Blade ICE G8124-E manual Selecting Profiles, Automatic Configuration Changes

Page 149

BLADEOS 6.5.2 Application Guide

Selecting Profiles

To change the deployment profile, the new profile must first be selected, and the switch must then be rebooted to use the new profile.

Note – Before changing profiles, it is recommended that you save the active switch configuration to a backup file so that it may be restored later if desired.

The following ISCLI commands are used to change the deployment profile:

RS G8124(config)# boot profile {defaultrouting} (Select deployment profile)

RS

G8124(config)# exit

(To privileged EXEC mode)

RS

G8124# reload

(Reboot the switch)

To view the currently selected deployment profile, use the following ISCLI privileged EXEC command:

RS G8124# show boot

Note – When using a specialized profile, menus and commands are unavailable for features that are not supported under the profile. Such menus and commands will be available again only when a supporting profile is used.

Automatic Configuration Changes

BLADEOS 6.5 configuration blocks and backup files generated under a specific deployment profile are generally compatible among all other deployment profiles. However, if commands or capacities configured under a prior profile are not available using the current profile, the switch will ignore the unsupported commands. Mutually supported commands will be processed normally between profiles.

All configuration commands from the prior profile are initially retained when changing profiles, even though some may be ignored when the switch starts with new profile. This allows the administrator to change back to the prior deployment profile with the prior configuration intact if desired. However, once the administrator saves the configuration under the new profile, all unsupported commands are immediately cleared. For example, when using the Routing profile, because ACLs are unsupported in that mode, their settings will be excluded when the configuration is saved. Then, if returning to the Default profile, it will be necessary to reconfigure the desired ACLs, or to use the backup configuration.

BMD00220, October 2010

Chapter 10: Deployment Profiles ￿ 149

Image 149
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide What You’ll Find in This Guide PrefaceWho Should Use This Guide Part 2 Securing the Switch Part 5 IP Routing Part 8 Monitoring Additional ReferencesAaBbCc123 Typographic ConventionsTypographic Conventions How to Get Help Part 1 Getting Started Part 1 Getting Started Administration Interfaces Switch AdministrationBrowser-Based Interface Command Line InterfaceEstablishing a Connection Using the Switch Management PortsRS G8124# configure terminal Exit EnableConfigure the management IP interface/mask. Using IPv4 Using the Switch Data PortsConfigure the VLAN, and enable the interface Configure the default gateway. If using IPv4RS G8124config# no access telnet enable Using TelnetUsing SSH to Access the Switch Using Secure ShellG8124config# access http enable Using a Web BrowserG8124config# no access http enable RS G8124config# access https enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Domain-Specific Bootp Relay Agent Configuration Global Bootp Relay Agent ConfigurationUser Access Levels Switch Login LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Information Needed for Setup Initial SetupStopping and Restarting Setup Manually Default Setup OptionsStopping Setup Restarting SetupEnter the hour of the current system time at the prompt Setup Part 1 Basic System ConfigurationWhen Setup is started, the system prompts Turn Spanning Tree Protocol on or off at the prompt Setup Part 2 Port ConfigurationEnter the minute of the current time at the prompt Enter new Vlan tag support d/e System prompts you to configure the next Vlan Setup Part 3 VLANsIP Interfaces Setup Part 4 IP ConfigurationTo keep the current setting, press Enter System prompts you to configure another interface IP Routing Default GatewaysSystem prompts you to configure another default gateway When prompted, decide whether to restart Setup or continue Setup Part 5 Final Steps# /cfg/sys/access/tnet Optional Setup for Telnet SupportApply and save the configurations Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Secure Shell and Secure Copy Securing AdministrationTo Enable or Disable SCP Apply and Save Configuring SSH/SCP Features on the SwitchTo Enable or Disable the SSH Feature Using SSH and SCP Client Commands Configuring the SCP Administrator PasswordTo Log In to the Switch To Copy the Switch Configuration File to the SCP HostScp ad4.cfg scpadmin@205.178.15.157putcfg To Load a Switch Configuration File from the SCP HostTo Apply and Save the Configuration To Load Switch Configuration Files from the SCP Host To Copy the Switch Image and Boot Files to the SCP HostSSH and SCP Encryption of Management Messages EncryptionSSH/SCP Integration with Radius Authentication Generating RSA Host and Server Keys for SSH AccessUsing SecurID with SSH SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SCP SecurID SupportStrong Passwords End User Access ControlConsiderations for Configuring End User Accounts Setting up User IDs User Access ControlDefining a User’s Access Level Validating a User’s ConfigurationLogging into an End User Account RS G8124# show access UserListing Current Users Radius Authentication and Authorization Authentication & Authorization ProtocolsConfiguring Radius on the Switch How Radius Authentication WorksConfigure the Radius secret RS G8124config# radius-server port UDP port numberRS G8124# show radius-server Radius Authentication Features in BladeosBLADEOS-proprietary Attributes for Radius Switch User AccountsRadius Attributes for Bladeos User Privileges How TACACS+ Authentication Works TACACS+ AuthenticationAlternate TACACS+ Authorization Levels TACACS+ Authentication Features in BladeosDefault TACACS+ Authorization Levels Accounting Command Authorization and LoggingRS G8124config# tacacs-server port TCP port number Configuring TACACS+ Authentication on the SwitchConfigure the TACACS+ secret and second secret Configuring the Ldap Server Ldap Authentication and AuthorizationConfigure the domain name Configuring Ldap Authentication on the Switch# ldap-server retransmit # ldap-server timeout # ldap-server portRS G8124config# access-control list6 IPv6 ACL number ? Access Control ListsRS G8124config# access-control list Regular ACL number ? Icmp Igmp Tcp Udp Summary of Packet ClassifiersWell-Known Protocol Types Well-Known TCP flag values Well-Known Application PortsACL Order of Precedence Summary of ACL ActionsAssigning Individual ACLs to a Port Re-Marking ACL Metering and Re-MarkingMetering RS G8124config# access-control vmap VMap number mirror port RS G8124config# access-control list ACL number mirror portRS G8124config# access-control list ACL number statistics ACL Port MirroringACL Example ACL Configuration ExamplesAdd ACL 1 to port EXT1 Add ACL 2 to port EXT2Vlan Maps RS G8124config-if#access-control list6Serverportsnon-serverports RS G8124config# access-control vmap Vmap ID ?Non-serverports Configuring Storm Control Using Storm Control FiltersRS G8124config-if#dest-lookup-threshold packet rate Broadcast StormsPart 3 Switch Basics Part 3 Switch Basics VLANs Vlan Numbers VLANs OverviewVLANs and Port Vlan ID Numbers RS G8124# show interface information Use the following command to set the port PvidPvid Numbers Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs with VLAN-Tagged Gigabit Adapters Multiple VLANs with Tagging AdaptersMultiple VLANs Example Features of this Vlan are described belowConfigure the VLANs and their member ports Vlan Configuration ExampleEnable tagging on uplink ports that support multiple VLANs Private Vlan Ports Private VLANsConfiguration Example Configuration GuidelinesConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationBladeos 6.5.2 Application Guide Ports and Trunking Port Trunk Group Trunking OverviewBefore You Configure Static Trunks Port Trunking Example Trunk Group Configuration RulesExample below, three ports are trunked between two switches # show portchannel information Follow these steps on the G8124 a. Define a trunk groupLayer 2 destination MAC address Configurable Trunk Hash AlgorithmLayer 2 source and destination MAC address Layer 3 IPv4/IPv6 source IP addressLink Aggregation Control Protocol Actor vs. Partner Lacp configurationRS G8124 # show lacp information Configuring LacpSet the Lacp mode Spanning Tree Protocol Modes Spanning Tree ProtocolsRS G8124config# spanning-tree mode disable Depending on your preferred STG configurationsRS G8124config# spanning-tree mode pvstrstppvrstmst Global STP ControlPorts, Trunk Groups, and VLANs STP/PVST+ ModePort States Bridge Priority RS G8124config# spanning-tree stp x bridge priorityBridge Protocol Data Units Port Path Cost Fast Uplink ConvergencePort Priority Configuring Fast Uplink Convergence Fast Uplink Configuration GuidelinesRS G8124config# spanning-tree uplinkfast Port Fast ForwardingBlocks Link Server Simple STP ConfigurationSwitch RS G8124config-if#spanning-tree stp 1 path-cost Restores Link ServerPer-VLAN Spanning Tree Groups Using Multiple Instances of Spanning Tree GroupSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration RS G8124config# spanning-tree stp 2 vlan Configuring Multiple STGsRS G8124config# spanning-tree stp 2 vlan 2,3 RS G8124config# spanning-tree stp 2 vlan Rstp vs. STP Port states Rapid Spanning Tree ProtocolPort State Changes Rstp Configuration Example Rstp Configuration GuidelinesConfigure STP Group 1 parameters RS G8124config# spanning-tree mode rstpPer-VLAN Rapid Spanning Tree Groups Configuring PvrstRS G8124config# spanning-tree mode pvrst Common Internal Spanning Tree Multiple Spanning Tree ProtocolMstp Region Assign VLANs to Spanning Tree Groups Mstp Configuration GuidelinesMstp Configuration Example Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Port Type and Link Type RS G8124config-if# no spanning-tree link-type typeEdge Port Link TypeBladeos 6.5.2 Application Guide QoS Overview Quality of ServiceQoS Model Shows the basic QoS model used by the switchSummary of ACL Actions Using ACL FiltersACL Metering and Re-Marking Differentiated Services Concepts Using Dscp Values to Provide QoSLowest Per Hop BehaviorHighest QoS Levels Default QoS Service LevelsCritical Network ControlRS G8124# show qos dscp RS G8124config# qos dscp re-markingDscp Re-Marking and Mapping RS G8124config-if#qos dscp dscp-remarking Dscp Re-Marking Configuration ExampleEnable Dscp re-marking on a port Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Available Profiles Deployment ProfilesDeployment Mode Comparison Selecting Profiles Automatic Configuration ChangesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtualizing the NIC for Multiple Virtual Pipes on Each Link Virtual NICsDefining Server Ports Enabling the vNIC FeatureVNIC IDs VNIC IDs on the SwitchVNIC Interface Names on the Server VNIC ID CorrelationVNIC Bandwidth Metering Outer and Inner Vlan Tags VNIC GroupsBladeos 6.5.2 Application Guide VNIC Teaming Failover To BackupDisables associated server ports For failover on affected VNICs only Upon Port 1 link failure, the switch To BackupConsider the following example configuration VNIC Configuration ExampleDefine the server ports Configure the external trunk to be used with vNIC groupEnable the vNIC feature on the switch Add ports, trunks, and virtual pipes to their vNIC groups RS G8124config# vnic port 2 index RS G8124config# vnic port 1 indexRS G8124config# vnic port 3 index VNICs for iSCSI on Emulex EraptorVMready VM Group Types VE CapacityLocal VM Groups Configuring a Local VM GroupRS G8124config# no virt vmgroup VM group number ? VM Profiles RS G8124config# virt vmprofile edit profile name ?Distributed VM Groups Assigning Members RS G8124config# no virt vmgroup VM group number profileInitializing a Distributed VM Group Removing Member VEs Synchronizing the ConfigurationAssigning a vCenter Virtualization Management ServersVCenter Scans RS G8124config# no virt vmware vcspecDeleting the vCenter G8124# virt vmware scanVirt vmware ? VMware Operational CommandsExporting Profiles Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode VM Policy Bandwidth Control VM Policy Bandwidth Control CommandsRS G8124config# virt vmpolicy vmbwidth VM MACindexUUID Bandwidth Policies vs. Bandwidth Shaping RS G8124# show virt vm VMready Information DisplaysLocal VE Information G8124# show virt vm RS G8124# show virt vmware hosts VCenter Hypervisor HostsRS G8124# show virt vmware vms VCenter VEsVCenter VE Details Specify the VMware vCenter IPv4 address VMready Configuration ExampleEnable the VMready feature Define the VM group Bladeos 6.5.2 Application Guide Fibre Channel over Ethernet on FCoE and CEEEnhanced Transmission Selection on FCoE Topology Fibre Channel over EthernetBladeos 6.5.2 Application Guide FCoE Requirements Effects on Link Layer Discovery Protocol Converged Enhanced EthernetTurning CEE On or Off Default ETS Bandwidth Allocation Effects on 802.1p Quality of ServiceCEE Effects on 802.1p Defaults Effects on Flow Control FIP Snooping for Specific Ports Global FIP Snooping SettingsFCoE Initialization Protocol Snooping RS G8124config# fcoe fips port ports fcf-mode autoonoff FCoE Connection TimeoutRS G8124config# no fcoe fips timeout-acl Port FCF and ENode DetectionFCoE VLANs FCoE ACL RulesFor example Operational CommandsViewing FIP Snooping Information RS G8124config# fcoe fips port 2 enable FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 fcf-mode on RS G8124config# fcoe fips port 3 fcf-mode offPriority-Based Flow Control Global Configuration Port-Based PFC Configuration PFC Configuration ExampleEnable PFC for the business-critical LAN application Enable PFC for the FCoE trafficG8124config# Cee global Pfc Priority Enable G8124config# Cee global Pfc Priority Description FCoE802.1p Priority Values Enhanced Transmission SelectionPgid Pgid Priority GroupsAssigning Priority Values to a Priority Group Unlimited Bandwidth for Pgid Allocated Bandwidth for Pgid 0 ThroughETS Configuration Configuring ETSRS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 3 priorities RS G8124config# cee global ets bandwidth 3Data Center Bridging Capability Exchange Dcbx SettingsEnabling and Disabling Dcbx Peer Configuration NegotiationPFC Willing flag is set or reset using the following commandEnable desired Dcbx advertisements on other CEE ports Configuring DcbxEnable desired Dcbx configuration negotiation on FCoE ports RS G8124config# no cee port 5-24 dcbx enable Disable Dcbx for each non-CEE port as appropriateBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing Routing Between IP Subnets Basic IP RoutingIP Routing Benefits Router Legacy Network For example, consider the following topology migrationExample of Subnet Routing Switch-Based Routing TopologySubnet Routing Example IP Interface Assignments Using VLANs to Segregate Broadcast DomainsSubnet Routing Example IP Address Assignments Add ports to Vlan Subnet Routing Example Optional Vlan PortsEnable IP routing Ecmp Route Hashing Ecmp Static RoutesOspf Integration Select an Ecmp hashing method optional Configuring Ecmp Static RoutesRS G8124config# show ip route static Dhcp Relay Agent Dynamic Host Configuration ProtocolBladeos 6.5.2 Application Guide RFC RFC 4293 RFC 3411, 3412, 3413 Internet Protocol VersionIPv6 Limitations Address can be compressed as follows IPv6 Address FormatExample IPv6 address Multicast IPv6 Address TypesUnicast Address Anycast IPv6 Address AutoconfigurationSecond IPv6 address can be a unicast or anycast address IPv6 InterfacesNeighbor Discovery Overview Neighbor DiscoveryG8124 supports up to 1156 IPv6 routes Host vs. RouterHTTP/HTTPS servers support both IPv4 and IPv6 connections Supported ApplicationsSSH RS G8124config# ip dns ipv6 request-version ipv4ipv6Configuration Guidelines This section provides steps to configure IPv6 on the switch IPv6 Configuration ExamplesConfigure the IPv6 default gateway IPv6 ExampleRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Stability Routing Information ProtocolDistance Vector Protocol RIPv2 Routing UpdatesRIPv1 RIP Features RIPv2 in RIPv1 Compatibility ModeTriggered Updates PoisonMetric DefaultAuthentication Turn on RIP globally and enable RIP for each interface RIP Configuration ExampleAdd VLANs for routing interfaces Add IP interfaces with IPv4 addresses to VLANs# show ip rip # show ip routeInternet Group Management Protocol Igmp Snooping IGMPv3 Snooping Igmp GroupsFastLeave RS G8124config# no ip igmp snoop igmpv3 Enable IGMPv3 Snooping optional Igmp Snooping Configuration ExampleEnable the Igmp feature View dynamic Igmp informationStatic Multicast Router Configure a Static Multicast RouterRS G8124config# ip igmp mrouter 5 1 Igmp Querier Enable Igmp Querier on the VlanConfigure the querier election type and define the address Igmp Filtering Configuring the RangeConfiguring the Action Enable Igmp Filtering on the switch Configure Igmp FilteringDefine an Igmp filter with IPv4 information Assign the Igmp filter to a portBladeos 6.5.2 Application Guide Border Gateway Protocol IBGP and eBGP Internal Routing Versus External RoutingForming BGP Peer Routers What is a Route Map?Incoming and Outgoing Route Maps Distributing Network Filters in Access Lists and Route MapsPrecedence Configuration OverviewRS G8124config# ip match-address 1 enable Turn BGP on Enable the route mapExit Router BGP mode Redistributing Routes Aggregating RoutesMetric Multi-Exit Discriminator Attribute BGP AttributesLocal Preference Attribute Selecting Route Paths in BGP BGP Failover Configuration Example BGP Failover Configuration# ip routing Configure BGP peer router 1 and 2 with IPv4 addresses# ip router-id Default Redistribution and Route Aggregation Example# router bgp Configure redistribution for Peer Bladeos 6.5.2 Application Guide OSPFv2 Overview OspfOspf Area Types Types of Ospf AreasOspf Domain and an Autonomous System Types of Ospf Routing DevicesLink-State Database Neighbors and AdjacenciesInternal Versus External Routing Shortest Path First TreeOSPFv2 Implementation in Bladeos Configurable ParametersArea Area-id Defining AreasArea index set to an arbitrary value Using the Area ID to Assign the Ospf Area Number Summarizing Routes Electing the Designated Router and BackupInterface Cost Injecting Default Routes Default RoutesNeighbor-router router ID Virtual LinksRouter ID Ospf Authentication AuthenticationEnable Ospf authentication for Area 2 on switch Configuring Plain Text Ospf PasswordsAssign MD5 key ID to Ospf interfaces on switches 1, 2, Configure MD5 key ID for Area 0 on switches 1, 2,Enable Ospf MD5 authentication for Area 2 on switch Assign MD5 key ID to Ospf virtual link on switches 2Host Routes for Load Balancing Ospf Features Not Supported in This ReleaseOSPFv2 Configuration Examples Example 1 Simple Ospf Domain Enable OspfAttach the network interface to the stub area Define the stub areaAttach the network interface to the backbone Example 2 Virtual Links Configuring Ospf for a Virtual Link on Switch #1RS G8124config# ip router-id Attach the network interface to the transit area Define the backboneDefine the transit area Configuring Ospf for a Virtual Link on Switch #2Other Virtual Link Options Summarizing Routes Example 3 Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 RS G8124config-router-ospf#area-range 2 address 36.128.200.0 Verifying Ospf ConfigurationOSPFv3 Differences from OSPFv2 OSPFv3 Implementation in Bladeos# /cfg/l3/ospf3 Iscli# /info/l3/ospf3 # /stats/l3/ospf3Blade Switch OSPFv3 Configuration ExampleRS G8124config-ip-if#ipv6 address RS G8124config-ip-if#ip addressEnable OSPFv3 RS G8124config-router-ospf#area-range 2 address 360000000 RS G8124config-router-ospf3#area-range 1 address 360000000PIM Overview Protocol Independent MulticastSupported PIM Modes and Features Globally Enabling or Disabling the PIM Feature Basic PIM SettingsDefining an IP Interface for PIM Use Defining a PIM Network ComponentPIM Neighbor Filters Specifying the Rendezvous Point Additional Sparse Mode SettingsInfluencing the Designated Router Selection Specifying a Bootstrap RouterUsing the CLI Using PIM with Other FeaturesPIM with ACLs or VMAPs PIM with IgmpSet the Bootstrap Router BSR preference PIM Configuration ExamplesRS G8124config-ip-if#ip address 10.10.1.1 RS G8124config-ip-if#ip pim cbsr-preferenceExample 2 PIM-SM with Static RP RS G8124config# ip pim static-rp enableExample 3 PIM-DM 255.255.0.0Configure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals Trunking for Link Redundancy Basic RedundancyInternet For more information on trunking, see Ports and Trunking onFDB Update Forward DelayHot Links PreemptionUse the following commands to configure Hot Links Configuring Hot LinksAMP Topology Active MultiPath ProtocolFDB Flush Health ChecksTurn AMP on, and define the aggregator Configuring an Aggregator SwitchDefine the AMP group links, and enable the AMP group # active-multipath enable Configuring an Access SwitchVerifying AMP Operation Turn AMP onBladeos 6.5.2 Application Guide Monitoring Trunk Links Layer 2 FailoverBasic Layer 2 Failover Setting the Failover LimitControl Port State Manually Monitoring Port LinksMonitor Port State Spanning Tree Protocol L2 Failover with Other FeaturesConfigure general Failover parameters Configuring Layer 2 Failover# failover trigger 1 mmon monitor member # failover trigger 1 mmon control memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Vrrp Components Vrrp OverviewVirtual Router Virtual Router MAC AddressVirtual Interface Router Master and Backup Virtual RouterVrrp Operation Selecting the Master Vrrp Router Failover MethodsVirtual Router Group Active-Active RedundancyVrrp Tracking Parameters Bladeos Extensions to VrrpRS G8124config-vrrp#virtual-router 1 virtual-router-id Configuring the Switch for TrackingVirtual Router Deployment Considerations Assigning Vrrp Virtual Router IDActive-Active High-Availability Configuration High Availability ConfigurationsTurn on Vrrp and configure two Virtual Interface Routers Task 1 Configure G8124Configure client and server interfaces Turn off Spanning Tree Protocol globally Configure portsTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Lldp Overview Link Layer Discovery ProtocolTransmit and Receive Control Global Lldp SettingEnabling or Disabling Lldp RS G8124config# lldp refresh-interval interval Lldp Transmit FeaturesRS G8124config# lldp transmission-delay interval Scheduled IntervalRS G8124config# lldp trap-notification-interval interval RS G8124config# lldp holdtime-multiplier multiplierTime-to-Live for Transmitted Information Trap NotificationsTypes of Information Transmitted Changing the Lldp Transmit StateLldp Optional Information Types RS G8124config# show lldp remote-device index number Lldp Receive FeaturesTypes of Information Received Viewing Remote Device InformationTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Snmp Version Simple Network Management ProtocolRS G8124config# snmp-server user 1-16authentication-protocol Default ConfigurationUser Configuration Example Configure a user with no authentication and password Configuring Snmp Trap HostsConfigure an entry in the notify table SNMPv1 Trap HostSNMPv2 Trap Host Configuration Enter current admin password SNMPv3 Trap Host ConfigurationEnter new authentication password Re-enter new authentication passwordBladeos Snmp agent supports the following standard MIBs Snmp MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that the Backup interface is active An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is not active Signifies that there was a STG topology changeMIBs for Switch Image and Configuration Files Switch Images and Configuration FilesLoading a Saved Switch Configuration Loading a New Switch ImageSaving a Switch Dump Saving the Switch ConfigurationSet the name of dump file Initiate the transfer. To save a dump file, enterPart 8 Monitoring Part 8 Monitoring Rmon Overview Remote MonitoringEnable Rmon on a port Example ConfigurationRS G8124config-if# show interface port 1 rmon-counters Rmon Group 1-StatisticsLast digit x represents the number of the port to monitor Rmon Group 2-HistoryHistory MIB Object ID View Rmon history for the port Configuring Rmon HistoryConfigure the Rmon History parameters for a port Alarm MIB objects Rmon Group 3-AlarmsConfiguring Rmon Alarms Configure the Rmon Alarm parameters to track Icmp messagesRmon Group 9-Events SFlow Network Sampling SFLOWSFlow Statistical Counters RS G8124config# sflow Server SFlow Example ConfigurationG8124config# Sflow G8124config# Sflow EnableMirroring Ports Port MirroringEnable port mirroring Configuring Port MirroringView the current configuration RS G8124config# port-mirroring enablePart 9 Appendices Part 9 Appendices Glossary Whom to share Two or more virtual routers224.0.0.18 Network. For a more detailed description, refer to RFCIndex 214 Default password209 199142 35576, 249 to 310138 Dense Mode 304, 306303 to Examples 311 to25, 35, 278 154Uplink ports 154 User account 332Tagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.