Blade Network Technologies G8000 Application Manual

Download or browse on-line these Application Manual for Blade Network Technologies G8000 Switch.

Blade Network Technologies G8000 Manual Information:

This manual for Blade Network Technologies G8000, given in the PDF format, is available for free online viewing and download without logging on. The guide contains 145 pages, and the size of the file at download is 1.27 Mb. The document type is Application Manual.

Download Manual

More Manuals:

In case you failed to obtain relevant information in this document, please, look through related operating manuals and user instructions for Blade Network Technologies G8000. Just click one of the links below to go to the selected manual:

Summary of Contents:

[Page 1] Blade Network Technologies G8000

2350 Mission College Blvd. Suite 600 Santa Clara, CA 95054 www.bladenetwork.net RackSwitch G8000 Application Guide Version 1.0 TM Part Number: BMD00041, November 2008 ...

[Page 2] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 2 BMD00041, November 2008 Copyright © 2009 Blade Network Technologies, Inc., 2350 Mission College Blvd., Suite 600, Santa Clara, California, 95054, USA. All rights reserved. Part Number: BMD00041. This document i...

[Page 3] Blade Network Technologies G8000

BMD00041, November 2008 3 Contents Preface 11 Who Should Use This Guide 11 What You’ll Find in This Guide 12 Typographic Conventions 13 How to Get Help 14 Chapter 1: Accessing the Switch 15 Configuring an IP Interface 16 Using Telnet 17 Using the B...

[Page 4] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 4 BMD00041, November 2008 Chapter 3: VLANs 47 Overview 48 VLANs and Port VLAN ID Numbers 49 VLAN numbers 49 PVID numbers 50 VLAN Tagging 51 VLAN Topologies and Design Considerations 55 VLAN configuration rules 55 M...

[Page 5] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 5BMD00041, November 2008 Why do we need multiple Spanning Trees? 84 PVRST configuration guidelines 85 Configuring PVRST 85 Multiple Spanning Tree Protocol 86 MSTP Region 86 Common Internal Spanning Tree 86 MSTP con...

[Page 6] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 6 BMD00041, November 2008 Chapter 8: Basic IP Routing 119 IP Routing Benefits 120 Routing Between IP Subnets 121 Example of Subnet Routing 123 Using VLANs to segregate Broadcast Domains 124 Configuration example 12...

[Page 7] Blade Network Technologies G8000

BMD00041, November 2008 7 Figures Figure 2-1:Authenticating a Port Using EAPoL 41 Figure 3-1:Default VLAN settings 52 Figure 3-2:Port-based VLAN assignment 53 Figure 3-3:802.1Q tagging (after port-based VLAN assignment) 53 Figure 3-4:802.1Q tag assig...

[Page 8] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 8 BMD00041, November 2008 ...

[Page 9] Blade Network Technologies G8000

BMD00041, November 2008 9 Tables Table 1-1: User Access Levels 29 Table 1-2: Blade OS-proprietary Attributes for RADIUS 29 Table 1-3: Default TACACS+ Authorization Levels 31 Table 1-4: Alternate TACACS+ Authorization Levels 31 Table 4-1: Actor vs. ...

[Page 10] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 10 BMD00041, November 2008 ...

[Page 11] Blade Network Technologies G8000

BMD00041, November 2008 11 Preface The RackSwitch G8000 Application Guide describes how to configure and use the software on the RackSwitch G8000 switch. For documentation about installing the switch physically, see the Installation Guide for your ...

[Page 12] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 12  Preface BMD00041, November 2008 What You’ll Find in This Guide This guide will help you plan, implement, and administer RS G8000 software. Where possible, each section provides feature overviews, usag...

[Page 13] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Preface  13BMD00041, November 2008 Typographic Conventions The following table describes the typographic styles used in this book. Table 1 Typographic Conventions Typeface or Symbol Meaning Example AaBbCc12...

[Page 14] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 14  Preface BMD00041, November 2008 How to Get Help If you need help, service, or technical assistance, call Blade Network Technologies Technical Support: US toll free calls: 1-800-414-5268 International c...

[Page 15] Blade Network Technologies G8000

BMD00041, November 2008 15 CHAPTER 1 Accessing the Switch The Blade OS software provides means for accessing, configuring, and viewing information and statistics about the RackSwitch G8000. This chapter discusses different methods of access- ing the...

[Page 16] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 16  Chapter 1: Accessing the Switch BMD00041, November 2008 Configuring an IP Interface To manage the switch using Telnet, SNMP, or a Web browser, you must configure an IP inter- face. Configure the followin...

[Page 17] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  17BMD00041, November 2008 Using Telnet A Telnet connection offers the convenience of accessing the switch from any workstation con- nected to the network. Telnet access provi...

[Page 18] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 18  Chapter 1: Accessing the Switch BMD00041, November 2008 Using the Browser-Based Interface The Browser-Based Interface (BBI) is a Web-based management interface for interactive switch access through you...

[Page 19] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  19BMD00041, November 2008 Accessing the BBI via HTTPS requires a SSL certificate to be used during the key exchange. A default certificate is created the first time HTTPS is...

[Page 20] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 20  Chapter 1: Accessing the Switch BMD00041, November 2008 Using SNMP Blade OS provides SNMP v1.0 and SNMP v3.0 support for access through any network man- agement software, such as IBM Director or HP-OpenV...

[Page 21] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  21BMD00041, November 2008 To configure an SNMP user name, enter the following command: User configuration: Users can be configured to use the authentication/privacy options...

[Page 22] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 22  Chapter 1: Accessing the Switch BMD00041, November 2008 3. Assign the user to the user group. Use the group table to link the user to a particular access group. RS G8000 (config)# snmp-server group 5 ...

[Page 23] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  23BMD00041, November 2008 Configuring SNMP Trap Hosts SNMPv1 trap host 1. Configure an entry in the notify table. 2. Specify the IP address and other trap parameters in the ...

[Page 24] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 24  Chapter 1: Accessing the Switch BMD00041, November 2008 SNMPv3 trap host configuration To configure a user for SNMPv3 traps, you can choose to send the traps with both privacy and authentication, with a...

[Page 25] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  25BMD00041, November 2008 Securing Access to the Switch Secure switch management is needed for environments that perform significant management functions across the Internet...

[Page 26] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 26  Chapter 1: Accessing the Switch BMD00041, November 2008 RADIUS Authentication and Authorization Blade OS supports the RADIUS (Remote Authentication Dial-in User Service) method to authenticate and autho...

[Page 27] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  27BMD00041, November 2008 Configuring RADIUS Use the following procedure to configure RADIUS authentication on your switch. 1. Configure the Primary and Secondary RADIUS se...

[Page 28] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 28  Chapter 1: Accessing the Switch BMD00041, November 2008 RADIUS authentication features in Blade OS Blade OS supports the following RADIUS authentication features:  Supports RADIUS client on the switch...

[Page 29] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  29BMD00041, November 2008 Switch User Accounts The user accounts listed in Table 1-1 can be defined in the RADIUS server dictionary file. RADIUS Attributes for G8000 user p...

[Page 30] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 30  Chapter 1: Accessing the Switch BMD00041, November 2008 TACACS+ Authentication Blade OS supports authentication and authorization with networks using the Cisco Systems TACACS+ protocol. The G8000 functi...

[Page 31] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  31BMD00041, November 2008 TACACS+ authentication features in Blade OS Authentication is the action of determining the identity of a user, and is generally done when the user...

[Page 32] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 32  Chapter 1: Accessing the Switch BMD00041, November 2008 If the remote user is successfully authenticated by the authentication server, the switch verifies the privileges of the remote user and authorize...

[Page 33] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  33BMD00041, November 2008 When TACACS+ Command Logging is enabled, Blade OS configuration commands are logged on the TACACS+ server. Use the following command to enable TACA...

[Page 34] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 34  Chapter 1: Accessing the Switch BMD00041, November 2008 Secure Shell Secure Shell (SSH) use secure tunnels to encrypt and secure messages between a remote administrator and the switch. Telnet does not ...

[Page 35] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  35BMD00041, November 2008 Generating RSA Host and Server Keys for SSH access To support the SSH server feature, two sets of RSA keys (host and server keys) are required. The...

[Page 36] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 36  Chapter 1: Accessing the Switch BMD00041, November 2008 End User Access Control Blade OS allows an administrator to define end user accounts that permit end users to perform operation tasks via the swit...

[Page 37] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 1: Accessing the Switch  37BMD00041, November 2008 Defining a User’s access level The end user is by default assigned to the user access level (also known as class of service, or COS). COS for al...

[Page 38] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 38  Chapter 1: Accessing the Switch BMD00041, November 2008 ...

[Page 39] Blade Network Technologies G8000

BMD00041, November 2008 39 CHAPTER 2 Port-based Network Access Control Port-Based Network Access control provides a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics. It prevent...

[Page 40] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 40  Chapter 2: Port-based Network Access Control BMD00041, November 2008 Extensible Authentication Protocol over LAN The G8000 can provide user-level security for its ports using the IEEE 802.1X protocol, wh...

[Page 41] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 2: Port-based Network Access Control  41BMD00041, November 2008 802.1X authentication process The clients and authenticators communicate using Extensible Authentication Protocol (EAP), which was ori...

[Page 42] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 42  Chapter 2: Port-based Network Access Control BMD00041, November 2008 EAPoL message exchange During authentication, EAPOL messages are exchanged between the client and the G8000 authenticator, while RADI...

[Page 43] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 2: Port-based Network Access Control  43BMD00041, November 2008 802.1X port states The state of the port determines whether the client is granted access to the network, as follows:  Unauthorized ...

[Page 44] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 44  Chapter 2: Port-based Network Access Control BMD00041, November 2008 Supported RADIUS attributes The G8000 802.1X Authenticator relies on external RADIUS servers for authentication with EAP. Table 2 lis...

[Page 45] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 2: Port-based Network Access Control  45BMD00041, November 2008 Configuration guidelines When configuring EAPoL, consider the following guidelines:  The 802.1X port-based authentication is curren...

[Page 46] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 46  Chapter 2: Port-based Network Access Control BMD00041, November 2008 ...

[Page 47] Blade Network Technologies G8000

BMD00041, November 2008 47 CHAPTER 3 VLANs This chapter describes network design and topology considerations for using Virtual Local Area Networks (VLANs). VLANs commonly are used to split up groups of network users into man- ageable broadcast domai...

[Page 48] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 48  Chapter 3: VLANs BMD00041, November 2008 Overview Setting up virtual LANs (VLANs) is a way to segment networks to increase network flexibility without changing the physical network topology. With networ...

[Page 49] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  49BMD00041, November 2008 VLANs and Port VLAN ID Numbers VLAN numbers The G8000 supports up to 1024 VLANs per switch. Even though the maximum number of VLANs supported at any given time is...

[Page 50] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 50  Chapter 3: VLANs BMD00041, November 2008 PVID numbers Each port in the switch has a configurable default VLAN number, known as its PVID. By default, the PVID for all ports is set to 1, which correlates ...

[Page 51] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  51BMD00041, November 2008 VLAN Tagging Blade OS software supports IEEE 802.1Q VLAN tagging, providing standards-based VLAN support for Ethernet systems. Tagging places the VLAN identifier ...

[Page 52] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 52  Chapter 3: VLANs BMD00041, November 2008 NOTE – If a 802.1Q tagged frame is received by a port that has VLAN-tagging disabled and the port VLAN ID (PVID) is different than the VLAN ID of the packet, t...

[Page 53] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  53BMD00041, November 2008 Figure 3-2 through Figure 3-5 illustrate generic examples of VLAN tagging. In Figure 3-2, untagged incoming packets are assigned directly to VLAN 2 (PVID = 2). Po...

[Page 54] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 54  Chapter 3: VLANs BMD00041, November 2008 In Figure 3-4, tagged incoming packets are assigned directly to VLAN 2 because of the tag assignment in the packet. Port 5 is configured as a tagged member of VL...

[Page 55] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  55BMD00041, November 2008 VLAN Topologies and Design Considerations  By default, the G8000 software is configured so that tagging is disabled on all ports.  By default, the G8000 sof...

[Page 56] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 56  Chapter 3: VLANs BMD00041, November 2008 Multiple VLANs with Tagging Adapters Figure 3-6 Example 1: Multiple VLANs with VLAN-Tagged Gigabit Adapters The features of this VLAN are described below: Com...

[Page 57] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  57BMD00041, November 2008 NOTE – VLAN tagging is required only on ports that are connected to other switches or on ports that connect to tag-capable end-stations, such as servers with VL...

[Page 58] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 58  Chapter 3: VLANs BMD00041, November 2008 VLAN configuration example Use the following procedure to configure the example network shown in Figure 3-6. 1. Enable VLAN tagging on server ports that support...

[Page 59] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  59BMD00041, November 2008 Private VLANs Private VLANs provide Layer 2 isolation between the ports within the same broadcast domain. Private VLANs can control traffic within a VLAN domain, ...

[Page 60] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 60  Chapter 3: VLANs BMD00041, November 2008  Community—A community port is a host port that belongs to a community VLAN. Com- munity ports can communicate with other ports in the same community VLAN, a...

[Page 61] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 3: VLANs  61BMD00041, November 2008 2. Configure a secondary VLAN and map it to the primary VLAN. 3. Verify the configuration. RS G8000 (config)# vlan 110 RS G8000 (config-vlan)# enable RS G8...

[Page 62] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 62  Chapter 3: VLANs BMD00041, November 2008 ...

[Page 63] Blade Network Technologies G8000

BMD00041, November 2008 63 CHAPTER 4 Ports and Trunking Trunk groups can provide super-bandwidth, multi-link connections between switches or other trunk-capable devices. A trunk group is a group of ports that act together, combining their bandwidth...

[Page 64] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 64  Chapter 4: Ports and Trunking BMD00041, November 2008 Overview When using port trunk groups between two switches, as shown in Figure 4-1, you can create a virtual link between the switches, operating up...

[Page 65] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 4: Ports and Trunking  65BMD00041, November 2008 Before you configure static trunks When you create and enable a static trunk, the trunk members (switch ports) take on certain settings necessary for...

[Page 66] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 66  Chapter 4: Ports and Trunking BMD00041, November 2008  All trunk members must be in the same Spanning Tree Group (STG) and can belong to only one Spanning Tree Group (STG). However if all ports are t...

[Page 67] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 4: Ports and Trunking  67BMD00041, November 2008 Port Trunking Example In the example below, three ports are trunked between two switches. Figure 4-1 Port Trunk Group Configuration Example Prior to ...

[Page 68] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 68  Chapter 4: Ports and Trunking BMD00041, November 2008 2. Repeat the process on the other switch. 3. Connect the switch ports that will be members in the trunk group. Trunk group 3 (on the G8000) is now ...

[Page 69] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 4: Ports and Trunking  69BMD00041, November 2008 Configurable Trunk Hash Algorithm This feature allows you to configure parameters for the trunk hash algorithm, instead of using the default values. ...

[Page 70] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 70  Chapter 4: Ports and Trunking BMD00041, November 2008 Link Aggregation Control Protocol Link Aggregation Control Protocol (LACP) is an IEEE 802.3ad standard for grouping several physical ports into one ...

[Page 71] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 4: Ports and Trunking  71BMD00041, November 2008 LACP automatically determines which member links can be aggregated and then aggregates them. It provides for the controlled addition and removal of p...

[Page 72] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 72  Chapter 4: Ports and Trunking BMD00041, November 2008 LACP configuration guidelines Consider the following guidelines when you configure LACP trunks:  When ports become members of a trunk, configurat...

[Page 73] Blade Network Technologies G8000

BMD00041, November 2008 73 CHAPTER 5 Spanning Tree When multiple paths exist on a network, Spanning Tree Protocol configures the network so that a switch uses only the most efficient path. The following topics are discussed in this chapter:  “...

[Page 74] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 74  Chapter 5: Spanning Tree BMD00041, November 2008 Overview Spanning Tree Protocol detects and eliminates logical loops in a bridged or switched network. When multiple paths exist, Spanning Tree configure...

[Page 75] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  75BMD00041, November 2008 Bridge Protocol Data Units (BPDUs) To create a Spanning Tree, the switch generates a configuration Bridge Protocol Data Unit (BPDU), which it then forward...

[Page 76] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 76  Chapter 5: Spanning Tree BMD00041, November 2008 Port Priority The port priority helps determine which bridge port becomes the root/designated port. The case for the root port is when 2 switches are con...

[Page 77] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  77BMD00041, November 2008 Assigning a VLAN to a Spanning Tree Group  If no VLANs exist beyond the default VLAN 1 see “Creating a VLAN” on page 78 for information on adding p...

[Page 78] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 78  Chapter 5: Spanning Tree BMD00041, November 2008 Creating a VLAN When you create a VLAN, that VLAN automatically belongs to STG 1, the default STG. You can assign the VLAN to another STG.  Move a ne...

[Page 79] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  79BMD00041, November 2008 As an example, assume that port 1 belongs to VLAN 2, and VLAN 2 belongs to STG 2. When you remove port 1 from VLAN 2, port 1 is also removed from STG 2. T...

[Page 80] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 80  Chapter 5: Spanning Tree BMD00041, November 2008 Rapid Spanning Tree Protocol Rapid Spanning Tree Protocol (RSTP) provides rapid convergence of the spanning tree and provides for fast re-configuration c...

[Page 81] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  81BMD00041, November 2008 Port Type and Link Type Spanning Tree configuration includes the following parameters to support RSTP and MSTP: edge port and link type. Edge Port A port...

[Page 82] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 82  Chapter 5: Spanning Tree BMD00041, November 2008 RSTP configuration example This section provides steps to configure Rapid Spanning Tree on the G8000, using the Command-Line Interface (ISCLI). Rapid Sp...

[Page 83] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  83BMD00041, November 2008 Per VLAN Rapid Spanning Tree Per VLAN Rapid Spanning Tree Plus Protocol (PVRST+) enhances the RSTP protocol by adding the ability to have multiple spannin...

[Page 84] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 84  Chapter 5: Spanning Tree BMD00041, November 2008 Why do we need multiple Spanning Trees? The following examples describe why we need multiple spanning trees. In Figure 5-1, VLAN 1 and VLAN 2 pass traffi...

[Page 85] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  85BMD00041, November 2008 PVRST configuration guidelines This section provides important information about configuring Per VLAN Rapid Spanning Tree Groups:  By default, STGs 2-...

[Page 86] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 86  Chapter 5: Spanning Tree BMD00041, November 2008 Multiple Spanning Tree Protocol Multiple Spanning Tree extends Rapid Spanning Tree Protocol through multiple Spanning Tree Groups, using multiple VLANs i...

[Page 87] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  87BMD00041, November 2008 MSTP configuration guidelines This section provides important information about configuring Multiple Spanning Tree Groups:  When MSTP is turned on, th...

[Page 88] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 88  Chapter 5: Spanning Tree BMD00041, November 2008 Figure 5-3 Implementing Multiple Spanning Tree Groups Server 1 VLAN 2 Server 2 VLAN 2 Server 3 VLAN 1 Server 4 VLAN 1 Server 5 VLAN 1 Enterprise Rou...

[Page 89] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  89BMD00041, November 2008 Configuring Multiple Spanning Tree Groups This configuration shows how to configure MSTP Groups on the switch, as shown in Figure 5-3. 1. Configure port ...

[Page 90] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 90  Chapter 5: Spanning Tree BMD00041, November 2008 3. Configure port membership and define the Spanning Tree groups for VLAN 2. Add server ports 3, 4, and 5 to VLAN 2. Add uplink ports 51 and 52 to VLAN 2...

[Page 91] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 5: Spanning Tree  91BMD00041, November 2008 Fast Uplink Convergence Fast Uplink Convergence enables the G8000 to recover quickly from the failure of the primary link or trunk group in a Layer 2 netw...

[Page 92] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 92  Chapter 5: Spanning Tree BMD00041, November 2008 ...

[Page 93] Blade Network Technologies G8000

BMD00041, November 2008 93 CHAPTER 6 Quality of Service Quality of Service features allow you to allocate network resources to mission-critical applica- tions at the expense of applications that are less sensitive to such factors as time delays or ne...

[Page 94] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 94  Chapter 6: Quality of Service BMD00041, November 2008 Overview QoS helps you allocate guaranteed bandwidth to the critical applications, and limit bandwidth for less critical applications. Applications...

[Page 95] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 6: Quality of Service  95BMD00041, November 2008 Using ACL Filters Access Control Lists are filters that allow you to classify data packets according to a particular content in the packet header, su...

[Page 96] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 96  Chapter 6: Quality of Service BMD00041, November 2008 IP Standard ACLs The switch supports up to 127 IP ACLs (standard and extended). IP Standard ACLs are num- bered from 1-1000. Use IP Standard ACLs to ...

[Page 97] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 6: Quality of Service  97BMD00041, November 2008 To create an IP Extended ACL: To delete an IP Extended ACL: Table 6-1 Well-known protocol types Number Protocol Name 1 4 6 17 89 103 icmp ip ...

[Page 98] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 98  Chapter 6: Quality of Service BMD00041, November 2008 Understanding ACL priority Each ACL has a unique priority, based on its number. The higher the ACL number, the higher the priority, so ACL 1 has the...

[Page 99] Blade Network Technologies G8000

RackSwitch G8000 Application Guide Chapter 6: Quality of Service  99BMD00041, November 2008 NOTE – To ensure your ACLs function properly, do not assign the same ACL to different ports using different filtering directions. It is recommended...

[Page 100] Blade Network Technologies G8000

RackSwitch G8000 Application Guide 100  Chapter 6: Quality of Service BMD00041, November 2008 ACL configuration examples Example 1 Use this configuration to block traffic to a specific host. All traffic that ingresses port 1 is denied if it ...