Blade ICE G8124-E manual Using Secure Shell, Using SSH to Access the Switch

Page 31

BLADEOS 6.5.2 Application Guide

Using Secure Shell

Although a remote network administrator can manage the configuration of a G8124 via Telnet, this method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into another device over a network to execute commands remotely. As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the network is encrypted and secure.

The switch can do only one session of key/cipher generation at a time. Thus, a SSH/SCP client will not be able to login if the switch is doing key generation at that time. Similarly, the system will fail to do the key generation if a SSH/SCP client is logging in at that time.

The supported SSH encryption and authentication methods are listed below.

￿Server Host Authentication: Client RSA-authenticates the switch when starting each connection

￿Key Exchange: RSA

￿Encryption: 3DES-CBC, DES

￿User Authentication: Local password authentication, RADIUS, TACACS+

The following SSH clients have been tested:

￿OpenSSH_5.1p1 Debian-3ubuntu1

￿SecureCRT 5.0 (Van Dyke Technologies, Inc.)

￿Putty beta 0.60

Note – The BLADEOS implementation of SSH supports both versions 1.5 and 2.0 and supports SSH client version 1.5 - 2.x.

Using SSH to Access the Switch

By default, the SSH feature is disabled. For information on enabling and using SSH for switch access, see “Secure Shell and Secure Copy” on page 65.

Once the IP parameters are configured and the SSH service is enabled, you can access the command line interface using an SSH connection.

To establish an SSH connection with the switch, run the SSH program on your workstation by issuing the SSH command, followed by the switch IPv4 or IPv6 address:

#ssh <switch IP address>

If SecurID authentication is required, use the following command:

#ssh -1 ace <switch IP address>

You will then be prompted to enter a password as explained “Switch Login Levels” on page 38.

BMD00220, October 2010

Chapter 1: Switch Administration ￿ 31

Image 31
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide Who Should Use This Guide PrefaceWhat You’ll Find in This Guide Part 2 Securing the Switch Part 5 IP Routing Part 8 Monitoring Additional ReferencesTypographic Conventions Typographic ConventionsAaBbCc123 How to Get Help Part 1 Getting Started Part 1 Getting Started Administration Interfaces Switch AdministrationBrowser-Based Interface Command Line InterfaceRS G8124# configure terminal Using the Switch Management PortsEstablishing a Connection Exit EnableConfigure the default gateway. If using IPv4 Using the Switch Data PortsConfigure the management IP interface/mask. Using IPv4 Configure the VLAN, and enable the interfaceRS G8124config# no access telnet enable Using TelnetUsing SSH to Access the Switch Using Secure ShellRS G8124config# access https enable Using a Web BrowserG8124config# access http enable G8124config# no access http enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Domain-Specific Bootp Relay Agent Configuration Global Bootp Relay Agent ConfigurationUser Access Levels Switch Login LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Information Needed for Setup Initial SetupRestarting Setup Default Setup OptionsStopping and Restarting Setup Manually Stopping SetupWhen Setup is started, the system prompts Setup Part 1 Basic System ConfigurationEnter the hour of the current system time at the prompt Enter the minute of the current time at the prompt Setup Part 2 Port ConfigurationTurn Spanning Tree Protocol on or off at the prompt Enter new Vlan tag support d/e System prompts you to configure the next Vlan Setup Part 3 VLANsTo keep the current setting, press Enter Setup Part 4 IP ConfigurationIP Interfaces System prompts you to configure another interface System prompts you to configure another default gateway Default GatewaysIP Routing When prompted, decide whether to restart Setup or continue Setup Part 5 Final StepsApply and save the configurations Optional Setup for Telnet Support# /cfg/sys/access/tnet Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Secure Shell and Secure Copy Securing AdministrationTo Enable or Disable the SSH Feature Configuring SSH/SCP Features on the SwitchTo Enable or Disable SCP Apply and Save To Copy the Switch Configuration File to the SCP Host Configuring the SCP Administrator PasswordUsing SSH and SCP Client Commands To Log In to the SwitchTo Apply and Save the Configuration To Load a Switch Configuration File from the SCP HostScp ad4.cfg scpadmin@205.178.15.157putcfg Encryption To Copy the Switch Image and Boot Files to the SCP HostTo Load Switch Configuration Files from the SCP Host SSH and SCP Encryption of Management MessagesSSH/SCP Integration with Radius Authentication Generating RSA Host and Server Keys for SSH AccessSecurID Support SSH/SCP Integration with TACACS+ AuthenticationUsing SecurID with SSH Using SecurID with SCPConsiderations for Configuring End User Accounts End User Access ControlStrong Passwords Validating a User’s Configuration User Access ControlSetting up User IDs Defining a User’s Access LevelListing Current Users RS G8124# show access UserLogging into an End User Account Radius Authentication and Authorization Authentication & Authorization ProtocolsRS G8124config# radius-server port UDP port number How Radius Authentication WorksConfiguring Radius on the Switch Configure the Radius secretRS G8124# show radius-server Radius Authentication Features in BladeosRadius Attributes for Bladeos User Privileges Switch User AccountsBLADEOS-proprietary Attributes for Radius How TACACS+ Authentication Works TACACS+ AuthenticationDefault TACACS+ Authorization Levels TACACS+ Authentication Features in BladeosAlternate TACACS+ Authorization Levels Accounting Command Authorization and LoggingConfigure the TACACS+ secret and second secret Configuring TACACS+ Authentication on the SwitchRS G8124config# tacacs-server port TCP port number Configuring the Ldap Server Ldap Authentication and Authorization# ldap-server port Configuring Ldap Authentication on the SwitchConfigure the domain name # ldap-server retransmit # ldap-server timeoutRS G8124config# access-control list Regular ACL number ? Access Control ListsRS G8124config# access-control list6 IPv6 ACL number ? Well-Known Protocol Types Summary of Packet ClassifiersIcmp Igmp Tcp Udp Well-Known TCP flag values Well-Known Application PortsAssigning Individual ACLs to a Port Summary of ACL ActionsACL Order of Precedence Metering ACL Metering and Re-MarkingRe-Marking ACL Port Mirroring RS G8124config# access-control list ACL number mirror portRS G8124config# access-control vmap VMap number mirror port RS G8124config# access-control list ACL number statisticsAdd ACL 2 to port EXT2 ACL Configuration ExamplesACL Example Add ACL 1 to port EXT1Vlan Maps RS G8124config-if#access-control list6Non-serverports RS G8124config# access-control vmap Vmap ID ?Serverportsnon-serverports Broadcast Storms Using Storm Control FiltersConfiguring Storm Control RS G8124config-if#dest-lookup-threshold packet ratePart 3 Switch Basics Part 3 Switch Basics VLANs VLANs and Port Vlan ID Numbers VLANs OverviewVlan Numbers Pvid Numbers Use the following command to set the port PvidRS G8124# show interface information Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Topologies and Design Considerations Vlan Configuration RulesMultiple VLANs with VLAN-Tagged Gigabit Adapters Multiple VLANs with Tagging AdaptersMultiple VLANs Example Features of this Vlan are described belowEnable tagging on uplink ports that support multiple VLANs Vlan Configuration ExampleConfigure the VLANs and their member ports Private Vlan Ports Private VLANsVerify the configuration Configuration GuidelinesConfiguration Example Configure a secondary Vlan and map it to the primary VlanBladeos 6.5.2 Application Guide Ports and Trunking Port Trunk Group Trunking OverviewBefore You Configure Static Trunks Example below, three ports are trunked between two switches Trunk Group Configuration RulesPort Trunking Example # show portchannel information Follow these steps on the G8124 a. Define a trunk groupLayer 3 IPv4/IPv6 source IP address Configurable Trunk Hash AlgorithmLayer 2 destination MAC address Layer 2 source and destination MAC addressLink Aggregation Control Protocol Actor vs. Partner Lacp configurationSet the Lacp mode Configuring LacpRS G8124 # show lacp information Spanning Tree Protocol Modes Spanning Tree ProtocolsGlobal STP Control Depending on your preferred STG configurationsRS G8124config# spanning-tree mode disable RS G8124config# spanning-tree mode pvstrstppvrstmstPort States STP/PVST+ ModePorts, Trunk Groups, and VLANs Bridge Protocol Data Units RS G8124config# spanning-tree stp x bridge priorityBridge Priority Port Priority Fast Uplink ConvergencePort Path Cost Port Fast Forwarding Fast Uplink Configuration GuidelinesConfiguring Fast Uplink Convergence RS G8124config# spanning-tree uplinkfastSwitch Simple STP ConfigurationBlocks Link Server RS G8124config-if#spanning-tree stp 1 path-cost Restores Link ServerPer-VLAN Spanning Tree Groups Using Multiple Instances of Spanning Tree GroupSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration RS G8124config# spanning-tree stp 2 vlan 2,3 Configuring Multiple STGsRS G8124config# spanning-tree stp 2 vlan RS G8124config# spanning-tree stp 2 vlan Port State Changes Rapid Spanning Tree ProtocolRstp vs. STP Port states RS G8124config# spanning-tree mode rstp Rstp Configuration GuidelinesRstp Configuration Example Configure STP Group 1 parametersRS G8124config# spanning-tree mode pvrst Configuring PvrstPer-VLAN Rapid Spanning Tree Groups Mstp Region Multiple Spanning Tree ProtocolCommon Internal Spanning Tree Mstp Configuration Example Mstp Configuration GuidelinesAssign VLANs to Spanning Tree Groups Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version Link Type RS G8124config-if# no spanning-tree link-type typePort Type and Link Type Edge PortBladeos 6.5.2 Application Guide QoS Overview Quality of ServiceQoS Model Shows the basic QoS model used by the switchSummary of ACL Actions Using ACL FiltersACL Metering and Re-Marking Differentiated Services Concepts Using Dscp Values to Provide QoSHighest Per Hop BehaviorLowest Network Control Default QoS Service LevelsQoS Levels CriticalDscp Re-Marking and Mapping RS G8124config# qos dscp re-markingRS G8124# show qos dscp Enable Dscp re-marking on a port Dscp Re-Marking Configuration ExampleRS G8124config-if#qos dscp dscp-remarking Layer 2 802.1q/802.1p Vlan tagged packet Using 802.1p Priority to Provide QoSQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Available Profiles Deployment ProfilesDeployment Mode Comparison Selecting Profiles Automatic Configuration ChangesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtualizing the NIC for Multiple Virtual Pipes on Each Link Virtual NICsDefining Server Ports Enabling the vNIC FeatureVNIC ID Correlation VNIC IDs on the SwitchVNIC IDs VNIC Interface Names on the ServerVNIC Bandwidth Metering Outer and Inner Vlan Tags VNIC GroupsBladeos 6.5.2 Application Guide Disables associated server ports To BackupVNIC Teaming Failover For failover on affected VNICs only Upon Port 1 link failure, the switch To BackupConsider the following example configuration VNIC Configuration ExampleEnable the vNIC feature on the switch Configure the external trunk to be used with vNIC groupDefine the server ports Add ports, trunks, and virtual pipes to their vNIC groups VNICs for iSCSI on Emulex Eraptor RS G8124config# vnic port 1 indexRS G8124config# vnic port 2 index RS G8124config# vnic port 3 indexVMready VM Group Types VE CapacityLocal VM Groups Configuring a Local VM GroupRS G8124config# no virt vmgroup VM group number ? Distributed VM Groups RS G8124config# virt vmprofile edit profile name ?VM Profiles Initializing a Distributed VM Group RS G8124config# no virt vmgroup VM group number profileAssigning Members Removing Member VEs Synchronizing the ConfigurationAssigning a vCenter Virtualization Management ServersG8124# virt vmware scan RS G8124config# no virt vmware vcspecVCenter Scans Deleting the vCenterExporting Profiles VMware Operational CommandsVirt vmware ? Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode RS G8124config# virt vmpolicy vmbwidth VM MACindexUUID VM Policy Bandwidth Control CommandsVM Policy Bandwidth Control Bandwidth Policies vs. Bandwidth Shaping Local VE Information VMready Information DisplaysRS G8124# show virt vm G8124# show virt vm RS G8124# show virt vmware hosts VCenter Hypervisor HostsVCenter VE Details VCenter VEsRS G8124# show virt vmware vms Enable the VMready feature VMready Configuration ExampleSpecify the VMware vCenter IPv4 address Define the VM group Bladeos 6.5.2 Application Guide Fibre Channel over Ethernet on FCoE and CEEEnhanced Transmission Selection on FCoE Topology Fibre Channel over EthernetBladeos 6.5.2 Application Guide FCoE Requirements Turning CEE On or Off Converged Enhanced EthernetEffects on Link Layer Discovery Protocol CEE Effects on 802.1p Defaults Effects on 802.1p Quality of ServiceDefault ETS Bandwidth Allocation Effects on Flow Control FCoE Initialization Protocol Snooping Global FIP Snooping SettingsFIP Snooping for Specific Ports Port FCF and ENode Detection FCoE Connection TimeoutRS G8124config# fcoe fips port ports fcf-mode autoonoff RS G8124config# no fcoe fips timeout-aclFCoE VLANs FCoE ACL RulesViewing FIP Snooping Information Operational CommandsFor example RS G8124config# fcoe fips port 3 fcf-mode off FIP Snooping ConfigurationRS G8124config# fcoe fips port 2 enable RS G8124config# fcoe fips port 2 fcf-mode onPriority-Based Flow Control Global Configuration Port-Based PFC Configuration PFC Configuration ExampleG8124config# Cee global Pfc Priority Description FCoE Enable PFC for the FCoE trafficEnable PFC for the business-critical LAN application G8124config# Cee global Pfc Priority Enable802.1p Priority Values Enhanced Transmission SelectionPgid Pgid Priority GroupsAssigning Priority Values to a Priority Group Unlimited Bandwidth for Pgid Allocated Bandwidth for Pgid 0 ThroughETS Configuration Configuring ETSRS G8124config# cee global ets bandwidth 3 RS G8124config# cee global ets bandwidth 2RS G8124config# cee global ets priority-group 2 description RS G8124config# cee global ets priority-group 3 prioritiesData Center Bridging Capability Exchange Dcbx SettingsEnabling and Disabling Dcbx Peer Configuration NegotiationPFC Willing flag is set or reset using the following commandEnable desired Dcbx configuration negotiation on FCoE ports Configuring DcbxEnable desired Dcbx advertisements on other CEE ports RS G8124config# no cee port 5-24 dcbx enable Disable Dcbx for each non-CEE port as appropriateBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing IP Routing Benefits Basic IP RoutingRouting Between IP Subnets Router Legacy Network For example, consider the following topology migrationExample of Subnet Routing Switch-Based Routing TopologySubnet Routing Example IP Address Assignments Using VLANs to Segregate Broadcast DomainsSubnet Routing Example IP Interface Assignments Add ports to Vlan Subnet Routing Example Optional Vlan PortsEnable IP routing Ospf Integration Ecmp Static RoutesEcmp Route Hashing RS G8124config# show ip route static Configuring Ecmp Static RoutesSelect an Ecmp hashing method optional Dhcp Relay Agent Dynamic Host Configuration ProtocolBladeos 6.5.2 Application Guide RFC RFC 4293 RFC 3411, 3412, 3413 Internet Protocol VersionIPv6 Limitations Example IPv6 address IPv6 Address FormatAddress can be compressed as follows Unicast Address IPv6 Address TypesMulticast Anycast IPv6 Address AutoconfigurationSecond IPv6 address can be a unicast or anycast address IPv6 InterfacesNeighbor Discovery Overview Neighbor DiscoveryG8124 supports up to 1156 IPv6 routes Host vs. RouterHTTP/HTTPS servers support both IPv4 and IPv6 connections Supported ApplicationsSSH RS G8124config# ip dns ipv6 request-version ipv4ipv6Configuration Guidelines IPv6 Example IPv6 Configuration ExamplesThis section provides steps to configure IPv6 on the switch Configure the IPv6 default gatewayRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Distance Vector Protocol Routing Information ProtocolStability RIPv1 Routing UpdatesRIPv2 Poison RIPv2 in RIPv1 Compatibility ModeRIP Features Triggered UpdatesAuthentication DefaultMetric Add IP interfaces with IPv4 addresses to VLANs RIP Configuration ExampleTurn on RIP globally and enable RIP for each interface Add VLANs for routing interfaces# show ip rip # show ip routeInternet Group Management Protocol Igmp Snooping FastLeave Igmp GroupsIGMPv3 Snooping RS G8124config# no ip igmp snoop igmpv3 View dynamic Igmp information Igmp Snooping Configuration ExampleEnable IGMPv3 Snooping optional Enable the Igmp featureRS G8124config# ip igmp mrouter 5 1 Configure a Static Multicast RouterStatic Multicast Router Configure the querier election type and define the address Enable Igmp Querier on the VlanIgmp Querier Configuring the Action Configuring the RangeIgmp Filtering Assign the Igmp filter to a port Configure Igmp FilteringEnable Igmp Filtering on the switch Define an Igmp filter with IPv4 informationBladeos 6.5.2 Application Guide Border Gateway Protocol IBGP and eBGP Internal Routing Versus External RoutingForming BGP Peer Routers What is a Route Map?Incoming and Outgoing Route Maps Distributing Network Filters in Access Lists and Route MapsRS G8124config# ip match-address 1 enable Configuration OverviewPrecedence Exit Router BGP mode Enable the route mapTurn BGP on Redistributing Routes Aggregating RoutesLocal Preference Attribute BGP AttributesMetric Multi-Exit Discriminator Attribute Selecting Route Paths in BGP BGP Failover Configuration Example BGP Failover Configuration# ip routing Configure BGP peer router 1 and 2 with IPv4 addresses# router bgp Default Redistribution and Route Aggregation Example# ip router-id Configure redistribution for Peer Bladeos 6.5.2 Application Guide OSPFv2 Overview OspfOspf Area Types Types of Ospf AreasOspf Domain and an Autonomous System Types of Ospf Routing DevicesLink-State Database Neighbors and AdjacenciesInternal Versus External Routing Shortest Path First TreeOSPFv2 Implementation in Bladeos Configurable ParametersArea index set to an arbitrary value Defining AreasArea Area-id Using the Area ID to Assign the Ospf Area Number Interface Cost Electing the Designated Router and BackupSummarizing Routes Injecting Default Routes Default RoutesRouter ID Virtual LinksNeighbor-router router ID Ospf Authentication AuthenticationEnable Ospf authentication for Area 2 on switch Configuring Plain Text Ospf PasswordsAssign MD5 key ID to Ospf virtual link on switches 2 Configure MD5 key ID for Area 0 on switches 1, 2,Assign MD5 key ID to Ospf interfaces on switches 1, 2, Enable Ospf MD5 authentication for Area 2 on switchHost Routes for Load Balancing Ospf Features Not Supported in This ReleaseOSPFv2 Configuration Examples Example 1 Simple Ospf Domain Enable OspfAttach the network interface to the backbone Define the stub areaAttach the network interface to the stub area RS G8124config# ip router-id Configuring Ospf for a Virtual Link on Switch #1Example 2 Virtual Links Attach the network interface to the transit area Define the backboneDefine the transit area Configuring Ospf for a Virtual Link on Switch #2Other Virtual Link Options Summarizing Routes Example 3 Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 RS G8124config-router-ospf#area-range 2 address 36.128.200.0 Verifying Ospf ConfigurationOSPFv3 Differences from OSPFv2 OSPFv3 Implementation in Bladeos# /stats/l3/ospf3 Iscli# /cfg/l3/ospf3 # /info/l3/ospf3RS G8124config-ip-if#ip address OSPFv3 Configuration ExampleBlade Switch RS G8124config-ip-if#ipv6 addressEnable OSPFv3 RS G8124config-router-ospf#area-range 2 address 360000000 RS G8124config-router-ospf3#area-range 1 address 360000000PIM Overview Protocol Independent MulticastSupported PIM Modes and Features Globally Enabling or Disabling the PIM Feature Basic PIM SettingsDefining an IP Interface for PIM Use Defining a PIM Network ComponentPIM Neighbor Filters Specifying the Rendezvous Point Additional Sparse Mode SettingsInfluencing the Designated Router Selection Specifying a Bootstrap RouterPIM with Igmp Using PIM with Other FeaturesUsing the CLI PIM with ACLs or VMAPsRS G8124config-ip-if#ip pim cbsr-preference PIM Configuration ExamplesSet the Bootstrap Router BSR preference RS G8124config-ip-if#ip address 10.10.1.1255.255.0.0 RS G8124config# ip pim static-rp enableExample 2 PIM-SM with Static RP Example 3 PIM-DMConfigure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals For more information on trunking, see Ports and Trunking on Basic RedundancyTrunking for Link Redundancy InternetPreemption Forward DelayFDB Update Hot LinksUse the following commands to configure Hot Links Configuring Hot LinksAMP Topology Active MultiPath ProtocolFDB Flush Health ChecksDefine the AMP group links, and enable the AMP group Configuring an Aggregator SwitchTurn AMP on, and define the aggregator Turn AMP on Configuring an Access Switch# active-multipath enable Verifying AMP OperationBladeos 6.5.2 Application Guide Monitoring Trunk Links Layer 2 FailoverBasic Layer 2 Failover Setting the Failover LimitMonitor Port State Manually Monitoring Port LinksControl Port State Spanning Tree Protocol L2 Failover with Other Features# failover trigger 1 mmon control member Configuring Layer 2 FailoverConfigure general Failover parameters # failover trigger 1 mmon monitor memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Virtual Router MAC Address Vrrp OverviewVrrp Components Virtual RouterVrrp Operation Master and Backup Virtual RouterVirtual Interface Router Selecting the Master Vrrp Router Failover MethodsVirtual Router Group Active-Active RedundancyVrrp Tracking Parameters Bladeos Extensions to VrrpAssigning Vrrp Virtual Router ID Configuring the Switch for TrackingRS G8124config-vrrp#virtual-router 1 virtual-router-id Virtual Router Deployment ConsiderationsActive-Active High-Availability Configuration High Availability ConfigurationsConfigure client and server interfaces Task 1 Configure G8124Turn on Vrrp and configure two Virtual Interface Routers Turn off Spanning Tree Protocol globally Configure portsTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Lldp Overview Link Layer Discovery ProtocolEnabling or Disabling Lldp Global Lldp SettingTransmit and Receive Control Scheduled Interval Lldp Transmit FeaturesRS G8124config# lldp refresh-interval interval RS G8124config# lldp transmission-delay intervalTrap Notifications RS G8124config# lldp holdtime-multiplier multiplierRS G8124config# lldp trap-notification-interval interval Time-to-Live for Transmitted InformationTypes of Information Transmitted Changing the Lldp Transmit StateLldp Optional Information Types Viewing Remote Device Information Lldp Receive FeaturesRS G8124config# show lldp remote-device index number Types of Information ReceivedTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Snmp Version Simple Network Management ProtocolRS G8124config# snmp-server user 1-16authentication-protocol Default ConfigurationUser Configuration Example SNMPv1 Trap Host Configuring Snmp Trap HostsConfigure a user with no authentication and password Configure an entry in the notify tableSNMPv2 Trap Host Configuration Re-enter new authentication password SNMPv3 Trap Host ConfigurationEnter current admin password Enter new authentication passwordBladeos Snmp agent supports the following standard MIBs Snmp MIBsBLADEOS-Supported Enterprise Snmp Traps Signifies that there was a STG topology change An altSwStgBlockingState trap is sent when portSignifies that the Backup interface is active Signifies that the Backup interface is not activeMIBs for Switch Image and Configuration Files Switch Images and Configuration FilesLoading a Saved Switch Configuration Loading a New Switch ImageInitiate the transfer. To save a dump file, enter Saving the Switch ConfigurationSaving a Switch Dump Set the name of dump filePart 8 Monitoring Part 8 Monitoring Rmon Overview Remote MonitoringRmon Group 1-Statistics Example ConfigurationEnable Rmon on a port RS G8124config-if# show interface port 1 rmon-countersHistory MIB Object ID Rmon Group 2-HistoryLast digit x represents the number of the port to monitor Configure the Rmon History parameters for a port Configuring Rmon HistoryView Rmon history for the port Configure the Rmon Alarm parameters to track Icmp messages Rmon Group 3-AlarmsAlarm MIB objects Configuring Rmon AlarmsRmon Group 9-Events SFlow Statistical Counters SFLOWSFlow Network Sampling G8124config# Sflow Enable SFlow Example ConfigurationRS G8124config# sflow Server G8124config# SflowMirroring Ports Port MirroringRS G8124config# port-mirroring enable Configuring Port MirroringEnable port mirroring View the current configurationPart 9 Appendices Part 9 Appendices Glossary Network. For a more detailed description, refer to RFC Two or more virtual routersWhom to share 224.0.0.18Index 199 Default password214 209310 355142 76, 249 toExamples 311 to Dense Mode 304, 306138 303 to332 15425, 35, 278 Uplink ports 154 User accountTagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.