Blade ICE G8124-E manual Distributed VM Groups, VM Profiles

Page 169

BLADEOS 6.5.2 Application Guide

Distributed VM Groups

Distributed VM groups allow configuration profiles to be synchronized between the G8124 and associated hypervisors and VEs. This allows VE configuration to be centralized, and provides for more reliable VE migration across hypervisors.

Using distributed VM groups requires a virtualization management server. The management server acts as a central point of access to configure and maintain multiple hypervisors and their VEs (VMs, virtual switches, and so on).

The G8124 must connect to a virtualization management server before distributed VM groups can be used. The switch uses this connection to collect configuration information about associated VEs, and can also automatically push configuration profiles to the virtualization management server, which in turn configures the hypervisors and VEs. See “Virtualization Management Servers” on page 172 for more information.

Note – Distributed VM groups are not supported simultaneously on the same ports as vNICs (see “Virtual NICs” on page 153).

VM Profiles

VM profiles are required for configuring distributed VM groups. They are not used with local VM groups. A VM profile defines the VLAN and virtual switch bandwidth shaping characteristics for the distributed VM group. The switch distributes these settings to the virtualization management server, which in turn distributes them to the appropriate hypervisors for VE members associated with the group.

Creating VM profiles is a two part process. First, the VM profile is created as shown in the following command on the switch:

RS G8124(config)# virt vmprofile <profile name>

Next, the profile must be edited and configured using the following configuration commands:

RS G8124(config)# virt vmprofile edit <profile name> ?

vlan <VLAN number>

shaping <average bandwidth> <burst size> <peak>

For virtual switch bandwidth shaping parameters, average and peak bandwidth are specified in kilobits per second (a value of 1000 represents 1 Mbps). Burst size is specified in kilobytes (a value of 1000 represents 1 MB).

BMD00220, October 2010

Chapter 13: VMready ￿ 169

Image 169
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide Who Should Use This Guide PrefaceWhat You’ll Find in This Guide Part 2 Securing the Switch Part 5 IP Routing Part 8 Monitoring Additional ReferencesTypographic Conventions Typographic ConventionsAaBbCc123 How to Get Help Part 1 Getting Started Part 1 Getting Started Administration Interfaces Switch AdministrationBrowser-Based Interface Command Line InterfaceRS G8124# configure terminal Using the Switch Management PortsEstablishing a Connection Exit EnableConfigure the management IP interface/mask. Using IPv4 Using the Switch Data PortsConfigure the VLAN, and enable the interface Configure the default gateway. If using IPv4RS G8124config# no access telnet enable Using TelnetUsing SSH to Access the Switch Using Secure ShellG8124config# access http enable Using a Web BrowserG8124config# no access http enable RS G8124config# access https enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Domain-Specific Bootp Relay Agent Configuration Global Bootp Relay Agent ConfigurationUser Access Levels Switch Login LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Information Needed for Setup Initial SetupStopping and Restarting Setup Manually Default Setup OptionsStopping Setup Restarting SetupWhen Setup is started, the system prompts Setup Part 1 Basic System ConfigurationEnter the hour of the current system time at the prompt Enter the minute of the current time at the prompt Setup Part 2 Port ConfigurationTurn Spanning Tree Protocol on or off at the prompt Enter new Vlan tag support d/e System prompts you to configure the next Vlan Setup Part 3 VLANsTo keep the current setting, press Enter Setup Part 4 IP ConfigurationIP Interfaces System prompts you to configure another interface System prompts you to configure another default gateway Default GatewaysIP Routing When prompted, decide whether to restart Setup or continue Setup Part 5 Final StepsApply and save the configurations Optional Setup for Telnet Support# /cfg/sys/access/tnet Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Secure Shell and Secure Copy Securing AdministrationTo Enable or Disable the SSH Feature Configuring SSH/SCP Features on the SwitchTo Enable or Disable SCP Apply and Save Using SSH and SCP Client Commands Configuring the SCP Administrator PasswordTo Log In to the Switch To Copy the Switch Configuration File to the SCP HostTo Apply and Save the Configuration To Load a Switch Configuration File from the SCP HostScp ad4.cfg scpadmin@205.178.15.157putcfg To Load Switch Configuration Files from the SCP Host To Copy the Switch Image and Boot Files to the SCP HostSSH and SCP Encryption of Management Messages EncryptionSSH/SCP Integration with Radius Authentication Generating RSA Host and Server Keys for SSH AccessUsing SecurID with SSH SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SCP SecurID SupportConsiderations for Configuring End User Accounts End User Access ControlStrong Passwords Setting up User IDs User Access ControlDefining a User’s Access Level Validating a User’s ConfigurationListing Current Users RS G8124# show access UserLogging into an End User Account Radius Authentication and Authorization Authentication & Authorization ProtocolsConfiguring Radius on the Switch How Radius Authentication WorksConfigure the Radius secret RS G8124config# radius-server port UDP port numberRS G8124# show radius-server Radius Authentication Features in BladeosRadius Attributes for Bladeos User Privileges Switch User AccountsBLADEOS-proprietary Attributes for Radius How TACACS+ Authentication Works TACACS+ AuthenticationDefault TACACS+ Authorization Levels TACACS+ Authentication Features in BladeosAlternate TACACS+ Authorization Levels Accounting Command Authorization and LoggingConfigure the TACACS+ secret and second secret Configuring TACACS+ Authentication on the SwitchRS G8124config# tacacs-server port TCP port number Configuring the Ldap Server Ldap Authentication and AuthorizationConfigure the domain name Configuring Ldap Authentication on the Switch# ldap-server retransmit # ldap-server timeout # ldap-server portRS G8124config# access-control list Regular ACL number ? Access Control ListsRS G8124config# access-control list6 IPv6 ACL number ? Well-Known Protocol Types Summary of Packet ClassifiersIcmp Igmp Tcp Udp Well-Known TCP flag values Well-Known Application PortsAssigning Individual ACLs to a Port Summary of ACL ActionsACL Order of Precedence Metering ACL Metering and Re-MarkingRe-Marking RS G8124config# access-control vmap VMap number mirror port RS G8124config# access-control list ACL number mirror portRS G8124config# access-control list ACL number statistics ACL Port MirroringACL Example ACL Configuration ExamplesAdd ACL 1 to port EXT1 Add ACL 2 to port EXT2Vlan Maps RS G8124config-if#access-control list6Non-serverports RS G8124config# access-control vmap Vmap ID ?Serverportsnon-serverports Configuring Storm Control Using Storm Control FiltersRS G8124config-if#dest-lookup-threshold packet rate Broadcast StormsPart 3 Switch Basics Part 3 Switch Basics VLANs VLANs and Port Vlan ID Numbers VLANs OverviewVlan Numbers Pvid Numbers Use the following command to set the port PvidRS G8124# show interface information Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs with VLAN-Tagged Gigabit Adapters Multiple VLANs with Tagging AdaptersMultiple VLANs Example Features of this Vlan are described belowEnable tagging on uplink ports that support multiple VLANs Vlan Configuration ExampleConfigure the VLANs and their member ports Private Vlan Ports Private VLANsConfiguration Example Configuration GuidelinesConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationBladeos 6.5.2 Application Guide Ports and Trunking Port Trunk Group Trunking OverviewBefore You Configure Static Trunks Example below, three ports are trunked between two switches Trunk Group Configuration RulesPort Trunking Example # show portchannel information Follow these steps on the G8124 a. Define a trunk groupLayer 2 destination MAC address Configurable Trunk Hash AlgorithmLayer 2 source and destination MAC address Layer 3 IPv4/IPv6 source IP addressLink Aggregation Control Protocol Actor vs. Partner Lacp configurationSet the Lacp mode Configuring LacpRS G8124 # show lacp information Spanning Tree Protocol Modes Spanning Tree ProtocolsRS G8124config# spanning-tree mode disable Depending on your preferred STG configurationsRS G8124config# spanning-tree mode pvstrstppvrstmst Global STP ControlPort States STP/PVST+ ModePorts, Trunk Groups, and VLANs Bridge Protocol Data Units RS G8124config# spanning-tree stp x bridge priorityBridge Priority Port Priority Fast Uplink ConvergencePort Path Cost Configuring Fast Uplink Convergence Fast Uplink Configuration GuidelinesRS G8124config# spanning-tree uplinkfast Port Fast ForwardingSwitch Simple STP ConfigurationBlocks Link Server RS G8124config-if#spanning-tree stp 1 path-cost Restores Link ServerPer-VLAN Spanning Tree Groups Using Multiple Instances of Spanning Tree GroupSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration RS G8124config# spanning-tree stp 2 vlan 2,3 Configuring Multiple STGsRS G8124config# spanning-tree stp 2 vlan RS G8124config# spanning-tree stp 2 vlan Port State Changes Rapid Spanning Tree ProtocolRstp vs. STP Port states Rstp Configuration Example Rstp Configuration GuidelinesConfigure STP Group 1 parameters RS G8124config# spanning-tree mode rstpRS G8124config# spanning-tree mode pvrst Configuring PvrstPer-VLAN Rapid Spanning Tree Groups Mstp Region Multiple Spanning Tree ProtocolCommon Internal Spanning Tree Mstp Configuration Example Mstp Configuration GuidelinesAssign VLANs to Spanning Tree Groups Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Port Type and Link Type RS G8124config-if# no spanning-tree link-type typeEdge Port Link TypeBladeos 6.5.2 Application Guide QoS Overview Quality of ServiceQoS Model Shows the basic QoS model used by the switchSummary of ACL Actions Using ACL FiltersACL Metering and Re-Marking Differentiated Services Concepts Using Dscp Values to Provide QoSHighest Per Hop BehaviorLowest QoS Levels Default QoS Service LevelsCritical Network ControlDscp Re-Marking and Mapping RS G8124config# qos dscp re-markingRS G8124# show qos dscp Enable Dscp re-marking on a port Dscp Re-Marking Configuration ExampleRS G8124config-if#qos dscp dscp-remarking Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Available Profiles Deployment ProfilesDeployment Mode Comparison Selecting Profiles Automatic Configuration ChangesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtualizing the NIC for Multiple Virtual Pipes on Each Link Virtual NICsDefining Server Ports Enabling the vNIC FeatureVNIC IDs VNIC IDs on the SwitchVNIC Interface Names on the Server VNIC ID CorrelationVNIC Bandwidth Metering Outer and Inner Vlan Tags VNIC GroupsBladeos 6.5.2 Application Guide Disables associated server ports To BackupVNIC Teaming Failover For failover on affected VNICs only Upon Port 1 link failure, the switch To BackupConsider the following example configuration VNIC Configuration ExampleEnable the vNIC feature on the switch Configure the external trunk to be used with vNIC groupDefine the server ports Add ports, trunks, and virtual pipes to their vNIC groups RS G8124config# vnic port 2 index RS G8124config# vnic port 1 indexRS G8124config# vnic port 3 index VNICs for iSCSI on Emulex EraptorVMready VM Group Types VE CapacityLocal VM Groups Configuring a Local VM GroupRS G8124config# no virt vmgroup VM group number ? Distributed VM Groups RS G8124config# virt vmprofile edit profile name ?VM Profiles Initializing a Distributed VM Group RS G8124config# no virt vmgroup VM group number profileAssigning Members Removing Member VEs Synchronizing the ConfigurationAssigning a vCenter Virtualization Management ServersVCenter Scans RS G8124config# no virt vmware vcspecDeleting the vCenter G8124# virt vmware scanExporting Profiles VMware Operational CommandsVirt vmware ? Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode RS G8124config# virt vmpolicy vmbwidth VM MACindexUUID VM Policy Bandwidth Control CommandsVM Policy Bandwidth Control Bandwidth Policies vs. Bandwidth Shaping Local VE Information VMready Information DisplaysRS G8124# show virt vm G8124# show virt vm RS G8124# show virt vmware hosts VCenter Hypervisor HostsVCenter VE Details VCenter VEsRS G8124# show virt vmware vms Enable the VMready feature VMready Configuration ExampleSpecify the VMware vCenter IPv4 address Define the VM group Bladeos 6.5.2 Application Guide Fibre Channel over Ethernet on FCoE and CEEEnhanced Transmission Selection on FCoE Topology Fibre Channel over EthernetBladeos 6.5.2 Application Guide FCoE Requirements Turning CEE On or Off Converged Enhanced EthernetEffects on Link Layer Discovery Protocol CEE Effects on 802.1p Defaults Effects on 802.1p Quality of ServiceDefault ETS Bandwidth Allocation Effects on Flow Control FCoE Initialization Protocol Snooping Global FIP Snooping SettingsFIP Snooping for Specific Ports RS G8124config# fcoe fips port ports fcf-mode autoonoff FCoE Connection TimeoutRS G8124config# no fcoe fips timeout-acl Port FCF and ENode DetectionFCoE VLANs FCoE ACL RulesViewing FIP Snooping Information Operational CommandsFor example RS G8124config# fcoe fips port 2 enable FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 fcf-mode on RS G8124config# fcoe fips port 3 fcf-mode offPriority-Based Flow Control Global Configuration Port-Based PFC Configuration PFC Configuration ExampleEnable PFC for the business-critical LAN application Enable PFC for the FCoE trafficG8124config# Cee global Pfc Priority Enable G8124config# Cee global Pfc Priority Description FCoE802.1p Priority Values Enhanced Transmission SelectionPgid Pgid Priority GroupsAssigning Priority Values to a Priority Group Unlimited Bandwidth for Pgid Allocated Bandwidth for Pgid 0 ThroughETS Configuration Configuring ETSRS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 3 priorities RS G8124config# cee global ets bandwidth 3Data Center Bridging Capability Exchange Dcbx SettingsEnabling and Disabling Dcbx Peer Configuration NegotiationPFC Willing flag is set or reset using the following commandEnable desired Dcbx configuration negotiation on FCoE ports Configuring DcbxEnable desired Dcbx advertisements on other CEE ports RS G8124config# no cee port 5-24 dcbx enable Disable Dcbx for each non-CEE port as appropriateBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing IP Routing Benefits Basic IP RoutingRouting Between IP Subnets Router Legacy Network For example, consider the following topology migrationExample of Subnet Routing Switch-Based Routing TopologySubnet Routing Example IP Address Assignments Using VLANs to Segregate Broadcast DomainsSubnet Routing Example IP Interface Assignments Add ports to Vlan Subnet Routing Example Optional Vlan PortsEnable IP routing Ospf Integration Ecmp Static RoutesEcmp Route Hashing RS G8124config# show ip route static Configuring Ecmp Static RoutesSelect an Ecmp hashing method optional Dhcp Relay Agent Dynamic Host Configuration ProtocolBladeos 6.5.2 Application Guide RFC RFC 4293 RFC 3411, 3412, 3413 Internet Protocol VersionIPv6 Limitations Example IPv6 address IPv6 Address FormatAddress can be compressed as follows Unicast Address IPv6 Address TypesMulticast Anycast IPv6 Address AutoconfigurationSecond IPv6 address can be a unicast or anycast address IPv6 InterfacesNeighbor Discovery Overview Neighbor DiscoveryG8124 supports up to 1156 IPv6 routes Host vs. RouterHTTP/HTTPS servers support both IPv4 and IPv6 connections Supported ApplicationsSSH RS G8124config# ip dns ipv6 request-version ipv4ipv6Configuration Guidelines This section provides steps to configure IPv6 on the switch IPv6 Configuration ExamplesConfigure the IPv6 default gateway IPv6 ExampleRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Distance Vector Protocol Routing Information ProtocolStability RIPv1 Routing UpdatesRIPv2 RIP Features RIPv2 in RIPv1 Compatibility ModeTriggered Updates PoisonAuthentication DefaultMetric Turn on RIP globally and enable RIP for each interface RIP Configuration ExampleAdd VLANs for routing interfaces Add IP interfaces with IPv4 addresses to VLANs# show ip rip # show ip routeInternet Group Management Protocol Igmp Snooping FastLeave Igmp GroupsIGMPv3 Snooping RS G8124config# no ip igmp snoop igmpv3 Enable IGMPv3 Snooping optional Igmp Snooping Configuration ExampleEnable the Igmp feature View dynamic Igmp informationRS G8124config# ip igmp mrouter 5 1 Configure a Static Multicast RouterStatic Multicast Router Configure the querier election type and define the address Enable Igmp Querier on the VlanIgmp Querier Configuring the Action Configuring the RangeIgmp Filtering Enable Igmp Filtering on the switch Configure Igmp FilteringDefine an Igmp filter with IPv4 information Assign the Igmp filter to a portBladeos 6.5.2 Application Guide Border Gateway Protocol IBGP and eBGP Internal Routing Versus External RoutingForming BGP Peer Routers What is a Route Map?Incoming and Outgoing Route Maps Distributing Network Filters in Access Lists and Route MapsRS G8124config# ip match-address 1 enable Configuration OverviewPrecedence Exit Router BGP mode Enable the route mapTurn BGP on Redistributing Routes Aggregating RoutesLocal Preference Attribute BGP AttributesMetric Multi-Exit Discriminator Attribute Selecting Route Paths in BGP BGP Failover Configuration Example BGP Failover Configuration# ip routing Configure BGP peer router 1 and 2 with IPv4 addresses# router bgp Default Redistribution and Route Aggregation Example# ip router-id Configure redistribution for Peer Bladeos 6.5.2 Application Guide OSPFv2 Overview OspfOspf Area Types Types of Ospf AreasOspf Domain and an Autonomous System Types of Ospf Routing DevicesLink-State Database Neighbors and AdjacenciesInternal Versus External Routing Shortest Path First TreeOSPFv2 Implementation in Bladeos Configurable ParametersArea index set to an arbitrary value Defining AreasArea Area-id Using the Area ID to Assign the Ospf Area Number Interface Cost Electing the Designated Router and BackupSummarizing Routes Injecting Default Routes Default RoutesRouter ID Virtual LinksNeighbor-router router ID Ospf Authentication AuthenticationEnable Ospf authentication for Area 2 on switch Configuring Plain Text Ospf PasswordsAssign MD5 key ID to Ospf interfaces on switches 1, 2, Configure MD5 key ID for Area 0 on switches 1, 2,Enable Ospf MD5 authentication for Area 2 on switch Assign MD5 key ID to Ospf virtual link on switches 2Host Routes for Load Balancing Ospf Features Not Supported in This ReleaseOSPFv2 Configuration Examples Example 1 Simple Ospf Domain Enable OspfAttach the network interface to the backbone Define the stub areaAttach the network interface to the stub area RS G8124config# ip router-id Configuring Ospf for a Virtual Link on Switch #1Example 2 Virtual Links Attach the network interface to the transit area Define the backboneDefine the transit area Configuring Ospf for a Virtual Link on Switch #2Other Virtual Link Options Summarizing Routes Example 3 Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 RS G8124config-router-ospf#area-range 2 address 36.128.200.0 Verifying Ospf ConfigurationOSPFv3 Differences from OSPFv2 OSPFv3 Implementation in Bladeos# /cfg/l3/ospf3 Iscli# /info/l3/ospf3 # /stats/l3/ospf3Blade Switch OSPFv3 Configuration ExampleRS G8124config-ip-if#ipv6 address RS G8124config-ip-if#ip addressEnable OSPFv3 RS G8124config-router-ospf#area-range 2 address 360000000 RS G8124config-router-ospf3#area-range 1 address 360000000PIM Overview Protocol Independent MulticastSupported PIM Modes and Features Globally Enabling or Disabling the PIM Feature Basic PIM SettingsDefining an IP Interface for PIM Use Defining a PIM Network ComponentPIM Neighbor Filters Specifying the Rendezvous Point Additional Sparse Mode SettingsInfluencing the Designated Router Selection Specifying a Bootstrap RouterUsing the CLI Using PIM with Other FeaturesPIM with ACLs or VMAPs PIM with IgmpSet the Bootstrap Router BSR preference PIM Configuration ExamplesRS G8124config-ip-if#ip address 10.10.1.1 RS G8124config-ip-if#ip pim cbsr-preferenceExample 2 PIM-SM with Static RP RS G8124config# ip pim static-rp enableExample 3 PIM-DM 255.255.0.0Configure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals Trunking for Link Redundancy Basic RedundancyInternet For more information on trunking, see Ports and Trunking onFDB Update Forward DelayHot Links PreemptionUse the following commands to configure Hot Links Configuring Hot LinksAMP Topology Active MultiPath ProtocolFDB Flush Health ChecksDefine the AMP group links, and enable the AMP group Configuring an Aggregator SwitchTurn AMP on, and define the aggregator # active-multipath enable Configuring an Access SwitchVerifying AMP Operation Turn AMP onBladeos 6.5.2 Application Guide Monitoring Trunk Links Layer 2 FailoverBasic Layer 2 Failover Setting the Failover LimitMonitor Port State Manually Monitoring Port LinksControl Port State Spanning Tree Protocol L2 Failover with Other FeaturesConfigure general Failover parameters Configuring Layer 2 Failover# failover trigger 1 mmon monitor member # failover trigger 1 mmon control memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Vrrp Components Vrrp OverviewVirtual Router Virtual Router MAC AddressVrrp Operation Master and Backup Virtual RouterVirtual Interface Router Selecting the Master Vrrp Router Failover MethodsVirtual Router Group Active-Active RedundancyVrrp Tracking Parameters Bladeos Extensions to VrrpRS G8124config-vrrp#virtual-router 1 virtual-router-id Configuring the Switch for TrackingVirtual Router Deployment Considerations Assigning Vrrp Virtual Router IDActive-Active High-Availability Configuration High Availability ConfigurationsConfigure client and server interfaces Task 1 Configure G8124Turn on Vrrp and configure two Virtual Interface Routers Turn off Spanning Tree Protocol globally Configure portsTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Lldp Overview Link Layer Discovery ProtocolEnabling or Disabling Lldp Global Lldp SettingTransmit and Receive Control RS G8124config# lldp refresh-interval interval Lldp Transmit FeaturesRS G8124config# lldp transmission-delay interval Scheduled IntervalRS G8124config# lldp trap-notification-interval interval RS G8124config# lldp holdtime-multiplier multiplierTime-to-Live for Transmitted Information Trap NotificationsTypes of Information Transmitted Changing the Lldp Transmit StateLldp Optional Information Types RS G8124config# show lldp remote-device index number Lldp Receive FeaturesTypes of Information Received Viewing Remote Device InformationTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Snmp Version Simple Network Management ProtocolRS G8124config# snmp-server user 1-16authentication-protocol Default ConfigurationUser Configuration Example Configure a user with no authentication and password Configuring Snmp Trap HostsConfigure an entry in the notify table SNMPv1 Trap HostSNMPv2 Trap Host Configuration Enter current admin password SNMPv3 Trap Host ConfigurationEnter new authentication password Re-enter new authentication passwordBladeos Snmp agent supports the following standard MIBs Snmp MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that the Backup interface is active An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is not active Signifies that there was a STG topology changeMIBs for Switch Image and Configuration Files Switch Images and Configuration FilesLoading a Saved Switch Configuration Loading a New Switch ImageSaving a Switch Dump Saving the Switch ConfigurationSet the name of dump file Initiate the transfer. To save a dump file, enterPart 8 Monitoring Part 8 Monitoring Rmon Overview Remote MonitoringEnable Rmon on a port Example ConfigurationRS G8124config-if# show interface port 1 rmon-counters Rmon Group 1-StatisticsHistory MIB Object ID Rmon Group 2-HistoryLast digit x represents the number of the port to monitor Configure the Rmon History parameters for a port Configuring Rmon HistoryView Rmon history for the port Alarm MIB objects Rmon Group 3-AlarmsConfiguring Rmon Alarms Configure the Rmon Alarm parameters to track Icmp messagesRmon Group 9-Events SFlow Statistical Counters SFLOWSFlow Network Sampling RS G8124config# sflow Server SFlow Example ConfigurationG8124config# Sflow G8124config# Sflow EnableMirroring Ports Port MirroringEnable port mirroring Configuring Port MirroringView the current configuration RS G8124config# port-mirroring enablePart 9 Appendices Part 9 Appendices Glossary Whom to share Two or more virtual routers224.0.0.18 Network. For a more detailed description, refer to RFCIndex 214 Default password209 199142 35576, 249 to 310138 Dense Mode 304, 306303 to Examples 311 to25, 35, 278 154Uplink ports 154 User account 332Tagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.