Blade ICE G8124-E manual Igmp Groups, FastLeave, IGMPv3 Snooping

Page 251

BLADEOS 6.5.2 Application Guide

IGMP Groups

The G8124 supports a maximum of 1000 IGMP entries, on a maximum of 1024 VLANs.

One IGMP entry is allocated for each unique join request, based on the VLAN and IGMP group address. If multiple ports join the same IGMP group using the same VLAN, only a single IGMP entry is used.

FastLeave

In normal IGMP operation, when the switch receives an IGMPv2 leave message, it sends a Group-Specific Query to determine if any other devices in the same group (and on the same port) are still interested in the specified multicast group traffic. The switch removes the affiliated port from that particular group, if the following conditions apply:

￿If the switch does not receive an IGMP Membership Report within the query-response-interval.

￿If no multicast routers have been learned on that port.

With FastLeave enabled on the VLAN, a port can be removed immediately from the port list of the group entry when the IGMP Leave message is received, unless a multicast router was learned on the port.

Enable FastLeave only on VLANs that have only one host connected to each physical port. To enable FastLeave, use the following command:

RS G8124(config)# ip igmp snoop vlan <VLAN number> fast-leave

IGMPv3 Snooping

IGMPv3 includes new membership report messages to extend IGMP functionality. The switch provides snooping capability for all types of IGMP version 3 (IGMPv3) Membership Reports.

IGMPv3 supports Source-Specific Multicast (SSM). SSM identifies session traffic by both source and group addresses.

The IGMPv3 implementation keeps records on the multicast hosts present in the network. If a host is already registered, when it receives a new IS_INC/TO_INC/IS_EXC/TO_EXC report from same host, the switch makes the correct transition to new (port-host-group) registration based on the IGMPv3 RFC. The registrations of other hosts for the same group on the same port are not changed.

BMD00220, October 2010

Chapter 18: Internet Group Management Protocol ￿ 251

Image 251
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide What You’ll Find in This Guide PrefaceWho Should Use This Guide Part 2 Securing the Switch Part 5 IP Routing Part 8 Monitoring Additional ReferencesAaBbCc123 Typographic ConventionsTypographic Conventions How to Get Help Part 1 Getting Started Part 1 Getting Started Administration Interfaces Switch AdministrationBrowser-Based Interface Command Line InterfaceEstablishing a Connection Using the Switch Management PortsRS G8124# configure terminal Exit EnableConfigure the default gateway. If using IPv4 Using the Switch Data PortsConfigure the management IP interface/mask. Using IPv4 Configure the VLAN, and enable the interfaceRS G8124config# no access telnet enable Using TelnetUsing SSH to Access the Switch Using Secure ShellRS G8124config# access https enable Using a Web BrowserG8124config# access http enable G8124config# no access http enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Domain-Specific Bootp Relay Agent Configuration Global Bootp Relay Agent ConfigurationUser Access Levels Switch Login LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Information Needed for Setup Initial SetupRestarting Setup Default Setup OptionsStopping and Restarting Setup Manually Stopping SetupEnter the hour of the current system time at the prompt Setup Part 1 Basic System ConfigurationWhen Setup is started, the system prompts Turn Spanning Tree Protocol on or off at the prompt Setup Part 2 Port ConfigurationEnter the minute of the current time at the prompt Enter new Vlan tag support d/e System prompts you to configure the next Vlan Setup Part 3 VLANsIP Interfaces Setup Part 4 IP ConfigurationTo keep the current setting, press Enter System prompts you to configure another interface IP Routing Default GatewaysSystem prompts you to configure another default gateway When prompted, decide whether to restart Setup or continue Setup Part 5 Final Steps# /cfg/sys/access/tnet Optional Setup for Telnet SupportApply and save the configurations Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Secure Shell and Secure Copy Securing AdministrationTo Enable or Disable SCP Apply and Save Configuring SSH/SCP Features on the SwitchTo Enable or Disable the SSH Feature To Copy the Switch Configuration File to the SCP Host Configuring the SCP Administrator PasswordUsing SSH and SCP Client Commands To Log In to the SwitchScp ad4.cfg scpadmin@205.178.15.157putcfg To Load a Switch Configuration File from the SCP HostTo Apply and Save the Configuration Encryption To Copy the Switch Image and Boot Files to the SCP HostTo Load Switch Configuration Files from the SCP Host SSH and SCP Encryption of Management MessagesSSH/SCP Integration with Radius Authentication Generating RSA Host and Server Keys for SSH AccessSecurID Support SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SSH Using SecurID with SCPStrong Passwords End User Access ControlConsiderations for Configuring End User Accounts Validating a User’s Configuration User Access ControlSetting up User IDs Defining a User’s Access LevelLogging into an End User Account RS G8124# show access UserListing Current Users Radius Authentication and Authorization Authentication & Authorization ProtocolsRS G8124config# radius-server port UDP port number How Radius Authentication WorksConfiguring Radius on the Switch Configure the Radius secretRS G8124# show radius-server Radius Authentication Features in BladeosBLADEOS-proprietary Attributes for Radius Switch User AccountsRadius Attributes for Bladeos User Privileges How TACACS+ Authentication Works TACACS+ AuthenticationAlternate TACACS+ Authorization Levels TACACS+ Authentication Features in BladeosDefault TACACS+ Authorization Levels Accounting Command Authorization and LoggingRS G8124config# tacacs-server port TCP port number Configuring TACACS+ Authentication on the SwitchConfigure the TACACS+ secret and second secret Configuring the Ldap Server Ldap Authentication and Authorization# ldap-server port Configuring Ldap Authentication on the SwitchConfigure the domain name # ldap-server retransmit # ldap-server timeoutRS G8124config# access-control list6 IPv6 ACL number ? Access Control ListsRS G8124config# access-control list Regular ACL number ? Icmp Igmp Tcp Udp Summary of Packet ClassifiersWell-Known Protocol Types Well-Known TCP flag values Well-Known Application PortsACL Order of Precedence Summary of ACL ActionsAssigning Individual ACLs to a Port Re-Marking ACL Metering and Re-MarkingMetering ACL Port Mirroring RS G8124config# access-control list ACL number mirror portRS G8124config# access-control vmap VMap number mirror port RS G8124config# access-control list ACL number statisticsAdd ACL 2 to port EXT2 ACL Configuration ExamplesACL Example Add ACL 1 to port EXT1Vlan Maps RS G8124config-if#access-control list6Serverportsnon-serverports RS G8124config# access-control vmap Vmap ID ?Non-serverports Broadcast Storms Using Storm Control FiltersConfiguring Storm Control RS G8124config-if#dest-lookup-threshold packet ratePart 3 Switch Basics Part 3 Switch Basics VLANs Vlan Numbers VLANs OverviewVLANs and Port Vlan ID Numbers RS G8124# show interface information Use the following command to set the port PvidPvid Numbers Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs with VLAN-Tagged Gigabit Adapters Multiple VLANs with Tagging AdaptersMultiple VLANs Example Features of this Vlan are described belowConfigure the VLANs and their member ports Vlan Configuration ExampleEnable tagging on uplink ports that support multiple VLANs Private Vlan Ports Private VLANsVerify the configuration Configuration GuidelinesConfiguration Example Configure a secondary Vlan and map it to the primary VlanBladeos 6.5.2 Application Guide Ports and Trunking Port Trunk Group Trunking OverviewBefore You Configure Static Trunks Port Trunking Example Trunk Group Configuration RulesExample below, three ports are trunked between two switches # show portchannel information Follow these steps on the G8124 a. Define a trunk groupLayer 3 IPv4/IPv6 source IP address Configurable Trunk Hash AlgorithmLayer 2 destination MAC address Layer 2 source and destination MAC addressLink Aggregation Control Protocol Actor vs. Partner Lacp configurationRS G8124 # show lacp information Configuring LacpSet the Lacp mode Spanning Tree Protocol Modes Spanning Tree ProtocolsGlobal STP Control Depending on your preferred STG configurationsRS G8124config# spanning-tree mode disable RS G8124config# spanning-tree mode pvstrstppvrstmstPorts, Trunk Groups, and VLANs STP/PVST+ ModePort States Bridge Priority RS G8124config# spanning-tree stp x bridge priorityBridge Protocol Data Units Port Path Cost Fast Uplink ConvergencePort Priority Port Fast Forwarding Fast Uplink Configuration GuidelinesConfiguring Fast Uplink Convergence RS G8124config# spanning-tree uplinkfastBlocks Link Server Simple STP ConfigurationSwitch RS G8124config-if#spanning-tree stp 1 path-cost Restores Link ServerPer-VLAN Spanning Tree Groups Using Multiple Instances of Spanning Tree GroupSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration RS G8124config# spanning-tree stp 2 vlan Configuring Multiple STGsRS G8124config# spanning-tree stp 2 vlan 2,3 RS G8124config# spanning-tree stp 2 vlan Rstp vs. STP Port states Rapid Spanning Tree ProtocolPort State Changes RS G8124config# spanning-tree mode rstp Rstp Configuration GuidelinesRstp Configuration Example Configure STP Group 1 parametersPer-VLAN Rapid Spanning Tree Groups Configuring PvrstRS G8124config# spanning-tree mode pvrst Common Internal Spanning Tree Multiple Spanning Tree ProtocolMstp Region Assign VLANs to Spanning Tree Groups Mstp Configuration GuidelinesMstp Configuration Example Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Link Type RS G8124config-if# no spanning-tree link-type typePort Type and Link Type Edge PortBladeos 6.5.2 Application Guide QoS Overview Quality of ServiceQoS Model Shows the basic QoS model used by the switchSummary of ACL Actions Using ACL FiltersACL Metering and Re-Marking Differentiated Services Concepts Using Dscp Values to Provide QoSLowest Per Hop BehaviorHighest Network Control Default QoS Service LevelsQoS Levels CriticalRS G8124# show qos dscp RS G8124config# qos dscp re-markingDscp Re-Marking and Mapping RS G8124config-if#qos dscp dscp-remarking Dscp Re-Marking Configuration ExampleEnable Dscp re-marking on a port Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Available Profiles Deployment ProfilesDeployment Mode Comparison Selecting Profiles Automatic Configuration ChangesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtualizing the NIC for Multiple Virtual Pipes on Each Link Virtual NICsDefining Server Ports Enabling the vNIC FeatureVNIC ID Correlation VNIC IDs on the SwitchVNIC IDs VNIC Interface Names on the ServerVNIC Bandwidth Metering Outer and Inner Vlan Tags VNIC GroupsBladeos 6.5.2 Application Guide VNIC Teaming Failover To BackupDisables associated server ports For failover on affected VNICs only Upon Port 1 link failure, the switch To BackupConsider the following example configuration VNIC Configuration ExampleDefine the server ports Configure the external trunk to be used with vNIC groupEnable the vNIC feature on the switch Add ports, trunks, and virtual pipes to their vNIC groups VNICs for iSCSI on Emulex Eraptor RS G8124config# vnic port 1 indexRS G8124config# vnic port 2 index RS G8124config# vnic port 3 indexVMready VM Group Types VE CapacityLocal VM Groups Configuring a Local VM GroupRS G8124config# no virt vmgroup VM group number ? VM Profiles RS G8124config# virt vmprofile edit profile name ?Distributed VM Groups Assigning Members RS G8124config# no virt vmgroup VM group number profileInitializing a Distributed VM Group Removing Member VEs Synchronizing the ConfigurationAssigning a vCenter Virtualization Management ServersG8124# virt vmware scan RS G8124config# no virt vmware vcspecVCenter Scans Deleting the vCenterVirt vmware ? VMware Operational CommandsExporting Profiles Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode VM Policy Bandwidth Control VM Policy Bandwidth Control CommandsRS G8124config# virt vmpolicy vmbwidth VM MACindexUUID Bandwidth Policies vs. Bandwidth Shaping RS G8124# show virt vm VMready Information DisplaysLocal VE Information G8124# show virt vm RS G8124# show virt vmware hosts VCenter Hypervisor HostsRS G8124# show virt vmware vms VCenter VEsVCenter VE Details Specify the VMware vCenter IPv4 address VMready Configuration ExampleEnable the VMready feature Define the VM group Bladeos 6.5.2 Application Guide Fibre Channel over Ethernet on FCoE and CEEEnhanced Transmission Selection on FCoE Topology Fibre Channel over EthernetBladeos 6.5.2 Application Guide FCoE Requirements Effects on Link Layer Discovery Protocol Converged Enhanced EthernetTurning CEE On or Off Default ETS Bandwidth Allocation Effects on 802.1p Quality of ServiceCEE Effects on 802.1p Defaults Effects on Flow Control FIP Snooping for Specific Ports Global FIP Snooping SettingsFCoE Initialization Protocol Snooping Port FCF and ENode Detection FCoE Connection TimeoutRS G8124config# fcoe fips port ports fcf-mode autoonoff RS G8124config# no fcoe fips timeout-aclFCoE VLANs FCoE ACL RulesFor example Operational CommandsViewing FIP Snooping Information RS G8124config# fcoe fips port 3 fcf-mode off FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 enable RS G8124config# fcoe fips port 2 fcf-mode onPriority-Based Flow Control Global Configuration Port-Based PFC Configuration PFC Configuration ExampleG8124config# Cee global Pfc Priority Description FCoE Enable PFC for the FCoE trafficEnable PFC for the business-critical LAN application G8124config# Cee global Pfc Priority Enable802.1p Priority Values Enhanced Transmission SelectionPgid Pgid Priority GroupsAssigning Priority Values to a Priority Group Unlimited Bandwidth for Pgid Allocated Bandwidth for Pgid 0 ThroughETS Configuration Configuring ETSRS G8124config# cee global ets bandwidth 3 RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets priority-group 3 prioritiesData Center Bridging Capability Exchange Dcbx SettingsEnabling and Disabling Dcbx Peer Configuration NegotiationPFC Willing flag is set or reset using the following commandEnable desired Dcbx advertisements on other CEE ports Configuring DcbxEnable desired Dcbx configuration negotiation on FCoE ports RS G8124config# no cee port 5-24 dcbx enable Disable Dcbx for each non-CEE port as appropriateBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing Routing Between IP Subnets Basic IP RoutingIP Routing Benefits Router Legacy Network For example, consider the following topology migrationExample of Subnet Routing Switch-Based Routing TopologySubnet Routing Example IP Interface Assignments Using VLANs to Segregate Broadcast DomainsSubnet Routing Example IP Address Assignments Add ports to Vlan Subnet Routing Example Optional Vlan PortsEnable IP routing Ecmp Route Hashing Ecmp Static RoutesOspf Integration Select an Ecmp hashing method optional Configuring Ecmp Static RoutesRS G8124config# show ip route static Dhcp Relay Agent Dynamic Host Configuration ProtocolBladeos 6.5.2 Application Guide RFC RFC 4293 RFC 3411, 3412, 3413 Internet Protocol VersionIPv6 Limitations Address can be compressed as follows IPv6 Address FormatExample IPv6 address Multicast IPv6 Address TypesUnicast Address Anycast IPv6 Address AutoconfigurationSecond IPv6 address can be a unicast or anycast address IPv6 InterfacesNeighbor Discovery Overview Neighbor DiscoveryG8124 supports up to 1156 IPv6 routes Host vs. RouterHTTP/HTTPS servers support both IPv4 and IPv6 connections Supported ApplicationsSSH RS G8124config# ip dns ipv6 request-version ipv4ipv6Configuration Guidelines IPv6 Example IPv6 Configuration ExamplesThis section provides steps to configure IPv6 on the switch Configure the IPv6 default gatewayRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Stability Routing Information ProtocolDistance Vector Protocol RIPv2 Routing UpdatesRIPv1 Poison RIPv2 in RIPv1 Compatibility ModeRIP Features Triggered UpdatesMetric DefaultAuthentication Add IP interfaces with IPv4 addresses to VLANs RIP Configuration ExampleTurn on RIP globally and enable RIP for each interface Add VLANs for routing interfaces# show ip rip # show ip routeInternet Group Management Protocol Igmp Snooping IGMPv3 Snooping Igmp GroupsFastLeave RS G8124config# no ip igmp snoop igmpv3 View dynamic Igmp information Igmp Snooping Configuration ExampleEnable IGMPv3 Snooping optional Enable the Igmp featureStatic Multicast Router Configure a Static Multicast RouterRS G8124config# ip igmp mrouter 5 1 Igmp Querier Enable Igmp Querier on the VlanConfigure the querier election type and define the address Igmp Filtering Configuring the RangeConfiguring the Action Assign the Igmp filter to a port Configure Igmp FilteringEnable Igmp Filtering on the switch Define an Igmp filter with IPv4 informationBladeos 6.5.2 Application Guide Border Gateway Protocol IBGP and eBGP Internal Routing Versus External RoutingForming BGP Peer Routers What is a Route Map?Incoming and Outgoing Route Maps Distributing Network Filters in Access Lists and Route MapsPrecedence Configuration OverviewRS G8124config# ip match-address 1 enable Turn BGP on Enable the route mapExit Router BGP mode Redistributing Routes Aggregating RoutesMetric Multi-Exit Discriminator Attribute BGP AttributesLocal Preference Attribute Selecting Route Paths in BGP BGP Failover Configuration Example BGP Failover Configuration# ip routing Configure BGP peer router 1 and 2 with IPv4 addresses# ip router-id Default Redistribution and Route Aggregation Example# router bgp Configure redistribution for Peer Bladeos 6.5.2 Application Guide OSPFv2 Overview OspfOspf Area Types Types of Ospf AreasOspf Domain and an Autonomous System Types of Ospf Routing DevicesLink-State Database Neighbors and AdjacenciesInternal Versus External Routing Shortest Path First TreeOSPFv2 Implementation in Bladeos Configurable ParametersArea Area-id Defining AreasArea index set to an arbitrary value Using the Area ID to Assign the Ospf Area Number Summarizing Routes Electing the Designated Router and BackupInterface Cost Injecting Default Routes Default RoutesNeighbor-router router ID Virtual LinksRouter ID Ospf Authentication AuthenticationEnable Ospf authentication for Area 2 on switch Configuring Plain Text Ospf PasswordsAssign MD5 key ID to Ospf virtual link on switches 2 Configure MD5 key ID for Area 0 on switches 1, 2,Assign MD5 key ID to Ospf interfaces on switches 1, 2, Enable Ospf MD5 authentication for Area 2 on switchHost Routes for Load Balancing Ospf Features Not Supported in This ReleaseOSPFv2 Configuration Examples Example 1 Simple Ospf Domain Enable OspfAttach the network interface to the stub area Define the stub areaAttach the network interface to the backbone Example 2 Virtual Links Configuring Ospf for a Virtual Link on Switch #1RS G8124config# ip router-id Attach the network interface to the transit area Define the backboneDefine the transit area Configuring Ospf for a Virtual Link on Switch #2Other Virtual Link Options Summarizing Routes Example 3 Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 RS G8124config-router-ospf#area-range 2 address 36.128.200.0 Verifying Ospf ConfigurationOSPFv3 Differences from OSPFv2 OSPFv3 Implementation in Bladeos# /stats/l3/ospf3 Iscli# /cfg/l3/ospf3 # /info/l3/ospf3RS G8124config-ip-if#ip address OSPFv3 Configuration ExampleBlade Switch RS G8124config-ip-if#ipv6 addressEnable OSPFv3 RS G8124config-router-ospf#area-range 2 address 360000000 RS G8124config-router-ospf3#area-range 1 address 360000000PIM Overview Protocol Independent MulticastSupported PIM Modes and Features Globally Enabling or Disabling the PIM Feature Basic PIM SettingsDefining an IP Interface for PIM Use Defining a PIM Network ComponentPIM Neighbor Filters Specifying the Rendezvous Point Additional Sparse Mode SettingsInfluencing the Designated Router Selection Specifying a Bootstrap RouterPIM with Igmp Using PIM with Other FeaturesUsing the CLI PIM with ACLs or VMAPsRS G8124config-ip-if#ip pim cbsr-preference PIM Configuration ExamplesSet the Bootstrap Router BSR preference RS G8124config-ip-if#ip address 10.10.1.1255.255.0.0 RS G8124config# ip pim static-rp enableExample 2 PIM-SM with Static RP Example 3 PIM-DMConfigure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals For more information on trunking, see Ports and Trunking on Basic RedundancyTrunking for Link Redundancy InternetPreemption Forward DelayFDB Update Hot LinksUse the following commands to configure Hot Links Configuring Hot LinksAMP Topology Active MultiPath ProtocolFDB Flush Health ChecksTurn AMP on, and define the aggregator Configuring an Aggregator SwitchDefine the AMP group links, and enable the AMP group Turn AMP on Configuring an Access Switch# active-multipath enable Verifying AMP OperationBladeos 6.5.2 Application Guide Monitoring Trunk Links Layer 2 FailoverBasic Layer 2 Failover Setting the Failover LimitControl Port State Manually Monitoring Port LinksMonitor Port State Spanning Tree Protocol L2 Failover with Other Features# failover trigger 1 mmon control member Configuring Layer 2 FailoverConfigure general Failover parameters # failover trigger 1 mmon monitor memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Virtual Router MAC Address Vrrp OverviewVrrp Components Virtual RouterVirtual Interface Router Master and Backup Virtual RouterVrrp Operation Selecting the Master Vrrp Router Failover MethodsVirtual Router Group Active-Active RedundancyVrrp Tracking Parameters Bladeos Extensions to VrrpAssigning Vrrp Virtual Router ID Configuring the Switch for TrackingRS G8124config-vrrp#virtual-router 1 virtual-router-id Virtual Router Deployment ConsiderationsActive-Active High-Availability Configuration High Availability ConfigurationsTurn on Vrrp and configure two Virtual Interface Routers Task 1 Configure G8124Configure client and server interfaces Turn off Spanning Tree Protocol globally Configure portsTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Lldp Overview Link Layer Discovery ProtocolTransmit and Receive Control Global Lldp SettingEnabling or Disabling Lldp Scheduled Interval Lldp Transmit FeaturesRS G8124config# lldp refresh-interval interval RS G8124config# lldp transmission-delay intervalTrap Notifications RS G8124config# lldp holdtime-multiplier multiplierRS G8124config# lldp trap-notification-interval interval Time-to-Live for Transmitted InformationTypes of Information Transmitted Changing the Lldp Transmit StateLldp Optional Information Types Viewing Remote Device Information Lldp Receive FeaturesRS G8124config# show lldp remote-device index number Types of Information ReceivedTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Snmp Version Simple Network Management ProtocolRS G8124config# snmp-server user 1-16authentication-protocol Default ConfigurationUser Configuration Example SNMPv1 Trap Host Configuring Snmp Trap HostsConfigure a user with no authentication and password Configure an entry in the notify tableSNMPv2 Trap Host Configuration Re-enter new authentication password SNMPv3 Trap Host ConfigurationEnter current admin password Enter new authentication passwordBladeos Snmp agent supports the following standard MIBs Snmp MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that there was a STG topology change An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is active Signifies that the Backup interface is not activeMIBs for Switch Image and Configuration Files Switch Images and Configuration FilesLoading a Saved Switch Configuration Loading a New Switch ImageInitiate the transfer. To save a dump file, enter Saving the Switch ConfigurationSaving a Switch Dump Set the name of dump filePart 8 Monitoring Part 8 Monitoring Rmon Overview Remote MonitoringRmon Group 1-Statistics Example ConfigurationEnable Rmon on a port RS G8124config-if# show interface port 1 rmon-countersLast digit x represents the number of the port to monitor Rmon Group 2-HistoryHistory MIB Object ID View Rmon history for the port Configuring Rmon HistoryConfigure the Rmon History parameters for a port Configure the Rmon Alarm parameters to track Icmp messages Rmon Group 3-AlarmsAlarm MIB objects Configuring Rmon AlarmsRmon Group 9-Events SFlow Network Sampling SFLOWSFlow Statistical Counters G8124config# Sflow Enable SFlow Example ConfigurationRS G8124config# sflow Server G8124config# SflowMirroring Ports Port MirroringRS G8124config# port-mirroring enable Configuring Port MirroringEnable port mirroring View the current configurationPart 9 Appendices Part 9 Appendices Glossary Network. For a more detailed description, refer to RFC Two or more virtual routersWhom to share 224.0.0.18Index 199 Default password214 209310 355142 76, 249 toExamples 311 to Dense Mode 304, 306138 303 to332 15425, 35, 278 Uplink ports 154 User accountTagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.