cee global Pfc Priority Description FCoE Enable PFC for the FCoE trafficEnable PFC for the business-critical LAN application G8124config# Cee global Pfc Priority Enable802.1p Priority Values Enhanced Transmission SelectionPgid Pgid Priority GroupsAssigning Priority Values to a Priority Group Unlimited Bandwidth for Pgid Allocated Bandwidth for Pgid 0 ThroughETS Configuration Configuring ETSRS G8124config# cee global ets bandwidth 3 RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets priority-group 3 prioritiesData Center Bridging Capability Exchange Dcbx SettingsEnabling and Disabling Dcbx Peer Configuration NegotiationPFC Willing flag is set or reset using the following commandConfiguring Dcbx Enable desired Dcbx configuration negotiation on FCoE portsEnable desired Dcbx advertisements on other CEE ports RS G8124config# no cee port 5-24 dcbx enable Disable Dcbx for each non-CEE port as appropriateBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing Basic IP Routing IP Routing BenefitsRouting Between IP Subnets Router Legacy Network For example, consider the following topology migrationExample of Subnet Routing Switch-Based Routing TopologyUsing VLANs to Segregate Broadcast Domains Subnet Routing Example IP Address AssignmentsSubnet Routing Example IP Interface Assignments Add ports to Vlan Subnet Routing Example Optional Vlan PortsEnable IP routing Ecmp Static Routes Ospf IntegrationEcmp Route Hashing Configuring Ecmp Static Routes RS G8124config# show ip route staticSelect an Ecmp hashing method optional Dhcp Relay Agent Dynamic Host Configuration ProtocolBladeos 6.5.2 Application Guide RFC RFC 4293 RFC 3411, 3412, 3413 Internet Protocol VersionIPv6 Limitations IPv6 Address Format Example IPv6 addressAddress can be compressed as follows IPv6 Address Types Unicast AddressMulticast Anycast IPv6 Address AutoconfigurationSecond IPv6 address can be a unicast or anycast address IPv6 InterfacesNeighbor Discovery Overview Neighbor DiscoveryG8124 supports up to 1156 IPv6 routes Host vs. RouterHTTP/HTTPS servers support both IPv4 and IPv6 connections Supported ApplicationsSSH RS G8124config# ip dns ipv6 request-version ipv4ipv6Configuration Guidelines IPv6 Example IPv6 Configuration ExamplesThis section provides steps to configure IPv6 on the switch Configure the IPv6 default gatewayRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Routing Information Protocol Distance Vector ProtocolStability Routing Updates RIPv1RIPv2 Poison RIPv2 in RIPv1 Compatibility ModeRIP Features Triggered UpdatesDefault AuthenticationMetric Add IP interfaces with IPv4 addresses to VLANs RIP Configuration ExampleTurn on RIP globally and enable RIP for each interface Add VLANs for routing interfaces# show ip rip # show ip routeInternet Group Management Protocol Igmp Snooping Igmp Groups FastLeaveIGMPv3 Snooping RS G8124config# no ip igmp snoop igmpv3 View dynamic Igmp information Igmp Snooping Configuration ExampleEnable IGMPv3 Snooping optional Enable the Igmp featureConfigure a Static Multicast Router RS G8124config# ip igmp mrouter 5 1Static Multicast Router Enable Igmp Querier on the Vlan Configure the querier election type and define the addressIgmp Querier Configuring the Range Configuring the ActionIgmp Filtering Assign the Igmp filter to a port Configure Igmp FilteringEnable Igmp Filtering on the switch Define an Igmp filter with IPv4 informationBladeos 6.5.2 Application Guide Border Gateway Protocol IBGP and eBGP Internal Routing Versus External RoutingForming BGP Peer Routers What is a Route Map?Incoming and Outgoing Route Maps Distributing Network Filters in Access Lists and Route MapsConfiguration Overview RS G8124config# ip match-address 1 enablePrecedence Enable the route map Exit Router BGP modeTurn BGP on Redistributing Routes Aggregating RoutesBGP Attributes Local Preference AttributeMetric Multi-Exit Discriminator Attribute Selecting Route Paths in BGP BGP Failover Configuration Example BGP Failover Configuration# ip routing Configure BGP peer router 1 and 2 with IPv4 addressesDefault Redistribution and Route Aggregation Example # router bgp# ip router-id Configure redistribution for Peer Bladeos 6.5.2 Application Guide OSPFv2 Overview OspfOspf Area Types Types of Ospf AreasOspf Domain and an Autonomous System Types of Ospf Routing DevicesLink-State Database Neighbors and AdjacenciesInternal Versus External Routing Shortest Path First TreeOSPFv2 Implementation in Bladeos Configurable ParametersDefining Areas Area index set to an arbitrary valueArea Area-id Using the Area ID to Assign the Ospf Area Number Electing the Designated Router and Backup Interface CostSummarizing Routes Injecting Default Routes Default RoutesVirtual Links Router IDNeighbor-router router ID Ospf Authentication AuthenticationEnable Ospf authentication for Area 2 on switch Configuring Plain Text Ospf PasswordsAssign MD5 key ID to Ospf virtual link on switches 2 Configure MD5 key ID for Area 0 on switches 1, 2,Assign MD5 key ID to Ospf interfaces on switches 1, 2, Enable Ospf MD5 authentication for Area 2 on switchHost Routes for Load Balancing Ospf Features Not Supported in This ReleaseOSPFv2 Configuration Examples Example 1 Simple Ospf Domain Enable OspfDefine the stub area Attach the network interface to the backboneAttach the network interface to the stub area Configuring Ospf for a Virtual Link on Switch #1 RS G8124config# ip router-idExample 2 Virtual Links Attach the network interface to the transit area Define the backboneDefine the transit area Configuring Ospf for a Virtual Link on Switch #2Other Virtual Link Options Summarizing Routes Example 3 Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 RS G8124config-router-ospf#area-range 2 address 36.128.200.0 Verifying Ospf ConfigurationOSPFv3 Differences from OSPFv2 OSPFv3 Implementation in Bladeos# /stats/l3/ospf3 Iscli# /cfg/l3/ospf3 # /info/l3/ospf3RS G8124config-ip-if#ip address OSPFv3 Configuration ExampleBlade Switch RS G8124config-ip-if#ipv6 addressEnable OSPFv3 RS G8124config-router-ospf#area-range 2 address 360000000 RS G8124config-router-ospf3#area-range 1 address 360000000PIM Overview Protocol Independent MulticastSupported PIM Modes and Features Globally Enabling or Disabling the PIM Feature Basic PIM SettingsDefining an IP Interface for PIM Use Defining a PIM Network ComponentPIM Neighbor Filters Specifying the Rendezvous Point Additional Sparse Mode SettingsInfluencing the Designated Router Selection Specifying a Bootstrap RouterPIM with Igmp Using PIM with Other FeaturesUsing the CLI PIM with ACLs or VMAPsRS G8124config-ip-if#ip pim cbsr-preference PIM Configuration ExamplesSet the Bootstrap Router BSR preference RS G8124config-ip-if#ip address 10.10.1.1255.255.0.0 RS G8124config# ip pim static-rp enableExample 2 PIM-SM with Static RP Example 3 PIM-DMConfigure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals For more information on trunking, see Ports and Trunking on Basic RedundancyTrunking for Link Redundancy InternetPreemption Forward DelayFDB Update Hot LinksUse the following commands to configure Hot Links Configuring Hot LinksAMP Topology Active MultiPath ProtocolFDB Flush Health ChecksConfiguring an Aggregator Switch Define the AMP group links, and enable the AMP groupTurn AMP on, and define the aggregator Turn AMP on Configuring an Access Switch# active-multipath enable Verifying AMP OperationBladeos 6.5.2 Application Guide Monitoring Trunk Links Layer 2 FailoverBasic Layer 2 Failover Setting the Failover LimitManually Monitoring Port Links Monitor Port StateControl Port State Spanning Tree Protocol L2 Failover with Other Features# failover trigger 1 mmon control member Configuring Layer 2 FailoverConfigure general Failover parameters # failover trigger 1 mmon monitor memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Virtual Router MAC Address Vrrp OverviewVrrp Components Virtual RouterMaster and Backup Virtual Router Vrrp OperationVirtual Interface Router Selecting the Master Vrrp Router Failover MethodsVirtual Router Group Active-Active RedundancyVrrp Tracking Parameters Bladeos Extensions to VrrpAssigning Vrrp Virtual Router ID Configuring the Switch for TrackingRS G8124config-vrrp#virtual-router 1 virtual-router-id Virtual Router Deployment ConsiderationsActive-Active High-Availability Configuration High Availability ConfigurationsTask 1 Configure G8124 Configure client and server interfacesTurn on Vrrp and configure two Virtual Interface Routers Turn off Spanning Tree Protocol globally Configure portsTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Lldp Overview Link Layer Discovery ProtocolGlobal Lldp Setting Enabling or Disabling LldpTransmit and Receive Control Scheduled Interval Lldp Transmit FeaturesRS G8124config# lldp refresh-interval interval RS G8124config# lldp transmission-delay intervalTrap Notifications RS G8124config# lldp holdtime-multiplier multiplierRS G8124config# lldp trap-notification-interval interval Time-to-Live for Transmitted InformationTypes of Information Transmitted Changing the Lldp Transmit StateLldp Optional Information Types Viewing Remote Device Information Lldp Receive FeaturesRS G8124config# show lldp remote-device index number Types of Information ReceivedTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Snmp Version Simple Network Management ProtocolRS G8124config# snmp-server user 1-16authentication-protocol Default ConfigurationUser Configuration Example SNMPv1 Trap Host Configuring Snmp Trap HostsConfigure a user with no authentication and password Configure an entry in the notify tableSNMPv2 Trap Host Configuration Re-enter new authentication password SNMPv3 Trap Host ConfigurationEnter current admin password Enter new authentication passwordBladeos Snmp agent supports the following standard MIBs Snmp MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that there was a STG topology change An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is active Signifies that the Backup interface is not activeMIBs for Switch Image and Configuration Files Switch Images and Configuration FilesLoading a Saved Switch Configuration Loading a New Switch ImageInitiate the transfer. To save a dump file, enter Saving the Switch ConfigurationSaving a Switch Dump Set the name of dump filePart 8 Monitoring Part 8 Monitoring Rmon Overview Remote MonitoringRmon Group 1-Statistics Example ConfigurationEnable Rmon on a port RS G8124config-if# show interface port 1 rmon-countersRmon Group 2-History History MIB Object IDLast digit x represents the number of the port to monitor Configuring Rmon History Configure the Rmon History parameters for a portView Rmon history for the port Configure the Rmon Alarm parameters to track Icmp messages Rmon Group 3-AlarmsAlarm MIB objects Configuring Rmon AlarmsRmon Group 9-Events SFLOW SFlow Statistical CountersSFlow Network Sampling G8124config# Sflow Enable SFlow Example ConfigurationRS G8124config# sflow Server G8124config# SflowMirroring Ports Port MirroringRS G8124config# port-mirroring enable Configuring Port MirroringEnable port mirroring View the current configurationPart 9 Appendices Part 9 Appendices Glossary Network. For a more detailed description, refer to RFC Two or more virtual routersWhom to share 224.0.0.18Index 199 Default password214 209310 355142 76, 249 toExamples 311 to Dense Mode 304, 306138 303 to332 15425, 35, 278 Uplink ports 154 User accountTagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.