Blade ICE G8124 Configuring Dcbx, Enable desired Dcbx configuration negotiation on FCoE ports

Page 214

BLADEOS 6.5.2 Application Guide

Configuring DCBX

Consider an example consistent Figure 22 on page 189 and used with the previous FCoE examples in this chapter:

￿FCoE is used on ports 2 and 3.

￿CEE features are also used with LANs on ports 1 and 4.

￿All other ports are disabled or are connected to regular (non-CEE) LAN devices.

In this example, the G8124 acts as the central point for CEE configuration. FCoE-related ports will be configured for advertising CEE capabilities, but not to accept external configuration. Other LAN ports that use CEE features will also be configured to advertise feature settings to remote peers, but not to accept external configuration. DCBX will be disabled on all non-CEE ports.

This example can be configured using the following commands:

1.Turn CEE on.

RS G8124(config)# cee enable

Note – Turning CEE on will automatically change some 802.1p QoS and 802.3x standard flow control settings and menus (see “Turning CEE On or Off” on page 192).

2.Enable desired DCBX configuration negotiation on FCoE ports:

RS G8124(config)# cee port 2 dcbx

enable

RS G8124(config)# cee port 2 dcbx

app_proto advertise

RS G8124(config)# cee port 2 dcbx

ets advertise

RS G8124(config)# cee port 2 dcbx

pfc advertise

RS G8124(config)# cee port 3

dcbx

enable

RS G8124(config)# cee port 3

dcbx

app_proto advertise

RS G8124(config)# cee port 3

dcbx

ets advertise

RS G8124(config)# cee port 3

dcbx

pfc advertise

 

 

 

3.Enable desired DCBX advertisements on other CEE ports:

RS G8124(config)# cee port 1 dcbx

enable

RS G8124(config)# cee port 1 dcbx

app_proto advertise

RS G8124(config)# cee port 1 dcbx

ets advertise

RS G8124(config)# cee port 1 dcbx

pfc advertise

RS G8124(config)# cee port 4

dcbx

enable

RS G8124(config)# cee port 4

dcbx

app_proto advertise

RS G8124(config)# cee port 4

dcbx

ets advertise

RS G8124(config)# cee port 4

dcbx

pfc advertise

 

 

 

214 ￿ Chapter 14: FCoE and CEE

BMD00220, October 2010

Image 214
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide Who Should Use This Guide PrefaceWhat You’ll Find in This Guide Part 2 Securing the Switch Part 5 IP Routing Additional References Part 8 MonitoringTypographic Conventions Typographic ConventionsAaBbCc123 How to Get Help Part 1 Getting Started Part 1 Getting Started Switch Administration Administration InterfacesCommand Line Interface Browser-Based InterfaceRS G8124# configure terminal Using the Switch Management PortsEstablishing a Connection Enable ExitConfigure the VLAN, and enable the interface Using the Switch Data PortsConfigure the management IP interface/mask. Using IPv4 Configure the default gateway. If using IPv4Using Telnet RS G8124config# no access telnet enableUsing Secure Shell Using SSH to Access the SwitchG8124config# no access http enable Using a Web BrowserG8124config# access http enable RS G8124config# access https enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Global Bootp Relay Agent Configuration Domain-Specific Bootp Relay Agent ConfigurationSwitch Login Levels User Access LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Initial Setup Information Needed for SetupStopping Setup Default Setup OptionsStopping and Restarting Setup Manually Restarting SetupWhen Setup is started, the system prompts Setup Part 1 Basic System ConfigurationEnter the hour of the current system time at the prompt Enter the minute of the current time at the prompt Setup Part 2 Port ConfigurationTurn Spanning Tree Protocol on or off at the prompt Enter new Vlan tag support d/e Setup Part 3 VLANs System prompts you to configure the next VlanTo keep the current setting, press Enter Setup Part 4 IP ConfigurationIP Interfaces System prompts you to configure another interface System prompts you to configure another default gateway Default GatewaysIP Routing Setup Part 5 Final Steps When prompted, decide whether to restart Setup or continueApply and save the configurations Optional Setup for Telnet Support# /cfg/sys/access/tnet Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Securing Administration Secure Shell and Secure CopyTo Enable or Disable the SSH Feature Configuring SSH/SCP Features on the SwitchTo Enable or Disable SCP Apply and Save To Log In to the Switch Configuring the SCP Administrator PasswordUsing SSH and SCP Client Commands To Copy the Switch Configuration File to the SCP HostTo Apply and Save the Configuration To Load a Switch Configuration File from the SCP HostScp ad4.cfg scpadmin@205.178.15.157putcfg SSH and SCP Encryption of Management Messages To Copy the Switch Image and Boot Files to the SCP HostTo Load Switch Configuration Files from the SCP Host EncryptionGenerating RSA Host and Server Keys for SSH Access SSH/SCP Integration with Radius AuthenticationUsing SecurID with SCP SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SSH SecurID SupportConsiderations for Configuring End User Accounts End User Access ControlStrong Passwords Defining a User’s Access Level User Access ControlSetting up User IDs Validating a User’s ConfigurationListing Current Users RS G8124# show access UserLogging into an End User Account Authentication & Authorization Protocols Radius Authentication and AuthorizationConfigure the Radius secret How Radius Authentication WorksConfiguring Radius on the Switch RS G8124config# radius-server port UDP port numberRadius Authentication Features in Bladeos RS G8124# show radius-serverRadius Attributes for Bladeos User Privileges Switch User AccountsBLADEOS-proprietary Attributes for Radius TACACS+ Authentication How TACACS+ Authentication WorksDefault TACACS+ Authorization Levels TACACS+ Authentication Features in BladeosAlternate TACACS+ Authorization Levels Command Authorization and Logging AccountingConfigure the TACACS+ secret and second secret Configuring TACACS+ Authentication on the SwitchRS G8124config# tacacs-server port TCP port number Ldap Authentication and Authorization Configuring the Ldap Server# ldap-server retransmit # ldap-server timeout Configuring Ldap Authentication on the SwitchConfigure the domain name # ldap-server portRS G8124config# access-control list Regular ACL number ? Access Control ListsRS G8124config# access-control list6 IPv6 ACL number ? Well-Known Protocol Types Summary of Packet ClassifiersIcmp Igmp Tcp Udp Well-Known Application Ports Well-Known TCP flag valuesAssigning Individual ACLs to a Port Summary of ACL ActionsACL Order of Precedence Metering ACL Metering and Re-MarkingRe-Marking RS G8124config# access-control list ACL number statistics RS G8124config# access-control list ACL number mirror portRS G8124config# access-control vmap VMap number mirror port ACL Port MirroringAdd ACL 1 to port EXT1 ACL Configuration ExamplesACL Example Add ACL 2 to port EXT2RS G8124config-if#access-control list6 Vlan MapsNon-serverports RS G8124config# access-control vmap Vmap ID ?Serverportsnon-serverports RS G8124config-if#dest-lookup-threshold packet rate Using Storm Control FiltersConfiguring Storm Control Broadcast StormsPart 3 Switch Basics Part 3 Switch Basics VLANs VLANs and Port Vlan ID Numbers VLANs OverviewVlan Numbers Pvid Numbers Use the following command to set the port PvidRS G8124# show interface information Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Configuration Rules Vlan Topologies and Design ConsiderationsMultiple VLANs with Tagging Adapters Multiple VLANs with VLAN-Tagged Gigabit AdaptersFeatures of this Vlan are described below Multiple VLANs ExampleEnable tagging on uplink ports that support multiple VLANs Vlan Configuration ExampleConfigure the VLANs and their member ports Private VLANs Private Vlan PortsConfigure a secondary Vlan and map it to the primary Vlan Configuration GuidelinesConfiguration Example Verify the configurationBladeos 6.5.2 Application Guide Ports and Trunking Trunking Overview Port Trunk GroupBefore You Configure Static Trunks Example below, three ports are trunked between two switches Trunk Group Configuration RulesPort Trunking Example Follow these steps on the G8124 a. Define a trunk group # show portchannel informationLayer 2 source and destination MAC address Configurable Trunk Hash AlgorithmLayer 2 destination MAC address Layer 3 IPv4/IPv6 source IP addressActor vs. Partner Lacp configuration Link Aggregation Control ProtocolSet the Lacp mode Configuring LacpRS G8124 # show lacp information Spanning Tree Protocols Spanning Tree Protocol ModesRS G8124config# spanning-tree mode pvstrstppvrstmst Depending on your preferred STG configurationsRS G8124config# spanning-tree mode disable Global STP ControlPort States STP/PVST+ ModePorts, Trunk Groups, and VLANs Bridge Protocol Data Units RS G8124config# spanning-tree stp x bridge priorityBridge Priority Port Priority Fast Uplink ConvergencePort Path Cost RS G8124config# spanning-tree uplinkfast Fast Uplink Configuration GuidelinesConfiguring Fast Uplink Convergence Port Fast ForwardingSwitch Simple STP ConfigurationBlocks Link Server Restores Link Server RS G8124config-if#spanning-tree stp 1 path-costUsing Multiple Instances of Spanning Tree Group Per-VLAN Spanning Tree GroupsSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration RS G8124config# spanning-tree stp 2 vlan 2,3 Configuring Multiple STGsRS G8124config# spanning-tree stp 2 vlan RS G8124config# spanning-tree stp 2 vlan Port State Changes Rapid Spanning Tree ProtocolRstp vs. STP Port states Configure STP Group 1 parameters Rstp Configuration GuidelinesRstp Configuration Example RS G8124config# spanning-tree mode rstpRS G8124config# spanning-tree mode pvrst Configuring PvrstPer-VLAN Rapid Spanning Tree Groups Mstp Region Multiple Spanning Tree ProtocolCommon Internal Spanning Tree Mstp Configuration Example Mstp Configuration GuidelinesAssign VLANs to Spanning Tree Groups Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Edge Port RS G8124config-if# no spanning-tree link-type typePort Type and Link Type Link TypeBladeos 6.5.2 Application Guide Quality of Service QoS OverviewShows the basic QoS model used by the switch QoS ModelUsing ACL Filters Summary of ACL ActionsACL Metering and Re-Marking Using Dscp Values to Provide QoS Differentiated Services ConceptsHighest Per Hop BehaviorLowest Critical Default QoS Service LevelsQoS Levels Network ControlDscp Re-Marking and Mapping RS G8124config# qos dscp re-markingRS G8124# show qos dscp Enable Dscp re-marking on a port Dscp Re-Marking Configuration ExampleRS G8124config-if#qos dscp dscp-remarking Using 802.1p Priority to Provide QoS Layer 2 802.1q/802.1p Vlan tagged packetQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Deployment Profiles Available ProfilesDeployment Mode Comparison Automatic Configuration Changes Selecting ProfilesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtual NICs Virtualizing the NIC for Multiple Virtual Pipes on Each LinkEnabling the vNIC Feature Defining Server PortsVNIC Interface Names on the Server VNIC IDs on the SwitchVNIC IDs VNIC ID CorrelationVNIC Bandwidth Metering VNIC Groups Outer and Inner Vlan TagsBladeos 6.5.2 Application Guide Disables associated server ports To BackupVNIC Teaming Failover Upon Port 1 link failure, the switch To Backup For failover on affected VNICs onlyVNIC Configuration Example Consider the following example configurationEnable the vNIC feature on the switch Configure the external trunk to be used with vNIC groupDefine the server ports Add ports, trunks, and virtual pipes to their vNIC groups RS G8124config# vnic port 3 index RS G8124config# vnic port 1 indexRS G8124config# vnic port 2 index VNICs for iSCSI on Emulex EraptorVMready VE Capacity VM Group TypesConfiguring a Local VM Group Local VM GroupsRS G8124config# no virt vmgroup VM group number ? Distributed VM Groups RS G8124config# virt vmprofile edit profile name ?VM Profiles Initializing a Distributed VM Group RS G8124config# no virt vmgroup VM group number profileAssigning Members Synchronizing the Configuration Removing Member VEsVirtualization Management Servers Assigning a vCenterDeleting the vCenter RS G8124config# no virt vmware vcspecVCenter Scans G8124# virt vmware scanExporting Profiles VMware Operational CommandsVirt vmware ? Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode RS G8124config# virt vmpolicy vmbwidth VM MACindexUUID VM Policy Bandwidth Control CommandsVM Policy Bandwidth Control Bandwidth Policies vs. Bandwidth Shaping Local VE Information VMready Information DisplaysRS G8124# show virt vm G8124# show virt vm VCenter Hypervisor Hosts RS G8124# show virt vmware hostsVCenter VE Details VCenter VEsRS G8124# show virt vmware vms Enable the VMready feature VMready Configuration ExampleSpecify the VMware vCenter IPv4 address Define the VM group Bladeos 6.5.2 Application Guide FCoE and CEE Fibre Channel over Ethernet onEnhanced Transmission Selection on Fibre Channel over Ethernet FCoE TopologyBladeos 6.5.2 Application Guide FCoE Requirements Turning CEE On or Off Converged Enhanced EthernetEffects on Link Layer Discovery Protocol CEE Effects on 802.1p Defaults Effects on 802.1p Quality of ServiceDefault ETS Bandwidth Allocation Effects on Flow Control FCoE Initialization Protocol Snooping Global FIP Snooping SettingsFIP Snooping for Specific Ports RS G8124config# no fcoe fips timeout-acl FCoE Connection TimeoutRS G8124config# fcoe fips port ports fcf-mode autoonoff Port FCF and ENode DetectionFCoE ACL Rules FCoE VLANsViewing FIP Snooping Information Operational CommandsFor example RS G8124config# fcoe fips port 2 fcf-mode on FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 enable RS G8124config# fcoe fips port 3 fcf-mode offPriority-Based Flow Control Global Configuration PFC Configuration Example Port-Based PFC ConfigurationG8124config# Cee global Pfc Priority Enable Enable PFC for the FCoE trafficEnable PFC for the business-critical LAN application G8124config# Cee global Pfc Priority Description FCoEEnhanced Transmission Selection 802.1p Priority ValuesPgid Priority Groups PgidAssigning Priority Values to a Priority Group Allocated Bandwidth for Pgid 0 Through Unlimited Bandwidth for PgidConfiguring ETS ETS ConfigurationRS G8124config# cee global ets priority-group 3 priorities RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets bandwidth 3Dcbx Settings Data Center Bridging Capability ExchangePeer Configuration Negotiation Enabling and Disabling DcbxWilling flag is set or reset using the following command PFCEnable desired Dcbx configuration negotiation on FCoE ports Configuring DcbxEnable desired Dcbx advertisements on other CEE ports Disable Dcbx for each non-CEE port as appropriate RS G8124config# no cee port 5-24 dcbx enableBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing IP Routing Benefits Basic IP RoutingRouting Between IP Subnets For example, consider the following topology migration Router Legacy NetworkSwitch-Based Routing Topology Example of Subnet RoutingSubnet Routing Example IP Address Assignments Using VLANs to Segregate Broadcast DomainsSubnet Routing Example IP Interface Assignments Subnet Routing Example Optional Vlan Ports Add ports to VlanEnable IP routing Ospf Integration Ecmp Static RoutesEcmp Route Hashing RS G8124config# show ip route static Configuring Ecmp Static RoutesSelect an Ecmp hashing method optional Dynamic Host Configuration Protocol Dhcp Relay AgentBladeos 6.5.2 Application Guide Internet Protocol Version RFC RFC 4293 RFC 3411, 3412, 3413IPv6 Limitations Example IPv6 address IPv6 Address FormatAddress can be compressed as follows Unicast Address IPv6 Address TypesMulticast IPv6 Address Autoconfiguration AnycastIPv6 Interfaces Second IPv6 address can be a unicast or anycast addressNeighbor Discovery Neighbor Discovery OverviewHost vs. Router G8124 supports up to 1156 IPv6 routesSupported Applications HTTP/HTTPS servers support both IPv4 and IPv6 connectionsRS G8124config# ip dns ipv6 request-version ipv4ipv6 SSHConfiguration Guidelines Configure the IPv6 default gateway IPv6 Configuration ExamplesThis section provides steps to configure IPv6 on the switch IPv6 ExampleRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Distance Vector Protocol Routing Information ProtocolStability RIPv1 Routing UpdatesRIPv2 Triggered Updates RIPv2 in RIPv1 Compatibility ModeRIP Features PoisonAuthentication DefaultMetric Add VLANs for routing interfaces RIP Configuration ExampleTurn on RIP globally and enable RIP for each interface Add IP interfaces with IPv4 addresses to VLANs# show ip route # show ip ripInternet Group Management Protocol Igmp Snooping FastLeave Igmp GroupsIGMPv3 Snooping RS G8124config# no ip igmp snoop igmpv3 Enable the Igmp feature Igmp Snooping Configuration ExampleEnable IGMPv3 Snooping optional View dynamic Igmp informationRS G8124config# ip igmp mrouter 5 1 Configure a Static Multicast RouterStatic Multicast Router Configure the querier election type and define the address Enable Igmp Querier on the VlanIgmp Querier Configuring the Action Configuring the RangeIgmp Filtering Define an Igmp filter with IPv4 information Configure Igmp FilteringEnable Igmp Filtering on the switch Assign the Igmp filter to a portBladeos 6.5.2 Application Guide Border Gateway Protocol Internal Routing Versus External Routing IBGP and eBGPWhat is a Route Map? Forming BGP Peer RoutersDistributing Network Filters in Access Lists and Route Maps Incoming and Outgoing Route MapsRS G8124config# ip match-address 1 enable Configuration OverviewPrecedence Exit Router BGP mode Enable the route mapTurn BGP on Aggregating Routes Redistributing RoutesLocal Preference Attribute BGP AttributesMetric Multi-Exit Discriminator Attribute Selecting Route Paths in BGP BGP Failover Configuration BGP Failover Configuration ExampleConfigure BGP peer router 1 and 2 with IPv4 addresses # ip routing# router bgp Default Redistribution and Route Aggregation Example# ip router-id Configure redistribution for Peer Bladeos 6.5.2 Application Guide Ospf OSPFv2 OverviewTypes of Ospf Areas Ospf Area TypesTypes of Ospf Routing Devices Ospf Domain and an Autonomous SystemNeighbors and Adjacencies Link-State DatabaseShortest Path First Tree Internal Versus External RoutingConfigurable Parameters OSPFv2 Implementation in BladeosArea index set to an arbitrary value Defining AreasArea Area-id Using the Area ID to Assign the Ospf Area Number Interface Cost Electing the Designated Router and BackupSummarizing Routes Default Routes Injecting Default RoutesRouter ID Virtual LinksNeighbor-router router ID Authentication Ospf AuthenticationConfiguring Plain Text Ospf Passwords Enable Ospf authentication for Area 2 on switchEnable Ospf MD5 authentication for Area 2 on switch Configure MD5 key ID for Area 0 on switches 1, 2,Assign MD5 key ID to Ospf interfaces on switches 1, 2, Assign MD5 key ID to Ospf virtual link on switches 2Ospf Features Not Supported in This Release Host Routes for Load BalancingOSPFv2 Configuration Examples Enable Ospf Example 1 Simple Ospf DomainAttach the network interface to the backbone Define the stub areaAttach the network interface to the stub area RS G8124config# ip router-id Configuring Ospf for a Virtual Link on Switch #1Example 2 Virtual Links Define the backbone Attach the network interface to the transit areaConfiguring Ospf for a Virtual Link on Switch #2 Define the transit areaOther Virtual Link Options Example 3 Summarizing Routes Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 Verifying Ospf Configuration RS G8124config-router-ospf#area-range 2 address 36.128.200.0OSPFv3 Implementation in Bladeos OSPFv3 Differences from OSPFv2# /info/l3/ospf3 Iscli# /cfg/l3/ospf3 # /stats/l3/ospf3RS G8124config-ip-if#ipv6 address OSPFv3 Configuration ExampleBlade Switch RS G8124config-ip-if#ip addressEnable OSPFv3 RS G8124config-router-ospf3#area-range 1 address 360000000 RS G8124config-router-ospf#area-range 2 address 360000000Protocol Independent Multicast PIM OverviewSupported PIM Modes and Features Basic PIM Settings Globally Enabling or Disabling the PIM FeatureDefining a PIM Network Component Defining an IP Interface for PIM UsePIM Neighbor Filters Additional Sparse Mode Settings Specifying the Rendezvous PointSpecifying a Bootstrap Router Influencing the Designated Router SelectionPIM with ACLs or VMAPs Using PIM with Other FeaturesUsing the CLI PIM with IgmpRS G8124config-ip-if#ip address 10.10.1.1 PIM Configuration ExamplesSet the Bootstrap Router BSR preference RS G8124config-ip-if#ip pim cbsr-preferenceExample 3 PIM-DM RS G8124config# ip pim static-rp enableExample 2 PIM-SM with Static RP 255.255.0.0Configure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals Internet Basic RedundancyTrunking for Link Redundancy For more information on trunking, see Ports and Trunking onHot Links Forward DelayFDB Update PreemptionConfiguring Hot Links Use the following commands to configure Hot LinksActive MultiPath Protocol AMP TopologyHealth Checks FDB FlushDefine the AMP group links, and enable the AMP group Configuring an Aggregator SwitchTurn AMP on, and define the aggregator Verifying AMP Operation Configuring an Access Switch# active-multipath enable Turn AMP onBladeos 6.5.2 Application Guide Layer 2 Failover Monitoring Trunk LinksSetting the Failover Limit Basic Layer 2 FailoverMonitor Port State Manually Monitoring Port LinksControl Port State L2 Failover with Other Features Spanning Tree Protocol# failover trigger 1 mmon monitor member Configuring Layer 2 FailoverConfigure general Failover parameters # failover trigger 1 mmon control memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Virtual Router Vrrp OverviewVrrp Components Virtual Router MAC AddressVrrp Operation Master and Backup Virtual RouterVirtual Interface Router Failover Methods Selecting the Master Vrrp RouterActive-Active Redundancy Virtual Router GroupBladeos Extensions to Vrrp Vrrp Tracking ParametersVirtual Router Deployment Considerations Configuring the Switch for TrackingRS G8124config-vrrp#virtual-router 1 virtual-router-id Assigning Vrrp Virtual Router IDHigh Availability Configurations Active-Active High-Availability ConfigurationConfigure client and server interfaces Task 1 Configure G8124Turn on Vrrp and configure two Virtual Interface Routers Configure ports Turn off Spanning Tree Protocol globallyTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Link Layer Discovery Protocol Lldp OverviewEnabling or Disabling Lldp Global Lldp SettingTransmit and Receive Control RS G8124config# lldp transmission-delay interval Lldp Transmit FeaturesRS G8124config# lldp refresh-interval interval Scheduled IntervalTime-to-Live for Transmitted Information RS G8124config# lldp holdtime-multiplier multiplierRS G8124config# lldp trap-notification-interval interval Trap NotificationsChanging the Lldp Transmit State Types of Information TransmittedLldp Optional Information Types Types of Information Received Lldp Receive FeaturesRS G8124config# show lldp remote-device index number Viewing Remote Device InformationTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Simple Network Management Protocol Snmp VersionDefault Configuration RS G8124config# snmp-server user 1-16authentication-protocolUser Configuration Example Configure an entry in the notify table Configuring Snmp Trap HostsConfigure a user with no authentication and password SNMPv1 Trap HostSNMPv2 Trap Host Configuration Enter new authentication password SNMPv3 Trap Host ConfigurationEnter current admin password Re-enter new authentication passwordSnmp MIBs Bladeos Snmp agent supports the following standard MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that the Backup interface is not active An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is active Signifies that there was a STG topology changeSwitch Images and Configuration Files MIBs for Switch Image and Configuration FilesLoading a New Switch Image Loading a Saved Switch ConfigurationSet the name of dump file Saving the Switch ConfigurationSaving a Switch Dump Initiate the transfer. To save a dump file, enterPart 8 Monitoring Part 8 Monitoring Remote Monitoring Rmon OverviewRS G8124config-if# show interface port 1 rmon-counters Example ConfigurationEnable Rmon on a port Rmon Group 1-StatisticsHistory MIB Object ID Rmon Group 2-HistoryLast digit x represents the number of the port to monitor Configure the Rmon History parameters for a port Configuring Rmon HistoryView Rmon history for the port Configuring Rmon Alarms Rmon Group 3-AlarmsAlarm MIB objects Configure the Rmon Alarm parameters to track Icmp messagesRmon Group 9-Events SFlow Statistical Counters SFLOWSFlow Network Sampling G8124config# Sflow SFlow Example ConfigurationRS G8124config# sflow Server G8124config# Sflow EnablePort Mirroring Mirroring PortsView the current configuration Configuring Port MirroringEnable port mirroring RS G8124config# port-mirroring enablePart 9 Appendices Part 9 Appendices Glossary 224.0.0.18 Two or more virtual routersWhom to share Network. For a more detailed description, refer to RFCIndex 209 Default password214 19976, 249 to 355142 310303 to Dense Mode 304, 306138 Examples 311 toUplink ports 154 User account 15425, 35, 278 332Tagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.