Blade ICE G8124-E manual SNMPv3 Trap Host Configuration, Enter current admin password

Page 360

BLADEOS 6.5.2 Application Guide

SNMPv3 Trap Host Configuration

To configure a user for SNMPv3 traps, you can choose to send the traps with both privacy and authentication, with authentication only, or without privacy or authentication.

This is configured in the access table using the following commands:

RS G8124(config)# snmp-server access <1-32>level

RS G8124(config)# snmp-server target-parameters <1-16>

Configure the user in the user table accordingly.

It is not necessary to configure the community table for SNMPv3 traps because the community string is not used by SNMPv3.

The following example shows how to configure a SNMPv3 user v3trap with authentication only:

RS G8124(config)# snmp-server user 11 name v3trap

RS G8124(config)# snmp-server user 11 authentication-protocol md5 authentication-password

Changing authentication password; validation required:

Enter current admin password:

 

<admin. password>

Enter new authentication password:

<auth. password>

Re-enter new authentication password:

<auth. password>

New authentication password accepted.

 

 

RS G8124(config)# snmp-server

access 11 notify-view iso

RS G8124(config)# snmp-server

access 11 level authnopriv

RS G8124(config)# snmp-server

group 11 user-name v3trap

RS G8124(config)# snmp-server

group 11 tag v3trap

 

RS G8124(config)# snmp-server

notify 11 name v3trap

 

RS G8124(config)# snmp-server

notify 11 tag v3trap

 

RS G8124(config)# snmp-server

target-address 11 name v3trap address

47.81.25.66

 

 

 

RS G8124(config)# snmp-server

target-address 11 taglist v3trap

RS G8124(config)# snmp-server

target-address 11 parameters-name v3param

RS G8124(config)# snmp-server

target-parameters 11

name v3param

RS G8124(config)# snmp-server

target-parameters 11

user-name v3trap

RS G8124(config)# snmp-server

target-parameters 11

level authNoPriv

Note – BLADEOS 6.5 supports only IPv4 addresses for SNMP trap hosts.

360 ￿ Chapter 26: Simple Network Management Protocol

BMD00220, October 2010

Image 360
Contents Application Guide Bladeos 6.5.2 Application Guide Contents Part 2 Securing the Switch Access Control Lists Part 3 Switch Basics Quality of Service Part 4 Advanced Switching Features FCoE and CEE Part 5 IP Routing Internet Group Management Protocol Protocol Independent Multicast Part 6 High Availability Fundamentals Part 7 Network Management Part 8 Monitoring Bladeos 6.5.2 Application Guide Preface Who Should Use This GuideWhat You’ll Find in This Guide Part 2 Securing the Switch Part 5 IP Routing Additional References Part 8 MonitoringTypographic Conventions Typographic ConventionsAaBbCc123 How to Get Help Part 1 Getting Started Part 1 Getting Started Switch Administration Administration InterfacesCommand Line Interface Browser-Based InterfaceUsing the Switch Management Ports RS G8124# configure terminalEstablishing a Connection Enable ExitUsing the Switch Data Ports Configure the management IP interface/mask. Using IPv4Configure the VLAN, and enable the interface Configure the default gateway. If using IPv4Using Telnet RS G8124config# no access telnet enableUsing Secure Shell Using SSH to Access the SwitchUsing a Web Browser G8124config# access http enableG8124config# no access http enable RS G8124config# access https enableRS G8124config# access https save-certificate BBI Summary Using Simple Network Management Protocol BOOTP/DHCP Client IP Address Services Global Bootp Relay Agent Configuration Domain-Specific Bootp Relay Agent ConfigurationSwitch Login Levels User Access LevelsSetup vs. the Command Line Bladeos 6.5.2 Application Guide Initial Setup Information Needed for SetupDefault Setup Options Stopping and Restarting Setup ManuallyStopping Setup Restarting SetupSetup Part 1 Basic System Configuration When Setup is started, the system promptsEnter the hour of the current system time at the prompt Setup Part 2 Port Configuration Enter the minute of the current time at the promptTurn Spanning Tree Protocol on or off at the prompt Enter new Vlan tag support d/e Setup Part 3 VLANs System prompts you to configure the next VlanSetup Part 4 IP Configuration To keep the current setting, press EnterIP Interfaces System prompts you to configure another interface Default Gateways System prompts you to configure another default gatewayIP Routing Setup Part 5 Final Steps When prompted, decide whether to restart Setup or continueOptional Setup for Telnet Support Apply and save the configurations# /cfg/sys/access/tnet Bladeos 6.5.2 Application Guide Part 2 Securing the Switch Part 2 Securing the Switch Securing Administration Secure Shell and Secure CopyConfiguring SSH/SCP Features on the Switch To Enable or Disable the SSH FeatureTo Enable or Disable SCP Apply and Save Configuring the SCP Administrator Password Using SSH and SCP Client CommandsTo Log In to the Switch To Copy the Switch Configuration File to the SCP HostTo Load a Switch Configuration File from the SCP Host To Apply and Save the ConfigurationScp ad4.cfg scpadmin@205.178.15.157putcfg To Copy the Switch Image and Boot Files to the SCP Host To Load Switch Configuration Files from the SCP HostSSH and SCP Encryption of Management Messages EncryptionGenerating RSA Host and Server Keys for SSH Access SSH/SCP Integration with Radius AuthenticationSSH/SCP Integration with TACACS+ Authentication Using SecurID with SSHUsing SecurID with SCP SecurID SupportEnd User Access Control Considerations for Configuring End User AccountsStrong Passwords User Access Control Setting up User IDsDefining a User’s Access Level Validating a User’s ConfigurationRS G8124# show access User Listing Current UsersLogging into an End User Account Authentication & Authorization Protocols Radius Authentication and AuthorizationHow Radius Authentication Works Configuring Radius on the SwitchConfigure the Radius secret RS G8124config# radius-server port UDP port numberRadius Authentication Features in Bladeos RS G8124# show radius-serverSwitch User Accounts Radius Attributes for Bladeos User PrivilegesBLADEOS-proprietary Attributes for Radius TACACS+ Authentication How TACACS+ Authentication WorksTACACS+ Authentication Features in Bladeos Default TACACS+ Authorization LevelsAlternate TACACS+ Authorization Levels Command Authorization and Logging AccountingConfiguring TACACS+ Authentication on the Switch Configure the TACACS+ secret and second secretRS G8124config# tacacs-server port TCP port number Ldap Authentication and Authorization Configuring the Ldap ServerConfiguring Ldap Authentication on the Switch Configure the domain name# ldap-server retransmit # ldap-server timeout # ldap-server portAccess Control Lists RS G8124config# access-control list Regular ACL number ?RS G8124config# access-control list6 IPv6 ACL number ? Summary of Packet Classifiers Well-Known Protocol TypesIcmp Igmp Tcp Udp Well-Known Application Ports Well-Known TCP flag valuesSummary of ACL Actions Assigning Individual ACLs to a PortACL Order of Precedence ACL Metering and Re-Marking MeteringRe-Marking RS G8124config# access-control list ACL number mirror port RS G8124config# access-control vmap VMap number mirror portRS G8124config# access-control list ACL number statistics ACL Port MirroringACL Configuration Examples ACL ExampleAdd ACL 1 to port EXT1 Add ACL 2 to port EXT2RS G8124config-if#access-control list6 Vlan MapsRS G8124config# access-control vmap Vmap ID ? Non-serverportsServerportsnon-serverports Using Storm Control Filters Configuring Storm ControlRS G8124config-if#dest-lookup-threshold packet rate Broadcast StormsPart 3 Switch Basics Part 3 Switch Basics VLANs VLANs Overview VLANs and Port Vlan ID NumbersVlan Numbers Use the following command to set the port Pvid Pvid NumbersRS G8124# show interface information Vlan Tagging Default Vlan settings Port-based Vlan assignment 802.1Q tag assignment Vlan Configuration Rules Vlan Topologies and Design ConsiderationsMultiple VLANs with Tagging Adapters Multiple VLANs with VLAN-Tagged Gigabit AdaptersFeatures of this Vlan are described below Multiple VLANs ExampleVlan Configuration Example Enable tagging on uplink ports that support multiple VLANsConfigure the VLANs and their member ports Private VLANs Private Vlan PortsConfiguration Guidelines Configuration ExampleConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationBladeos 6.5.2 Application Guide Ports and Trunking Trunking Overview Port Trunk GroupBefore You Configure Static Trunks Trunk Group Configuration Rules Example below, three ports are trunked between two switchesPort Trunking Example Follow these steps on the G8124 a. Define a trunk group # show portchannel informationConfigurable Trunk Hash Algorithm Layer 2 destination MAC addressLayer 2 source and destination MAC address Layer 3 IPv4/IPv6 source IP addressActor vs. Partner Lacp configuration Link Aggregation Control ProtocolConfiguring Lacp Set the Lacp modeRS G8124 # show lacp information Spanning Tree Protocols Spanning Tree Protocol ModesDepending on your preferred STG configurations RS G8124config# spanning-tree mode disableRS G8124config# spanning-tree mode pvstrstppvrstmst Global STP ControlSTP/PVST+ Mode Port StatesPorts, Trunk Groups, and VLANs RS G8124config# spanning-tree stp x bridge priority Bridge Protocol Data UnitsBridge Priority Fast Uplink Convergence Port PriorityPort Path Cost Fast Uplink Configuration Guidelines Configuring Fast Uplink ConvergenceRS G8124config# spanning-tree uplinkfast Port Fast ForwardingSimple STP Configuration SwitchBlocks Link Server Restores Link Server RS G8124config-if#spanning-tree stp 1 path-costUsing Multiple Instances of Spanning Tree Group Per-VLAN Spanning Tree GroupsSTP/PVST+ Defaults and Guidelines Creating a Vlan Adding and Removing Ports from STGs Switch-Centric Configuration Configuring Multiple STGs RS G8124config# spanning-tree stp 2 vlan 2,3RS G8124config# spanning-tree stp 2 vlan RS G8124config# spanning-tree stp 2 vlan Rapid Spanning Tree Protocol Port State ChangesRstp vs. STP Port states Rstp Configuration Guidelines Rstp Configuration ExampleConfigure STP Group 1 parameters RS G8124config# spanning-tree mode rstpConfiguring Pvrst RS G8124config# spanning-tree mode pvrstPer-VLAN Rapid Spanning Tree Groups Multiple Spanning Tree Protocol Mstp RegionCommon Internal Spanning Tree Mstp Configuration Guidelines Mstp Configuration ExampleAssign VLANs to Spanning Tree Groups Passing Vlan Blocking Vlan Configure Mstp Spanning Tree mode, region name, and version RS G8124config-if# no spanning-tree link-type type Port Type and Link TypeEdge Port Link TypeBladeos 6.5.2 Application Guide Quality of Service QoS OverviewShows the basic QoS model used by the switch QoS ModelUsing ACL Filters Summary of ACL ActionsACL Metering and Re-Marking Using Dscp Values to Provide QoS Differentiated Services ConceptsPer Hop Behavior HighestLowest Default QoS Service Levels QoS LevelsCritical Network ControlRS G8124config# qos dscp re-marking Dscp Re-Marking and MappingRS G8124# show qos dscp Dscp Re-Marking Configuration Example Enable Dscp re-marking on a portRS G8124config-if#qos dscp dscp-remarking Using 802.1p Priority to Provide QoS Layer 2 802.1q/802.1p Vlan tagged packetQueuing and Scheduling Bladeos 6.5.2 Application Guide Part 4 Advanced Switching Features Part 4 Advanced Switching Features Deployment Profiles Available ProfilesDeployment Mode Comparison Automatic Configuration Changes Selecting ProfilesBladeos 6.5.2 Application Guide Virtualization Virtualization Virtual NICs Virtualizing the NIC for Multiple Virtual Pipes on Each LinkEnabling the vNIC Feature Defining Server PortsVNIC IDs on the Switch VNIC IDsVNIC Interface Names on the Server VNIC ID CorrelationVNIC Bandwidth Metering VNIC Groups Outer and Inner Vlan TagsBladeos 6.5.2 Application Guide To Backup Disables associated server portsVNIC Teaming Failover Upon Port 1 link failure, the switch To Backup For failover on affected VNICs onlyVNIC Configuration Example Consider the following example configurationConfigure the external trunk to be used with vNIC group Enable the vNIC feature on the switchDefine the server ports Add ports, trunks, and virtual pipes to their vNIC groups RS G8124config# vnic port 1 index RS G8124config# vnic port 2 indexRS G8124config# vnic port 3 index VNICs for iSCSI on Emulex EraptorVMready VE Capacity VM Group TypesConfiguring a Local VM Group Local VM GroupsRS G8124config# no virt vmgroup VM group number ? RS G8124config# virt vmprofile edit profile name ? Distributed VM GroupsVM Profiles RS G8124config# no virt vmgroup VM group number profile Initializing a Distributed VM GroupAssigning Members Synchronizing the Configuration Removing Member VEsVirtualization Management Servers Assigning a vCenterRS G8124config# no virt vmware vcspec VCenter ScansDeleting the vCenter G8124# virt vmware scanVMware Operational Commands Exporting ProfilesVirt vmware ? Pre-Provisioning VEs Vlan Maps For a VM group, use the global configuration mode VM Policy Bandwidth Control Commands RS G8124config# virt vmpolicy vmbwidth VM MACindexUUIDVM Policy Bandwidth Control Bandwidth Policies vs. Bandwidth Shaping VMready Information Displays Local VE InformationRS G8124# show virt vm G8124# show virt vm VCenter Hypervisor Hosts RS G8124# show virt vmware hostsVCenter VEs VCenter VE DetailsRS G8124# show virt vmware vms VMready Configuration Example Enable the VMready featureSpecify the VMware vCenter IPv4 address Define the VM group Bladeos 6.5.2 Application Guide FCoE and CEE Fibre Channel over Ethernet onEnhanced Transmission Selection on Fibre Channel over Ethernet FCoE TopologyBladeos 6.5.2 Application Guide FCoE Requirements Converged Enhanced Ethernet Turning CEE On or OffEffects on Link Layer Discovery Protocol Effects on 802.1p Quality of Service CEE Effects on 802.1p DefaultsDefault ETS Bandwidth Allocation Effects on Flow Control Global FIP Snooping Settings FCoE Initialization Protocol SnoopingFIP Snooping for Specific Ports FCoE Connection Timeout RS G8124config# fcoe fips port ports fcf-mode autoonoffRS G8124config# no fcoe fips timeout-acl Port FCF and ENode DetectionFCoE ACL Rules FCoE VLANsOperational Commands Viewing FIP Snooping InformationFor example FIP Snooping Configuration RS G8124config# fcoe fips port 2 enableRS G8124config# fcoe fips port 2 fcf-mode on RS G8124config# fcoe fips port 3 fcf-mode offPriority-Based Flow Control Global Configuration PFC Configuration Example Port-Based PFC ConfigurationEnable PFC for the FCoE traffic Enable PFC for the business-critical LAN applicationG8124config# Cee global Pfc Priority Enable G8124config# Cee global Pfc Priority Description FCoEEnhanced Transmission Selection 802.1p Priority ValuesPgid Priority Groups PgidAssigning Priority Values to a Priority Group Allocated Bandwidth for Pgid 0 Through Unlimited Bandwidth for PgidConfiguring ETS ETS ConfigurationRS G8124config# cee global ets bandwidth 2 RS G8124config# cee global ets priority-group 2 descriptionRS G8124config# cee global ets priority-group 3 priorities RS G8124config# cee global ets bandwidth 3Dcbx Settings Data Center Bridging Capability ExchangePeer Configuration Negotiation Enabling and Disabling DcbxWilling flag is set or reset using the following command PFCConfiguring Dcbx Enable desired Dcbx configuration negotiation on FCoE portsEnable desired Dcbx advertisements on other CEE ports Disable Dcbx for each non-CEE port as appropriate RS G8124config# no cee port 5-24 dcbx enableBladeos 6.5.2 Application Guide Part 5 IP Routing Part 5 IP Routing Basic IP Routing IP Routing BenefitsRouting Between IP Subnets For example, consider the following topology migration Router Legacy NetworkSwitch-Based Routing Topology Example of Subnet RoutingUsing VLANs to Segregate Broadcast Domains Subnet Routing Example IP Address AssignmentsSubnet Routing Example IP Interface Assignments Subnet Routing Example Optional Vlan Ports Add ports to VlanEnable IP routing Ecmp Static Routes Ospf IntegrationEcmp Route Hashing Configuring Ecmp Static Routes RS G8124config# show ip route staticSelect an Ecmp hashing method optional Dynamic Host Configuration Protocol Dhcp Relay AgentBladeos 6.5.2 Application Guide Internet Protocol Version RFC RFC 4293 RFC 3411, 3412, 3413IPv6 Limitations IPv6 Address Format Example IPv6 addressAddress can be compressed as follows IPv6 Address Types Unicast AddressMulticast IPv6 Address Autoconfiguration AnycastIPv6 Interfaces Second IPv6 address can be a unicast or anycast addressNeighbor Discovery Neighbor Discovery OverviewHost vs. Router G8124 supports up to 1156 IPv6 routesSupported Applications HTTP/HTTPS servers support both IPv4 and IPv6 connectionsRS G8124config# ip dns ipv6 request-version ipv4ipv6 SSHConfiguration Guidelines IPv6 Configuration Examples This section provides steps to configure IPv6 on the switchConfigure the IPv6 default gateway IPv6 ExampleRS G8124config-ip-if# show layer3 Bladeos 6.5.2 Application Guide Routing Information Protocol Distance Vector ProtocolStability Routing Updates RIPv1RIPv2 RIPv2 in RIPv1 Compatibility Mode RIP FeaturesTriggered Updates PoisonDefault AuthenticationMetric RIP Configuration Example Turn on RIP globally and enable RIP for each interfaceAdd VLANs for routing interfaces Add IP interfaces with IPv4 addresses to VLANs# show ip route # show ip ripInternet Group Management Protocol Igmp Snooping Igmp Groups FastLeaveIGMPv3 Snooping RS G8124config# no ip igmp snoop igmpv3 Igmp Snooping Configuration Example Enable IGMPv3 Snooping optionalEnable the Igmp feature View dynamic Igmp informationConfigure a Static Multicast Router RS G8124config# ip igmp mrouter 5 1Static Multicast Router Enable Igmp Querier on the Vlan Configure the querier election type and define the addressIgmp Querier Configuring the Range Configuring the ActionIgmp Filtering Configure Igmp Filtering Enable Igmp Filtering on the switchDefine an Igmp filter with IPv4 information Assign the Igmp filter to a portBladeos 6.5.2 Application Guide Border Gateway Protocol Internal Routing Versus External Routing IBGP and eBGPWhat is a Route Map? Forming BGP Peer RoutersDistributing Network Filters in Access Lists and Route Maps Incoming and Outgoing Route MapsConfiguration Overview RS G8124config# ip match-address 1 enablePrecedence Enable the route map Exit Router BGP modeTurn BGP on Aggregating Routes Redistributing RoutesBGP Attributes Local Preference AttributeMetric Multi-Exit Discriminator Attribute Selecting Route Paths in BGP BGP Failover Configuration BGP Failover Configuration ExampleConfigure BGP peer router 1 and 2 with IPv4 addresses # ip routingDefault Redistribution and Route Aggregation Example # router bgp# ip router-id Configure redistribution for Peer Bladeos 6.5.2 Application Guide Ospf OSPFv2 OverviewTypes of Ospf Areas Ospf Area TypesTypes of Ospf Routing Devices Ospf Domain and an Autonomous SystemNeighbors and Adjacencies Link-State DatabaseShortest Path First Tree Internal Versus External RoutingConfigurable Parameters OSPFv2 Implementation in BladeosDefining Areas Area index set to an arbitrary valueArea Area-id Using the Area ID to Assign the Ospf Area Number Electing the Designated Router and Backup Interface CostSummarizing Routes Default Routes Injecting Default RoutesVirtual Links Router IDNeighbor-router router ID Authentication Ospf AuthenticationConfiguring Plain Text Ospf Passwords Enable Ospf authentication for Area 2 on switchConfigure MD5 key ID for Area 0 on switches 1, 2, Assign MD5 key ID to Ospf interfaces on switches 1, 2,Enable Ospf MD5 authentication for Area 2 on switch Assign MD5 key ID to Ospf virtual link on switches 2Ospf Features Not Supported in This Release Host Routes for Load BalancingOSPFv2 Configuration Examples Enable Ospf Example 1 Simple Ospf DomainDefine the stub area Attach the network interface to the backboneAttach the network interface to the stub area Configuring Ospf for a Virtual Link on Switch #1 RS G8124config# ip router-idExample 2 Virtual Links Define the backbone Attach the network interface to the transit areaConfiguring Ospf for a Virtual Link on Switch #2 Define the transit areaOther Virtual Link Options Example 3 Summarizing Routes Summarizing RoutesRS G8124config-router-ospf#area-range 1 address 36.128.192.0 Verifying Ospf Configuration RS G8124config-router-ospf#area-range 2 address 36.128.200.0OSPFv3 Implementation in Bladeos OSPFv3 Differences from OSPFv2Iscli # /cfg/l3/ospf3# /info/l3/ospf3 # /stats/l3/ospf3OSPFv3 Configuration Example Blade SwitchRS G8124config-ip-if#ipv6 address RS G8124config-ip-if#ip addressEnable OSPFv3 RS G8124config-router-ospf3#area-range 1 address 360000000 RS G8124config-router-ospf#area-range 2 address 360000000Protocol Independent Multicast PIM OverviewSupported PIM Modes and Features Basic PIM Settings Globally Enabling or Disabling the PIM FeatureDefining a PIM Network Component Defining an IP Interface for PIM UsePIM Neighbor Filters Additional Sparse Mode Settings Specifying the Rendezvous PointSpecifying a Bootstrap Router Influencing the Designated Router SelectionUsing PIM with Other Features Using the CLIPIM with ACLs or VMAPs PIM with IgmpPIM Configuration Examples Set the Bootstrap Router BSR preferenceRS G8124config-ip-if#ip address 10.10.1.1 RS G8124config-ip-if#ip pim cbsr-preferenceRS G8124config# ip pim static-rp enable Example 2 PIM-SM with Static RPExample 3 PIM-DM 255.255.0.0Configure a PIM component and set the PIM mode Bladeos 6.5.2 Application Guide Part 6 High Availability Fundamentals High Availability Fundamentals Basic Redundancy Trunking for Link RedundancyInternet For more information on trunking, see Ports and Trunking onForward Delay FDB UpdateHot Links PreemptionConfiguring Hot Links Use the following commands to configure Hot LinksActive MultiPath Protocol AMP TopologyHealth Checks FDB FlushConfiguring an Aggregator Switch Define the AMP group links, and enable the AMP groupTurn AMP on, and define the aggregator Configuring an Access Switch # active-multipath enableVerifying AMP Operation Turn AMP onBladeos 6.5.2 Application Guide Layer 2 Failover Monitoring Trunk LinksSetting the Failover Limit Basic Layer 2 FailoverManually Monitoring Port Links Monitor Port StateControl Port State L2 Failover with Other Features Spanning Tree ProtocolConfiguring Layer 2 Failover Configure general Failover parameters# failover trigger 1 mmon monitor member # failover trigger 1 mmon control memberBladeos 6.5.2 Application Guide Virtual Router Redundancy Protocol Vrrp Overview Vrrp ComponentsVirtual Router Virtual Router MAC AddressMaster and Backup Virtual Router Vrrp OperationVirtual Interface Router Failover Methods Selecting the Master Vrrp RouterActive-Active Redundancy Virtual Router GroupBladeos Extensions to Vrrp Vrrp Tracking ParametersConfiguring the Switch for Tracking RS G8124config-vrrp#virtual-router 1 virtual-router-idVirtual Router Deployment Considerations Assigning Vrrp Virtual Router IDHigh Availability Configurations Active-Active High-Availability ConfigurationTask 1 Configure G8124 Configure client and server interfacesTurn on Vrrp and configure two Virtual Interface Routers Configure ports Turn off Spanning Tree Protocol globallyTask 2 Configure G8124 Virtual-router 2 priority Part 7 Network Management Part 7 Network Management Link Layer Discovery Protocol Lldp OverviewGlobal Lldp Setting Enabling or Disabling LldpTransmit and Receive Control Lldp Transmit Features RS G8124config# lldp refresh-interval intervalRS G8124config# lldp transmission-delay interval Scheduled IntervalRS G8124config# lldp holdtime-multiplier multiplier RS G8124config# lldp trap-notification-interval intervalTime-to-Live for Transmitted Information Trap NotificationsChanging the Lldp Transmit State Types of Information TransmittedLldp Optional Information Types Lldp Receive Features RS G8124config# show lldp remote-device index numberTypes of Information Received Viewing Remote Device InformationTime-to-Live for Received Information Lldp Example Configuration Bladeos 6.5.2 Application Guide Simple Network Management Protocol Snmp VersionDefault Configuration RS G8124config# snmp-server user 1-16authentication-protocolUser Configuration Example Configuring Snmp Trap Hosts Configure a user with no authentication and passwordConfigure an entry in the notify table SNMPv1 Trap HostSNMPv2 Trap Host Configuration SNMPv3 Trap Host Configuration Enter current admin passwordEnter new authentication password Re-enter new authentication passwordSnmp MIBs Bladeos Snmp agent supports the following standard MIBsBLADEOS-Supported Enterprise Snmp Traps An altSwStgBlockingState trap is sent when port Signifies that the Backup interface is activeSignifies that the Backup interface is not active Signifies that there was a STG topology changeSwitch Images and Configuration Files MIBs for Switch Image and Configuration FilesLoading a New Switch Image Loading a Saved Switch ConfigurationSaving the Switch Configuration Saving a Switch DumpSet the name of dump file Initiate the transfer. To save a dump file, enterPart 8 Monitoring Part 8 Monitoring Remote Monitoring Rmon OverviewExample Configuration Enable Rmon on a portRS G8124config-if# show interface port 1 rmon-counters Rmon Group 1-StatisticsRmon Group 2-History History MIB Object IDLast digit x represents the number of the port to monitor Configuring Rmon History Configure the Rmon History parameters for a portView Rmon history for the port Rmon Group 3-Alarms Alarm MIB objectsConfiguring Rmon Alarms Configure the Rmon Alarm parameters to track Icmp messagesRmon Group 9-Events SFLOW SFlow Statistical CountersSFlow Network Sampling SFlow Example Configuration RS G8124config# sflow ServerG8124config# Sflow G8124config# Sflow EnablePort Mirroring Mirroring PortsConfiguring Port Mirroring Enable port mirroringView the current configuration RS G8124config# port-mirroring enablePart 9 Appendices Part 9 Appendices Glossary Two or more virtual routers Whom to share224.0.0.18 Network. For a more detailed description, refer to RFCIndex Default password 214209 199355 14276, 249 to 310Dense Mode 304, 306 138303 to Examples 311 to154 25, 35, 278Uplink ports 154 User account 332Tagging 45, 89 to
Related manuals
Manual 28 pages 13.12 Kb

G8124-E, G8124 specifications

The Blade ICE G8124 is a cutting-edge networking solution designed for high-performance data center environments. It has emerged as a popular choice among organizations that require reliable and efficient network infrastructure to support their growing demands for bandwidth and low-latency connectivity.

One of the key features of the Blade ICE G8124 is its high port density. This networking device typically offers 24 ports of 10 Gigabit Ethernet, ensuring that businesses can connect numerous devices without requiring extensive physical space. The design is also scalable, accommodating future expansion as organizational needs grow.

Another significant aspect of the G8124 is its advanced switching capabilities. It utilizes a non-blocking architecture, enabling simultaneous data transmissions on all ports. This characteristic ensures that there is no bottleneck in the network traffic, providing the high performance needed in data-intensive applications.

The G8124 incorporates various technologies to enhance its functionalities. It supports Layer 2 and Layer 3 switching, making it versatile for different networking needs. Additionally, it features comprehensive Quality of Service (QoS) settings that prioritize critical applications, such as VoIP and video streaming, ensuring smooth operation even under heavy loads.

In terms of security, the Blade ICE G8124 provides robust measures to protect the network. It supports features such as Access Control Lists (ACLs), port security, and VLANs, allowing administrators to segment the network and restrict unauthorized access. These security capabilities are vital in today’s landscape, where cyber threats are increasingly common.

Moreover, the G8124 offers excellent management features. It includes an intuitive user interface for easy configuration and monitoring of network performance. SNMP support allows integration with network management systems, providing administrators with insights needed to optimize their operations.

Power efficiency is also a hallmark of the Blade ICE G8124. It employs energy-saving technologies that reduce operational costs, an essential factor for environmentally-conscious organizations striving to minimize their carbon footprint.

In summary, the Blade ICE G8124 stands out with its high port density, advanced switching capabilities, robust security features, and efficient management options. This networking solution is designed to meet the demands of modern data centers, providing the performance, reliability, and scalability that organizations require. With its innovative technologies, the G8124 ensures that businesses can navigate the complexities of today's networking landscape effectively.