67
Configuration Guide PRIMERGY BX900/BX400 Blade Server Systems Ethernet Connection Blade Module SB6 / SB11a / SB11 IBP Version English

PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

Embed Size (px)

Citation preview

Page 1: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

Configuration Guide

PRIMERGY BX900/BX400 Blade Server Systems Ethernet Connection Blade Module SB6 / SB11a / SB11 IBP VersionEnglish

Page 2: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step
Page 3: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

PRIMERGY BX400/BX900 Connection Blades

Ethernet Connection Blades

PY CB Eth Switch/IBP 1 GB 18/6 (SB6) PY CB Eth Switch/IBP 1 GB 36/12 (SB11a) PY CB Eth Switch/IBP 1 GB 36/8+2 (SB11)

Configuration Guide

IBP version

Edition July 2011

Page 4: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 2

Comments… Suggestions… Corrections…

The User Documentation Department would like to know your opinion on this manual. Your feedback helps us to optimize our documentation to suit your individual needs.

Fax forms for sending us your comments are included at the back of the manual. There you will also find the addresses of the relevant User documentation Department.

Copyright and Trademarks

Copyright © 2011 Fujitsu Technology Solutions GmbH.

All rights reserved.

Delivery subject to availability; right of technical modifications reserved.

All hardware and software names used are trademarks of their respective manufacturers

Page 5: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 3

Content

1 Configuration Guide Overview ................................................................................ 6

2 Configuring Management ........................................................................................ 7 2.1 Configuring In-band Management IP setting ............................................................... 8 2.2 Configuring oob IP setting ........................................................................................ 11 2.3 Configuring default gateway setting .......................................................................... 13 2.4 Upload Firmware Image and Configuration File ........................................................ 15

3 Overview Uplink and downlink .............................................................................. 17

4 Packet handling in different group types ............................................................. 18

5 Configuring Uplink Sets ......................................................................................... 23 5.1 Creating Uplink Sets ................................................................................................. 23 5.2 Configuring Link State .............................................................................................. 25 5.3 Configuring Backup Port ........................................................................................... 26

6 Configuring Port Groups ....................................................................................... 27

7 Configuring VLAN Groups ..................................................................................... 29

8 Configuring Service LAN ....................................................................................... 32

9 Configuring Service VLAN ..................................................................................... 33

10 Combining Port Groups and Service (V)LAN ....................................................... 34

11 Configuring downlink LAG .................................................................................... 38 11.1 Configuring Link Aggregation with LACP .................................................................. 38 11.2 Configuring Static Link Aggregation .......................................................................... 40 11.3 Configuring Load Balance of Link Aggregation ......................................................... 42

12 Private Network ...................................................................................................... 44

13 Configuring QoS ..................................................................................................... 46 13.1 Configuring priority control ........................................................................................ 46 13.2 Configuring priority control rewrite ............................................................................ 48 13.2.1 IP Precedence value rewrite ..................................................................................... 48 13.2.2 Change queue of packets in VLAN ........................................................................... 51

14 Configuring IGMP/MLD Snooping ......................................................................... 53

15 Configuring IEEE 802.1X Authentication .............................................................. 54 15.1 Using Local User Name/ Password .......................................................................... 54 15.2 Using Remote RADIUS Server ................................................................................. 56

16 Configuring Port Mirroring .................................................................................... 58

17 Configuring SNMP Agent ....................................................................................... 59 17.1 Configuring SNMP Community ................................................................................. 59 17.2 Configuring SNMP User ........................................................................................... 60 17.3 Configuring SNMP Remote EngineID ....................................................................... 61 17.4 Configuring SNMP Traps .......................................................................................... 62 17.5 Configuring SNMP Informs ....................................................................................... 63

Page 6: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 4

18 Configuring System Log ........................................................................................ 64

Page 7: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 5

Revision History

Revision Date Editor Remark 0.1 2/18/2009 Moore C. J. Lee 1st Draft 0.2 1/31/2011 Moore C. J. Lee Add SNMP informs 0.3 7/29/2011 Moore C. J. Lee Extended VLAN Group 0.35 1/19/2012 E.Schröer Merged SB6/SB11a/SB11

Page 8: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 6

1 Configuration Guide Overview This guide describes the PRIMERGY BX400/BX900 Ethernet Connection Blade specific functions that you might encounter. Basically, the guide describes how to configure your switch or how to configure software features on your switch. It also provides detailed information about commands that have been created or changed for use by the Ethernet Connection Blade.

Where “BX900” is shown in the examples below, it is synonymous to “BX400” when working on a Primergy BX400 Blade Server System.

This document provides the following guidelines:

− Configuring Management

− Configuring Uplink Sets

− Configuring Port groups

− Configuring VLAN groups

− Configuring service LAN

− Configuring service VLAN

− Combining Port groups and service (V)LAN

− Configuring Downlink LAG

− Configuring Private Network

− Configuring QoS

− Configuring IGMP/MLD snooping

− Configuring IEEE 802.1X Authentication

− Configuring Port Mirroring

− Configuring SNMP Agent

− Configuring System Log

Mode Prompt privileged EXEC mode (BX900-CB1)# Configuration mode (BX900-CB1)(Config)# Interface mode (BX900-CB1)(Interface BX900-CB1/0/1)# Interface range mode (BX900-CB1)(if-range)#

Page 9: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 7

2 Configuring Management

The BX900 Ethernet Connection Blade could be managed via two kinds of method. One is to use console redirection from management blade, the other is to use IP network connection. Two management interfaces for IP network connection, in-band and out-of-band management interfaces, are provided for users to access and to manage the Ethernet Connection Blade.

Both of these two management interfaces could be configured to get the IP address via use DHCP at a time, but not simultaneously.

The BX900 Ethernet Connection Blade supports only one default gateway in the system. User could assign the default gateway for in-band management or out-of-band management interface, but not simultaneously. If the gateway for the in-band management is set it is only valid for the in-band management. If the user tries to set also the gateway for the out-of-band management there will be an error message saying that the gateway for the in-band management is already set and it is therefore not allowed to configure a second one. If the gateway for the out-of-band management is set it is only valid for the out-of-band management. Again an appropriate error message will be shown if it is tried to configure the in-band management gateway. If user configure one of these two management ports to get the IP address from DHCP server, the default gateway got from DHCP server will be overridden the existed one. That is, the default gateway will always be valid for the management port which is configured to use DHCP if the IP and default gateway are assigned by DHCP server successfully.

This chapter will describe how to configure IP address for the in-band and out-of-band management interfaces and how to configure the default gateway for the system on the BX900 Ethernet Connection Blade.

Page 10: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 8

2.1 Configuring In-band Management IP setting

This section will describe how to configure the in-band management IP setting.

Beginning in privileged EXEC mode, follow these steps to configure management IP setting for in-band management interface:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 ip address protocol

<bootp|dhcp|none> To set IP management interface to use bootp, dhcp or none.

Step 3 ip address <ipaddress> <netmask> [<vlanId>]

To set a fixed IP address and net mask for management interface.

Step 4 exit Return to privileged EXEC mode. Step 5 show ip interface Verify the configuration.

To configure a fixed IP address for the in-band management interface, use ip address protocol none global configuration command. To set an IP address and net mask for in-band management interface, use ip address global configuration command. To display IP setting of in-band management interface, use show ip interface privileged EXEC command.

In this example, in-band management interface is set to use IP address 192.168.2.1and net mask 255.255.255.0. With this configuration, any untagged packets with the destination IP of Ethernet Connection Blade will be allowed to access the Ethernet Connection Blade.

(BX900-CB1)#configure

(BX900-CB1)(Config)#ip address protocol none

Changing protocol mode will reset ip configuration.

Are you sure you want to continue? (y/n)y

(BX900-CB1)(Config)#ip address 192.168.2.1 255.255.255.0

(BX900-CB1)(Config)#exit

(BX900-CB1)#show ip interface

IP address and netmask: 192.168.2.1 255.255.255.0,

and address mode: User specified.

InBand Mgmt Granted Ports: BX900-CB1/0/1, BX900-CB1/0/2, BX900-CB1/0/3,

BX900-CB1/0/4, BX900-CB1/0/5, BX900-CB1/0/6,

BX900-CB1/0/7, BX900-CB1/0/8, BX900-CB1/0/9,

BX900-CB1/0/10, BX900-CB1/0/11, BX900-CB1/0/12,

BX900-CB1/0/13, BX900-CB1/0/14, BX900-CB1/0/15,

Page 11: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 9

BX900-CB1/0/16, BX900-CB1/0/17, BX900-CB1/0/18,

BX900-CB1/0/19, BX900-CB1/0/20, BX900-CB1/0/21,

BX900-CB1/0/22, BX900-CB1/0/23, BX900-CB1/0/24,

BX900-CB1/0/25, BX900-CB1/0/26, BX900-CB1/0/27,

BX900-CB1/0/28, BX900-CB1/0/29, BX900-CB1/0/30,

BX900-CB1/0/31, BX900-CB1/0/32, BX900-CB1/0/33,

BX900-CB1/0/34, BX900-CB1/0/35, BX900-CB1/0/36,

BX900-CB1/0/37, BX900-CB1/0/38, BX900-CB1/0/39,

BX900-CB1/0/40, BX900-CB1/0/41, BX900-CB1/0/42,

BX900-CB1/0/43, BX900-CB1/0/44, BX900-CB1/0/45,

BX900-CB1/0/46, BX900-CB1/0/47, BX900-CB1/0/48

InBand Mgmt Denied Ports: -

(BX900-CB1)#

In this example, assign a VLAN ID for the in-band management interface. With this configuration, the received tagged packets with the same VLAN ID will be allowed to access the Ethernet Connection Blade. Otherwise, the packets will be dropped.

(BX900-CB1)#configure

(BX900-CB1)(Config)#ip address protocol none

(BX900-CB1)(Config)#ip address 192.168.2.1 255.255.255.0 100

(BX900-CB1)(Config)#exit

(BX900-CB1)#show ip interface

IP address and netmask: 192.168.2.1 255.255.255.0 on VLAN 100,

and address mode: User specified.

InBand Mgmt Granted Ports: BX900-CB1/0/1, BX900-CB1/0/2, BX900-CB1/0/3,

BX900-CB1/0/4, BX900-CB1/0/5, BX900-CB1/0/6,

BX900-CB1/0/7, BX900-CB1/0/8, BX900-CB1/0/9,

BX900-CB1/0/10, BX900-CB1/0/11, BX900-CB1/0/12,

BX900-CB1/0/13, BX900-CB1/0/14, BX900-CB1/0/15,

BX900-CB1/0/16, BX900-CB1/0/17, BX900-CB1/0/18,

BX900-CB1/0/19, BX900-CB1/0/20, BX900-CB1/0/21,

BX900-CB1/0/22, BX900-CB1/0/23, BX900-CB1/0/24,

BX900-CB1/0/25, BX900-CB1/0/26, BX900-CB1/0/27,

BX900-CB1/0/28, BX900-CB1/0/29, BX900-CB1/0/30,

BX900-CB1/0/31, BX900-CB1/0/32, BX900-CB1/0/33,

BX900-CB1/0/34, BX900-CB1/0/35, BX900-CB1/0/36,

Page 12: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 10

BX900-CB1/0/37, BX900-CB1/0/38, BX900-CB1/0/39,

BX900-CB1/0/40, BX900-CB1/0/41, BX900-CB1/0/42,

BX900-CB1/0/43, BX900-CB1/0/44, BX900-CB1/0/45,

BX900-CB1/0/46, BX900-CB1/0/47, BX900-CB1/0/48

InBand Mgmt Denied Ports: -

(BX900-CB1)#

Page 13: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 11

2.2 Configuring oob IP setting

This section will describe how to configure the out-of-band (oob) management IP setting.

Beginning in privileged EXEC mode, follow these steps to configure management IP setting for out-of-band management interface:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 oob protocol

<bootp|dhcp|dhcp6|none> To set IP management interface to use bootp, dhcp, dhcpv6 or none.

Step 3 oob ip <ipaddr> <netmask> To set a fixed IP address and net mask for management interface.

Step 4 exit Return to privileged EXEC mode. Step 5 show oob Verify the configuration.

To configure to get IP address via DHCP protocol for the out-of-band management interface, use oob protocol dhcp global configuration command. To set an IP address and net mask for out-of-band management interface, use oob ip global configuration command. To display IP setting of out-of-band management interface, use show oob privileged EXEC command.

In this example, out-of-band management interface is configured to get the IP address via DHCP protocol.

(BX900-CB1)#configure

(BX900-CB1)(Config)#oob protocol dhcp

Changing protocol mode will reset ip configuration.

Are you sure you want to continue? (y/n)y

(BX900-CB1)(Config)#exit

(BX900-CB1)#show oob

IP Address..................................... 172.16.2.125

Subnet Mask.................................... 255.255.255.0

Default Gateway................................ 172.16.2.254

IPv6 Address................................... FE80::21E:68FF:FE85:F760/64

OOB interface Configured Protocol.............. DHCP

Burned In MAC Address.......................... 00:1E:68:85:F7:60

(BX900-CB1)#

Page 14: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 12

In this example, out-of-band management interface is configured with a fixed IP address 192.168.2.1 and a net mask 255.255.255.0.

(BX900-CB1)#configure

(BX900-CB1)(Config)#oob protocol none

Changing protocol mode will reset ip configuration.

Are you sure you want to continue? (y/n)y

(BX900-CB1)(Config)#oob ip 192.168.2.1 255.255.255.0

(BX900-CB1)#show oob

IP Address..................................... 192.168.2.1

Subnet Mask.................................... 255.255.255.0

Default Gateway................................ 0.0.0.0

IPv6 Address................................... FE80::21E:68FF:FE85:F760/64

OOB interface Configured Protocol.............. None

Burned In MAC Address.......................... 00:1E:68:85:F7:60

(BX900-CB1)#

Page 15: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 13

2.3 Configuring default gateway setting

This section will describe how to configure the default gateway for the system.

Beginning in privileged EXEC mode, follow these steps to configure default gateway from out-of-band management interface:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 oob protocol

<bootp|dhcp|dhcp6|none> To set IP management interface to use bootp, dhcp, dhcpv6 or none.

Step 3 oob ip <ipaddr> <netmask> To set a fixed IP address and net mask for management interface.

Step 4 oob gateway <gateway> To set the default gateway address. Step 5 exit Return to privileged EXEC mode. Step 6 show oob Verify the configuration.

To configure the default gateway for the out-of-band management interface, use oob gateway global configuration command. To display IP setting of out-of-band management interface, use show oob privileged EXEC command.

In this example, out-of-band management interface is configured with a fixed IP address 10.1.20.1 and default gateway 10.1.20.254.

(BX900-CB1)#configure

(BX900-CB1)(Config)#oob protocol none

Changing protocol mode will reset ip configuration.

Are you sure you want to continue? (y/n)y

(BX900-CB1)(Config)#oob ip 10.1.20.1 255.255.255.0

(BX900-CB1)(Config)#oob gateway 10.1.20.254

(BX900-CB1)(Config)#exit

(BX900-CB1)#show oob

IP Address..................................... 10.1.20.1

Subnet Mask.................................... 255.255.255.0

Default Gateway................................ 10.1.20.254

IPv6 Address................................... FE80::21E:68FF:FE85:F760/64

OOB interface Configured Protocol.............. None

Burned In MAC Address.......................... 00:1E:68:85:F7:60

(BX900-CB1)#

Page 16: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 14

Beginning in privileged EXEC mode, follow these steps to configure default gateway from in-band management interface:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 ip address protocol

<bootp|dhcp|none> To set IP management interface to use bootp, dhcp, or none.

Step 3 ip address <ipaddr> <netmask> To set a fixed IP address and net mask for management interface.

Step 4 ip default-gateway <gateway> To set the default gateway address. Step 5 exit Return to privileged EXEC mode. Step 6 show ip redirects Verify the configuration.

To configure the default gateway for the in-band management interface, use ip default-gateway global configuration command. To display IP setting of in-band management interface, use show ip redirects privileged EXEC command.

In this example, in-band management interface is configured with a fixed IP address 192.168.2.1 and default gateway 192.168.2.254.

(BX900-CB1)#configure

(BX900-CB1)(Config)#ip address protocol none

Changing protocol mode will reset ip configuration.

Are you sure you want to continue? (y/n)y

(BX900-CB1)(Config)# ip address 192.168.2.1 255.255.255.0

(BX900-CB1)(Config)#ip default-gateway 192.168.2.254

(BX900-CB1)(Config)#exit

(BX900-CB1)#show ip redirects

ip default gateway 192.168.2.254

(BX900-CB1)#

!

The gateway of in-band and out-of-band (oob) management interface can’t be set at the same time. If the gateway of oob has been set, you have to remove it beforeyou configure the gateway of in-band management interface.

Page 17: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 15

2.4 Upload Firmware Image and Configuration File

This section will describe how to upload the FW and configuration file from Ethernet Connection Blade.

Beginning in privileged EXEC mode, follow these steps to upload firmware from Ethernet Connection Blade:

Command Purpose Step 1 copy image <filename> <url> To upload firmware specified in

<filename> to the <url> address where <url>={xmodem | tftp://ipaddr/path/file | ftp://user:pass@ipaddr/path/file}

To upload a firmware, use copy image privileged EXEC command.

In this example, a firmware will be uploaded via TFTP protocol to a TFTP server with IP address 192.168.2.100.

!

Before performing the upload operation, you have to configure an IP address for your Ethernet Connection Blade via DHCP protocol or manually.

(BX900-CB1)#copy image sb11a-sw-r-0.30.0213.biz tftp://192.168.2.100/sb11a-sw-r-0.30.0213.img

Mode........................................... TFTP

Set TFTP Server IP............................. 192.168.2.100

TFTP Path...................................... ./

TFTP Filename.................................. sb11a-sw-r-0.30.0213.img

Data Type...................................... Code

Management access will be blocked for the duration of the transfer

Are you sure you want to start? (y/n)y

TFTP code transfer starting

File transfer operation completed successfully.

(BX900-CB1)#

Page 18: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 16

Beginning in privileged EXEC mode, follow these steps to upload configuration from Ethernet Connection Blade:

Command Purpose Step 1 copy startup-config <filename>

<url> To upload configuration file specified in <filename> to the <url> address where <url>={xmodem | tftp://ipaddr/path/file | ftp://user:pass@ipaddr/path/file}.

To upload a firmware, use copy startup-config privileged EXEC command.

In this example, a configuration file will be uploaded via TFTP protocol to a TFTP server with IP address 192.168.2.100.

!

Before performing the upload operation, you have to configure an IP address for your Ethernet Connection Blade via DHCP protocol or manually.

(BX900-CB1)#copy startup-config default.cfg tftp://192.168.2.100/backup_config.cfg

Mode........................................... TFTP

Set TFTP Server IP............................. 192.168.2.100

TFTP Path...................................... ./

TFTP Filename.................................. backup_config.cfg

Data Type...................................... Config File

Management access will be blocked for the duration of the transfer

Are you sure you want to start? (y/n)y

File transfer operation completed successfully.

(BX900-CB1)#

Page 19: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 17

3 Overview Uplink and downlink

The ports (EXT37~EXT48 for SB11a, EXT37-EXT46 for SB11) connected to the external network are called uplink port/external port, and the ports (INT1~INT36) connected to the NICs of server blades are called downlink port/internal port. In SB11a, it provides 12 external ports (8 RJ-45 ports and 4 SFP ports) and 36 downlink ports. In SB11, it provides 10 external ports (8 RJ-45 ports and 2 SFP+ ports) and 36 downlink ports.

Uplink ports

Each uplink port is configured as a member of a LAG in default; it provides the external access connection for Server Blade System. The configuration of uplink ports eliminates the need for the Spanning Tree Protocol to prevent network loops and also provides a redundant function for the external connection to improve network reliability.

In addition, the L2 failover feature is also provided for the uplink ports. With Network Adaptor Teaming configured on the server blade Ethernet NIC, the servers can maintain redundant links to multiple Ethernet Connection Blades within the Blade Server System to provide enhanced reliability. The L2 failover feature allows the Ethernet Connection Blade to disable the server-blade ports when all of its uplink ports are inactive. This causes the Network Adaptor Teaming software to failover to the other Ethernet Connection Blade(s) in the Blade Server System.

Downlink ports

Downlink port provides a network connection with 1Gbps full-duplex speed for the server blades. The downlink ports could be configured as a member of a LAG to combine server blade NICs connected to same Ethernet Connection Blade to provide a higher network bandwidth for a server blade.

Page 20: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 18

4 Packet handling in different group types

In IBP firmware version, it defines several groups, including Port groups, VLAN groups, Service LAN, and Service VLAN. They provide different characteristics of handling packets. Each group should combine an uplink set for its external connection. Packet handling in different group types will be introduced in this chapter.

Port Groups

The downlink ports of Ethernet Connection Blade can be combined into Port Groups. Up to 36 port groups are available for the Ethernet Connection Blade with IBP firmware version. Each Port Group could contain internal server ports (INT1-INT36).

All ports in a Port Group have the same configuration and are a member of a unique, untagged/tagged VLAN. The packets are forwarded as it is received on Ethernet Connection Blade, that is, tagged packets received from the server blades are forwarded include their tags to all ports of the Port Group and untagged packets received from the server blades are forwarded untagged to all ports of the Port Group. We call this as the VLAN transparent.

In addition, communication between Port Groups is not possible, nor is traffic from one group visible in another group.

VLAN groups

The major difference to the traditional Port Group feature is that the grouping is defined on VLAN base. It is similar to the port-based VLAN. Note that even though having identical VLAN IDs, the VLANs in different VLAN port groups are different VLANs.

The incoming untagged packets received from the server blades will be tagged with the user defined group VLAN tag and forwarded to the Uplink Set of the VLAN port group. The packets leave the uplink(s) as tagged packets, the VLAN tag is not removed at the uplink(s). If the server blade is sending tagged packets, they are dropped, except the tag is identical to the defined Service VLAN ID. In this case it is handled according the Service VLAN definition, forwarded to the Service VLAN Uplink Set.

The incoming tagged packets received at the uplink ports of VLAN port group are forwarded to the downlink (server blade); according to their group VLAN tag definition. The tag is removed at the downlink port, so that the server blades are receiving untagged packets. Packets tagged with VLAN IDs other than defined by VLAN groups are dropped at the uplink(s), except those tagged with the Service VLAN ID. They are handled according to Service VLAN group definition.

Within the set of VLAN Port Groups sharing the same Uplink Set, one VLAN can be optionally defined as “native VLAN”. This changes the tagging behavior at the uplink port for this native VLAN ID. Incoming untagged packets are not dropped, but are tagged with the native VLAN ID and forwarded to all the downlinks of this VLAN group. Incoming packets tagged with the native VLAN ID are dropped at the uplink. Tagged packets with a VLAN ID that does not match the VLAN ID of any other VLAN Port Group defined for this uplink set will be dropped. All

Page 21: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 19

outgoing packets for this VLAN group will leave the Ethernet Connection Blade untagged, and the native VLAN tag is stripped.

Service LAN

The Service LAN receives tagged packets from the server blade, but the tags are stripped when they leave the uplink (external port). Incoming untagged packets received at the uplink/external port are tagged and send to the corresponding downlinks (server blade) as tagged packets. Incoming tagged packets at uplink/external ports are dropped.

Service VLAN

The Service VLAN receives tagged packets with Service VLAN ID from the server blade, and forwards them to uplink/external port as tagged packets. Incoming tagged packets with Service VLAN ID received at the uplink/external port are sent to the corresponding downlinks/ server blade as tagged packets.

Different Service VLANs may share the same Uplink Set. If the port which is member of the Service VLAN, receives tagged packets with the Service VLAN ID (SVID), those received tagged packets will be forwarding based on Service VLAN. The Service VLANs with different VLAN IDs may overlap in internal ports. The Service VLANs with disjoint uplink sets may have identical SVID. The Service VLAN only defines the internal ports to form a group and it can define its external connection by combining Uplink Sets.

Note that (VLAN) Port Group and Service (V)LAN may overlap on the internal ports (downlinks). The untagged packets received from the server blade or uplink ports should obey the rule of the (VLAN) Port Group.

Page 22: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 20

The packet handling for each group is summarized as the following tables.

Tagged packets Untagged packets Port Group Tagged packets received from the

server blades are forwarded incl. their tags to all ports of the Port Group.

Untagged packets received from the server blades are forwarded untagged to all ports of the Port Group.

VLAN Port Group

Tagged packets received from the server blades are dropped, even if the received VLAN ID is identical to the Port Group’s VLAN ID.

Untagged packets received from the server blades are tagged with the Port Group’s VLAN ID. Packets sent to the server blades are stripped and sent untagged.

VLAN Port Group with native VLAN

Tagged packets received from the server blades are dropped, even if the received VLAN ID is identical to the Port Group’s VLAN ID.

Untagged packets received from the server blades are tagged with the Port Group’s VLAN ID. Packets sent to the server blades are stripped and sent untagged.

Service LAN Packets tagged with the VLAN ID of the Service LAN are forwarded to all ports of the Service LAN. The tagged packets are sent to the internal ports incl. the VLAN tag. At the external ports the tagged packets are stripped and leave untagged.

Untagged packets could not be “Service LAN packets”. Untagged packets are handled according to the Port Group or VLAN Port Group definition.

Service VLAN Packets tagged with the VLAN ID of the Service VLAN are forwarded to all ports of the Service VLAN. The tagged packets are sent to the internal ports incl. the VLAN tag. At the external ports the tagged packets leave including their tags.

Untagged packets could not be “Service VLAN packets”. Untagged packets are handled according to the Port Group or VLAN Port Group definition.

Table: Packet handling for the downlink/internal ports

Page 23: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 21

Tagged packets Untagged packets Port Group Tagged packets received at the external

ports are forwarded incl. their tags to all ports of the Port Group.

Untagged packets received at the external ports are forwarded untagged to all ports of the Port Group.

VLAN Port Group

Tagged packets received at the external ports are forwarded to all ports of the VLAN Port Group, which matches the VLAN ID of the tag.

Untagged packets received at the external ports are dropped.

VLAN Port Group with native VLAN

Tagged packets received at the external ports are forwarded to all ports of the VLAN Port Group, which matches the VLAN ID of the tag. Exception: Received packets tagged with the native VLAN ID are dropped.

Untagged packets received at the external ports are tagged with the VLAN ID of the native VLAN and forwarded to all ports of the VLAN Port Group, which matches the native VLAN ID.

Service LAN Tagged packets received at the external ports are dropped.

Untagged packets received at the external ports are tagged with the VLAN ID of the Service LAN and forwarded to all ports of the Service LAN, incl. their tags.

Service VLAN Packets received at the external ports, which are tagged with the Service VLAN ID are forwarded to all ports of the Service VLAN. The handling of packets with other tags depends on the Port Group or VLAN Port Group definitions.

Untagged packets could not be “Service VLAN packets”. Untagged packets are handled according to the Port Group or VLAN Port Group definition.

Table: Packet handling for the uplink/external ports

Page 24: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 22

The possible combinations of overlapped uplink sets and overlapped downlink ports for each group types are listed as follow:

Uplink set: Port Group VLAN Port

Group VLAN Port Group (native) Service LAN Service

VLAN Port Group X X X X V VLAN Port Group N/A V V X V

VLAN Port Group (native)

N/A N/A X X V

Service LAN N/A N/A N/A X X

Service VLAN N/A N/A N/A N/A V

Downlink ports:

Port Group VLAN Port Group

VLAN Port Group (native)

Service LAN Service VLAN

Port Group X X X V V VLAN Port Group N/A X X V V

VLAN Port Group (native) N/A N/A X V V

Service LAN N/A N/A N/A V V Service VLAN N/A N/A N/A N/A V

Legend:

X: not allowed

V: allowed, based on different VLAN ID

N/A: don’t care, duplicate information

Page 25: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 23

5 Configuring Uplink Sets

In IBP firmware version, the external/uplink ports are defined in so-called Uplink Sets. In the group definitions in IBP these Uplinks Sets are used to define the external connections. An “Uplink Set” is defined as a set of 1 to n external (uplink) ports, which is be used in port group definitions to connect a group of server blades to the customer’s LAN.

As an Uplink Set is created, two link aggregations will be created at the same time. One link aggregation is for active and the other is for the backup. A port participates to an Uplink Set and it will become the member of the active link aggregation automatically. User could assign a port to participate to the backup link aggregation by manually.

In this chapter, it will describe how to configure the Uplink Sets and how to move the ports from active link aggregation to backup one.

5.1 Creating Uplink Sets

This section will describe how to create Uplink Sets.

Beginning in privileged EXEC mode, follow these steps to create an uplink set and assign port to this uplink set:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 uplink-set uplinkSetName To create a empty uplink set Step 3 interface interface-id Specify the external physical port that you

want to set to the uplink set, and enter interface configuration mode.

Step 4 uplink-set uplinkSetName To make this interface to be the member of the uplink set.

Step 5 exit Return to global configuration mode. Step 6 exit Return to privileged EXEC mode. Step 7 show uplink-set [uplinkSetName] Verify the configuration.

To create an uplink set, use uplink-set global configuration command. To assign an external port to the uplink set, use uplink-set interface configuration command. To display the uplink set, use show uplink-set privileged EXEC command.

In this example, uplink-set up1 is created and interfaces 0/41 and 0/42 are assigned to this uplink set.

(BX900-CB1)#configure

(BX900-CB1)(Config)#uplink-set up1

Page 26: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 24

(BX900-CB1)(Config)#interface 0/41

(BX900-CB1)(Interface BX900-CB1/0/41)#uplink-set up1

(BX900-CB1)(Interface BX900-CB1/0/41)#interface 0/42

(BX900-CB1)(Interface BX900-CB1/0/42)#uplink-set up1

(BX900-CB1)(Interface BX900-CB1/0/42)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show uplink-set

Uplink Set Logical External External External Link Port IGMP

Name Interface ports active ports backup ports state Backup snoop LACP

---------- ---------- -------------- -------------- -------------- ----- ------ ----- ----

default BX900-CB1/1/1 BX900-CB1/0/43, BX900-CB1/0/43, - yes no yes no

BX900-CB1/1/2 BX900-CB1/0/44, BX900-CB1/0/44,

BX900-CB1/0/45, BX900-CB1/0/45,

BX900-CB1/0/46, BX900-CB1/0/46,

BX900-CB1/0/47, BX900-CB1/0/47,

BX900-CB1/0/48 BX900-CB1/0/48

up1 BX900-CB1/1/3 BX900-CB1/0/41, BX900-CB1/0/41, - yes no yes no

BX900-CB1/1/4 BX900-CB1/0/42 BX900-CB1/0/42

(BX900-CB1)#

Page 27: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 25

5.2 Configuring Link State

The purpose of this feature is to allow the Ethernet Connection Blade to disable the server-blade ports when all of its uplink ports are inactive. It could improve the switching time and realize the “rapid” failover of redundant LAN ports of server blades. This section will describe how to configure the link state for an uplink set.

Beginning in privileged EXEC mode, follow these steps to enable link state function for an uplink set and groups:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 linkstate uplinkSetName Enable the link state function on specific

uplink set. Step 5 exit Return to privileged EXEC mode. Step 6 show linkstate [uplinkSetName] Verify the configuration.

To enable/disable the link state feature, use linkstate/no linkstate global configuration command. To display the link state setting, use show linkstate privileged EXEC command.

In this example, link state function is enabled on uplink-set up1.

(BX900-CB1)#configure

(BX900-CB1)(Config)#linkstate up1

(BX900-CB1)(Config)#exit

(BX900-CB1)#show linkstate

Uplink Set name Linkstate

--------------------------------- ---------

default yes

up1 yes

(BX900-CB1)#

Page 28: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 26

5.3 Configuring Backup Port

This section will describe how to configure backup port of uplink set.

Beginning in privileged EXEC mode, follow these steps to set a port to be the backup port:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 interface interface-id Specify the external physical port that you

want to set to be a backup port, and enter interface configuration mode.

Step 3 port-backup To make this interface to be the backup port.

Step 4 exit Return to global configuration mode. Step 5 exit Return to privileged EXEC mode. Step 6 show port-backup [uplinkSetName] Verify the configuration.

To set a port to be the backup port, use port-backup interface configuration command. To display the port backup, use show port-backup privileged EXEC command.

In this example, uplink-set up1 is created and interfaces 0/41 and 0/42 are the members of uplink set up1. Try to set interface 0/42 to be the backup port of the uplink set up1.

(BX900-CB1)#configure

(BX900-CB1)(Config)#interface 0/42

(BX900-CB1)(Interface BX900-CB1/0/42)#port-backup

(BX900-CB1)(Interface BX900-CB1/0/41)#interface 0/42

(BX900-CB1)(Interface BX900-CB1/0/42)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-backup up1

Uplink Set name Port Backup External active ports External backup ports

--------------------- ----------------- ---------------------------- ---------------------

up1 no BX900-CB1/0/41 BX900-CB1/0/42

(BX900-CB1)#

Page 29: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 27

6 Configuring Port Groups

The downlink ports of Ethernet Connection Blade can be combined into Port Groups. Port Groups have the following characteristics:

1. Each Port Group can contain only internal server ports (INT1-INT36).

2. It is not mandatory to include an uplink set. A group without a configured uplink set is used only for internal communication.

3. Communication between groups is not possible, nor is traffic from one group visible in another group.

!

By default there is no traffic between ports of different port groups except over Service VLAN and Service LAN.

All ports in a Port Group have the same configuration. Each port in the Port Group is a member of a unique, untagged/tagged VLAN.

In the port groups, it is VLAN transparent; the packet will be forwarded as it is received on ingress side, including the VLAN tagging.

Beginning in privileged EXEC mode, follow these steps to create port group and assign ports to this port group:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 port-group portGroupName

[uplinkSetName] To create a port group with an assigned group name and/or an assigned uplink set.

Step 3 interface interface-id Specify the internal physical port that you want to set to be a member of the port group, and enter interface configuration mode.

Step 4 no port-group Remove this interface from the port group if it is already configured to a port group.

Step 5 port-group portGroupName To add this interface to the specified port group.

Step 6 exit Return to global configuration mode. Step 7 exit Return to privileged EXEC mode. Step 8 show port-group [portGroupName] Verify the configuration.

To create a port group, use port-group global configuration command. To add/remove an interface to a port group, use port-group/no port-group interface configuration command. To display the port group, use show port-group privileged EXEC command.

Page 30: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 28

In this example, port group pg_1 is created without a configured uplink set and interface 0/1 is assigned to be the member of this port group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-group pg_1

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#no port-group

(BX900-CB1)(Interface BX900-CB1/0/1)#port-group pg_1

(BX900-CB1)(Interface BX900-CB1/0/1)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-group pg_1

Port Group Name Internal Ports Uplink Set Name External Ports

-------------------------- --------------- ------------------------ ---------------

pg_1 BX900-CB1/0/1 -

(BX900-CB1)#

In this example, port group pg_2 is created with a configured uplink set up1 and interface 0/1 is assigned to be the member of this port group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-group pg_2 up1

(BX900-CB1)(Config)#interface 0/2

(BX900-CB1)(Interface BX900-CB1/0/2)#no port-group

(BX900-CB1)(Interface BX900-CB1/0/2)#port-group pg_2

(BX900-CB1)(Interface BX900-CB1/0/2)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-group pg_2

Port Group Name Internal Ports Uplink Set Name External Ports

-------------------------- -------------------- ------------------------ ----------------------

pg_2 BX900-CB1/0/2 up1 BX900-CB1/0/41

BX900-CB1/0/42

(BX900-CB1)#

Page 31: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 29

7 Configuring VLAN Groups This chapter will describe how to configure a VLAN group on Ethernet Connection Blade.

Beginning in privileged EXEC mode, follow these steps to create a VLAN group and assign ports to this VLAN group:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 vlan-group vlanGroupName

<1-4094> uplinkSetName To create a VLAN group with an assigned group name, VLAN ID and a configured uplink set.

Step 3 interface interface-id Specify the internal port that you want to set to be a member of the VLAN group, and enter interface configuration mode.

Step 4 no port-group Remove this interface from the port group if it is already configured to a port group.

Step 5 no vlan-group Remove this interface from the VALN group if it is already configured to a VLAN group.

Step 6 vlan-group vlanGroupName [<tagged>]

To add this interface to the specified VLAN group with tagged or untagged option.

Step 7 exit Return to global configuration mode. Step 8 exit Return to privileged EXEC mode. Step 9 show vlan-group [vlanGroupName] Verify the configuration.

To create a port group, use vlan-group global configuration command. To add/remove an interface to a VLAN group, use vlan-group/no vlan-group interface configuration command. To display the VLAN group, use show vlan-group privileged EXEC command.

In this example, VLAN group vlang_1 with VLAN ID 2 is created and it is configured with uplink set up1 and interface 0/1 is assigned to be the untagged member and interface 0/2 is assigned to be the tagged member of this VLAN group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#vlan-group vlang_1 2 up1

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#no port-group

(BX900-CB1)(Interface BX900-CB1/0/1)#no vlan-group

(BX900-CB1)(Interface BX900-CB1/0/1)#vlan-group vlang_1

(BX900-CB1) (Interface BX900-CB1/0/1)#interface 0/2

(BX900-CB1) (Interface BX900-CB1/0/2)#no port-group

(BX900-CB1) (Interface BX900-CB1/0/2)#vlan-group vlang_1 tagged

(BX900-CB1)(Interface BX900-CB1/0/2)#exit

Page 32: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 30

(BX900-CB1)(Config)#exit

(BX900-CB1)#show vlan-group vlang_1

VLAN Native

VLAN port group name ID Internal ports UplinkSet name External ports VLAN

-------------------- ------- ------------------------------- -------------- -------------------- ------

vlang_1 2 BX900-CB1/0/1 up1 BX900-CB1/0/41, no

BX900-CB1/0/2(Tagged) BX900-CB1/0/42

(BX900-CB1)#

!

The downlink ports are just allowed to be the member of port group and VLAN group at a time. If you want to assign a downlink port to another port group or VLAN group, you have to remove it from current group first.

A downlink port is allowed to be the untagged member of a VLAN port group at a time, but it could be the tagged member of many different VLAN port group.

Page 33: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 31

To configure a native VLAN group, follow these steps do:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 vlan-group-nativeVLAN

vlanGroupName To set the specified VLAN group with native VLAN option.

Step 3 exit Return to privileged EXEC mode. Step 4 show vlan-group [vlanGroupName] Verify the configuration.

To set native VLAN option for a VLAN group, use vlan-group-nativeVLAN global configuration command. To display the VLAN group, use show vlan-group privileged EXEC command.

In this example, set VLAN group vlang_1 to a native VLAN group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#vlan-group-nativeVLAN vlang_1

(BX900-CB1)(Config)#exit

(BX900-CB1)#show vlan-group vlang_1

VLAN Native

VLAN port group name ID Internal ports UplinkSet name External ports VLAN

-------------------- ------- ----------------- -------------- -------------------- ------

vlang_1 2 BX900-CB1/0/1 up1 BX900-CB1/0/41, yes

BX900-CB1/0/42

(BX900-CB1)#

Page 34: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 32

8 Configuring Service LAN This chapter will describe how to configure a Service LAN on the Ethernet Connection Blade.

Beginning in privileged EXEC mode, follow these steps to create a Service LAN and assign ports to this Service LAN:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 svc-lan svcLanName <1-4094>

uplinkSetName To create a Service LAN with an assigned group name, VLAN ID and a configured uplink set.

Step 3 interface interface-id Specify the internal port that you want to set to be a member of the Service LAN, and enter interface configuration mode.

Step 4 svc-lan svcLanName To add this interface to the specified Service LAN.

Step 5 exit Return to global configuration mode. Step 6 exit Return to privileged EXEC mode. Step 7 show svc-lan [svcLanName] Verify the configuration.

To create a Service LAN, use svc-lan global configuration command. To add/remove an interface to/from the Service LAN, use svc-lan/no svc-lan interface configuration command. To display the Service LAN, use show svc-lan privileged EXEC command.

In this example, Service LAN slan_1 with VLAN ID 100 is created and it is configured with uplink set up2 for its external connection. The interface 0/2 is added to this Service LAN.

(BX900-CB1)#configure

(BX900-CB1)(Config)#svc-lan slan_1 100 up2

(BX900-CB1)(Config)#interface 0/2

(BX900-CB1)(Interface BX900-CB1/0/2)# svc-lan slan_1

(BX900-CB1)(Interface BX900-CB1/0/2)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show svc-lan slan_1

Service LAN name VLAN ID Internal ports Uplink Set name External ports

-------------------- ------- -------------- -------------------- --------------

slan_1 100 BX900-CB1/0/2 up2 BX900-CB1/0/43,

BX900-CB1/0/44

(BX900-CB1)#

Page 35: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 33

9 Configuring Service VLAN This chapter will describe how to configure a Service VLAN on the Ethernet Connection Blade.

Beginning in privileged EXEC mode, follow these steps to create a Service VLAN and assign ports to this Service VLAN:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 svc-vlan svcVlanName <1-4094>

uplinkSetName To create a Service VLAN with an assigned group name, VLAN ID and a configured uplink set.

Step 3 interface interface-id Specify the internal port that you want to set to be a member of the Service VLAN, and enter interface configuration mode.

Step 4 svc-vlan svcVlanName To add this interface to the specified Service VLAN.

Step 5 exit Return to global configuration mode. Step 6 exit Return to privileged EXEC mode. Step 7 show svc-vlan [svcVlanName] Verify the configuration.

To create a Service VLAN, use svc-vlan global configuration command. To add/remove an interface to/from the Service VLAN, use svc-vlan/no svc-vlan interface configuration command. To display the Service VLAN, use show svc-vlan privileged EXEC command.

In this example, Service VLAN svlan_1 with VLAN ID 200 is created and it is configured with uplink set up3 for its external connection. The interface 0/3 is added to this Service VLAN.

(BX900-CB1)#configure

(BX900-CB1)(Config)#svc-vlan svlan_1 200 up3

(BX900-CB1)( Config)#interface 0/3

(BX900-CB1)(Interface BX900-CB1/0/3)# svc-vlan svlan_1

(BX900-CB1)(Interface BX900-CB1/0/3)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show svc-vlan svlan_1

Service VLAN name VLAN ID Internal ports Uplink Set name External ports

-------------------- ------- -------------- -------------------- --------------

svlan_1 200 BX900-CB1/0/3 up3 BX900-CB1/0/45,

BX900-CB1/0/46

(BX900-CB1)#

Page 36: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 34

10 Combining Port Groups and Service (V)LAN

This chapter describes how to configure the Port group and Service (V)LAN with overlapped uplink set or downlink ports. Please refer to Chapter 4 for the possible combinations of overlapped uplink sets and overlapped downlink ports for each group types.

Overlapped on downlink ports

In this example, a Port group pg_overlap is created with uplink set uplink_1. Interfaces 0/1 ~ 0/12 are set to the member of this port group. Service VLAN svlan_overlap with VLAN ID 4094 is created and it is configured with uplink set uplink_2 as its external connection. Interfaces 0/10 ~ 0/12 are assigned to be the member of this Service VLAN.

The tagged packet with VLAN ID 4094 received on interfaces 0/10 ~ 0/12 will be forwarded to uplink_2. The tagged packet with VLAN ID rather than 4094 received on interface 0/10 ~ 0/12 will be forwarded to uplink_1. Any packets received on 0/1 ~ 0/9 will be forwarded to uplink_1.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-group pg_overlap uplink_1

(BX900-CB1)(Config)#interface range 0/1 – 0/12

(BX900-CB1)(if-range)#no port-group

(BX900-CB1)(if-range)#port-group pg_overlap

(BX900-CB1)(if-range)#exit

(BX900-CB1)(Config)#svc-vlan svlan_overlap 4094 uplink_2

(BX900-CB1)(Config)#interface range 0/10 – 0/12

(BX900-CB1)(if-range)#svc-vlan svlan_overlap

(BX900-CB1)(if-range)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-group pg_overlap

Port Group Name Internal Ports Uplink Set Name External Ports

-------------------------- -------------------- ------------------------ ----------------------

pg_overlap BX900-CB1/0/1 uplink_1 BX900-CB1/0/41

BX900-CB1/0/2 BX900-CB1/0/42

BX900-CB1/0/3

BX900-CB1/0/4

BX900-CB1/0/5

BX900-CB1/0/6

BX900-CB1/0/7

Page 37: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 35

BX900-CB1/0/8

BX900-CB1/0/9

BX900-CB1/0/10

BX900-CB1/0/11

BX900-CB1/0/12

(BX900-CB1)#show svc-vlan svlan_overlap

Service VLAN name VLAN ID Internal ports Uplink Set name External ports

-------------------- ------- -------------- -------------------- --------------

svlan_overlap 4094 BX900-CB1/0/10 uplink_2 BX900-CB1/0/45,

BX900-CB1/0/11 BX900-CB1/0/46

BX900-CB1/0/12

(BX900-CB1)#

Page 38: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 36

Overlapped on Uplink Set

In this example, a Port group pg_overlap is created with uplink set uplink_1. Interfaces 0/1 ~ 0/12 are set to the member of this port group. Service VLAN svlan_overlap with VLAN ID 4094 is created and it is configured with uplink set uplink_1 as its external connection. Interfaces 0/20 ~ 0/24 are assigned to be the member of this Service VLAN.

The tagged packet with VLAN ID 4094 received on uplink_1 will be forwarded to interfaces 0/20 ~ 0/24. The tagged packet with VLAN ID rather than 4094 received on uplink_1 will be forwarded to interfaces 0/1 ~ 0/12. The untagged packet received on uplink_1 will be also forwarded to interfaces 0/1 ~ 0/12.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-group pg_overlap uplink_1

(BX900-CB1)(Config)#interface range 0/1 – 0/12

(BX900-CB1)(if-range)#no port-group

(BX900-CB1)(if-range)#port-group pg_overlap

(BX900-CB1)(if-range)#exit

(BX900-CB1)(Config)#svc-vlan svlan_overlap 4094 uplink_1

(BX900-CB1)(Config)#interface range 0/20 – 0/24

(BX900-CB1)(if-range)#svc-vlan svlan_overlap

(BX900-CB1)(if-range)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-group pg_overlap

Port Group Name Internal Ports Uplink Set Name External Ports

-------------------------- -------------------- ------------------------ ----------------------

pg_overlap BX900-CB1/0/1 uplink_1 BX900-CB1/0/41

BX900-CB1/0/2 BX900-CB1/0/42

BX900-CB1/0/3

BX900-CB1/0/4

BX900-CB1/0/5

BX900-CB1/0/6

BX900-CB1/0/7

BX900-CB1/0/8

BX900-CB1/0/9

BX900-CB1/0/10

BX900-CB1/0/11

BX900-CB1/0/12

Page 39: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 37

(BX900-CB1)#show svc-vlan svlan_overlap

Service VLAN name VLAN ID Internal ports Uplink Set name External ports

-------------------- ------- -------------- -------------------- --------------

svlan_overlap 4094 BX900-CB1/0/20 uplink_1 BX900-CB1/0/41,

BX900-CB1/0/21 BX900-CB1/0/42

BX900-CB1/0/22

BX900-CB1/0/23

BX900-CB1/0/24

(BX900-CB1)#

Page 40: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 38

11 Configuring downlink LAG This chapter describes how to configure the Link Aggregation for downlink ports in the PRIMERGY BX900 Ethernet Connection Blade system. Only the downlink ports are allowed to be the member of the LAG in this firmware version. It is provided to combine server blade NICs connected to same Ethernet Connection Blade.

11.1 Configuring Link Aggregation with LACP

This section describes how to configure link aggregation with LACP with 4 links.

Beginning in privileged EXEC mode, follow these steps to configure link aggregation with LACP:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 port-channel name To create a port-channel. Step 3 interface interface-id Specify the port-channel interface (logical

interface), and enter interface configuration mode.

Step 4 no staticcapability To disable the static mode of the port-channel.

Step 5 exit Return to global configuration mode. Step 6 interface interface-id Specify the downlink interface, and enter

interface configuration mode. Step 7 channel-group interface-id To join the specified port-channel group. Step 8 exit Return to global configuration mode. Step 9 exit Return to privileged EXEC mode Step 10 show port-channel all Verify the configuration.

To create a port-channel group, use port-channel global configuration command. To assign an interface to a port-channel group, use channel-group interface configuration command. To display port-channel group, use show port-channel all privileged EXEC command.

In this example, a port-channel group downlink-lag1 is created and downlink interfaces 0/1, 0/2, 0/3 and 0/4 are set to the member of this port-channel group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-channel downlink-lag1

Interface BX900-CB1/1/3 created for port-channel downlink-lag1

(BX900-CB1)(Config)#interface range 0/1 – 0/4

(BX900-CB1)(if-range)#channel-group BX900-CB1/1/3

Page 41: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 39

(BX900-CB1)(if-range)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-channel all

Port- Link

Log. Channel Adm. Trap STP Mbr Port Port

Intf Name Link Mode Mode Mode Type LB Ports Speed Active

------ --------------- ------ ---- ---- ------ ---- --- ------ --------- ------

BX900-CB1/1/3 downlink-lag1 Down En. En. En. Dy. SDM BX900-CB1/0/1 Auto False

BX900-CB1/0/2 Auto False

BX900-CB1/0/3 Auto False

BX900-CB1/0/4 Auto False

(BX900-CB1)#

Page 42: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 40

11.2 Configuring Static Link Aggregation

This section describes how to configure link aggregation without LACP with 4 links.

Beginning in privileged EXEC mode, follow these steps to configure link aggregation without LACP:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 port-channel name To create a port-channel. Step 3 interface interface-id Specify the port-channel interface (logical

interface), and enter interface configuration mode.

Step 4 staticcapability To enable the static mode of the port-channel.

Step 5 exit Return to global configuration mode. Step 6 interface interface-id Specify the downlink interface, and enter

interface configuration mode. Step 7 channel-group interface-id To join the specified port-channel group. Step 8 exit Return to global configuration mode. Step 9 exit Return to privileged EXEC mode. Step 10 show port-channel all Verify the configuration.

To create a port-channel group, use port-channel global configuration command. To assign an interface to a port-channel group, use channel-group interface configuration command. To display port-channel group, use show port-channel all privileged EXEC command.

In this example, a port-channel group downlink-lag1 is created with static property and downlink interfaces 0/1, 0/2, 0/3 and 0/4 are set to the member of this port-channel group.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-channel downlink-lag1

Interface BX900-CB1/1/3 created for port-channel downlink-lag1

(BX900-CB1)(Config)#interface BX900-CB1/1/3

(BX900-CB1)(Interface BX900-CB1/1/3)#staticcapability

(BX900-CB1)(Interface BX900-CB1/1/3)#exit

(BX900-CB1)(Config)#interface range 0/1 – 0/4

(BX900-CB1)(if-range)#channel-group BX900-CB1/1/3

(BX900-CB1)(if-range)#exit

Page 43: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 41

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-channel all

Port- Link

Log. Channel Adm. Trap STP Mbr Port Port

Intf Name Link Mode Mode Mode Type LB Ports Speed Active

------ --------------- ------ ---- ---- ------ ---- --- ------ --------- ------

BX900-CB1/1/3 downlink-lag1 Down En. En. En. St. SDM BX900-CB1/0/1 Auto False

BX900-CB1/0/2 Auto False

BX900-CB1/0/3 Auto False

BX900-CB1/0/4 Auto False

(BX900-CB1)#

Page 44: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 42

11.3 Configuring Load Balance of Link Aggregation

This section describes how to configure link aggregation with load balance settings.

Beginning in privileged EXEC mode, follow these steps to configure link aggregation with load balance settings:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 interface interface-id Specify the port-channel interface (logical

interface), and enter interface configuration mode.

Step 3 load-balance <dst-ip/dst-mac/src-dst-ip/src-dst-mac/src-ip/src-mac>

Set the load balance for the port-channel group.

Step 4 exit Return to global configuration mode. Step 5 exit Return to privileged EXEC mode. Step 6 show port-channel all Verify the configuration.

To set the load balance setting of a port-channel group, use load-balance interface configuration command. To display port-channel group, use show port-channel all privileged EXEC command.

In this example, a port-channel group downlink-lag1 is set to use source IP and destination IP for its load balance setting.

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-channel downlink-lag1

Interface BX900-CB1/1/3 created for port-channel downlink-lag1

(BX900-CB1)(Config)#interface BX900-CB1/1/3

(BX900-CB1)(Interface BX900-CB1/1/3)#load-balance src-dst-ip

(BX900-CB1)(Interface BX900-CB1/1/3)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show port-channel all

Port- Link

Log. Channel Adm. Trap STP Mbr Port Port

Intf Name Link Mode Mode Mode Type LB Ports Speed Active

------ --------------- ------ ---- ---- ------ ---- --- ------ --------- ------

BX900-CB1/1/3 downlink-lag1 Down En. En. En. St. SDI BX900-CB1/0/1 Auto False

BX900-CB1/0/2 Auto False

BX900-CB1/0/3 Auto False

Page 45: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 43

BX900-CB1/0/4 Auto False

(BX900-CB1)#

Page 46: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 44

12 Private Network In IBP firmware version, it provides a feature similar to Cisco’s PVLAN. It is called downlink isolation. In general, the communication between all interfaces in the same port group is possible. You could make an interface invisible for other member of this port group, and the packets received on this interface will not be forwarded to the other member of this port group, but the uplink ports. This chapter will describe how to configure the downlink isolation on the Ethernet Connection Blade.

Beginning in privileged EXEC mode, follow these steps to configure downlink isolation for an interface:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 interface interface-id Specify the downlink/internal interface,

and enter interface configuration mode. Step 3 isolate Set the isolation for this interface. Step 4 exit Return to privileged EXEC mode. Step 5 show port-channel all Verify the configuration.

To add/remove the downlink isolation feature on an interface, use isolate/no isolate interface configuration command. To display the downlink isolation setting, use show interface status privileged EXEC command.

In this example, the interface 0/1, the member of the port group, is set to use downlink isolation.

(BX900-CB1)#configure

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#isolate

(BX900-CB1)(Interface BX900-CB1/0/1)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show interface status 0/1

Interface......................... BX900-CB1/0/1

ifIndex........................... 1

Description.......................

Admin Mode........................ Disable

E-Keying Status................... Connected

Physical Mode..................... Auto

Physical Status...................

Link Status....................... Down

Page 47: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 45

Link Trap......................... Enable

Flow Control Mode................. Disable

Capability Status.................. 1GF

MAC Address....................... 00:1E:68:85:F7:61

Bit Offset Val.................... 1

MDI Status........................ Normal

MDI Config........................ Normal

Isolate........................... Enabled

(BX900-CB1)#

Page 48: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 46

13 Configuring QoS

13.1 Configuring priority control

This section describes how to configure priority control which assigns egress port queue of different priority to User priority value (CoS) in VLAN tag.

Beginning in privileged EXEC mode, follow these steps to configure priority control on specific interface:

Command Purpose Step 1 configure Enter global configuration mode Step 2 interface interface-id Specify the interface, and enter interface

configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface).

Step 3 queue trust dot1p Set the trust mode to dot1p. Step 4 queue cos-map priority-id queue-id Assign a priority ID to specific traffic class

queue to configure dot1p priority mapping. Step 5 exit Return to global configuration mode. Step 6 exit Return to privileged EXEC mode. Step 7 show queue cos-map interface-id Verify the configuration.

To configure priority control and assign priority mapping to an interface, use the CoS interface configuration command. To display the configuration, use show queue cos-map privileged EXEC command.

In this example, cos-map is configured on interface 0/1 to assigns egress port queue of different priority to User priority value (CoS) in VLAN tag:

(BX900-CB1)#configure

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#queue trust dot1p

(BX900-CB1)(Interface BX900-CB1/0/1)#queue cos-map 0 1

(BX900-CB1)(Interface BX900-CB1/0/1)#queue cos-map 1 2

(BX900-CB1)(Interface BX900-CB1/0/1)#queue cos-map 4 2

(BX900-CB1)(Interface BX900-CB1/0/1)#exit

(BX900-CB1)#show queue cos-map 0/1

User Priority Traffic Class

Page 49: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 47

------------- -------------

0 1

1 2

2 0

3 1

4 2

5 2

6 3

7 3

(BX900-CB1)#

Page 50: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 48

13.2 Configuring priority control rewrite

This section describes how to configure priority control rewrite which rewrites priority control information of packets specified with combination of MAC address, packet format, Ethernet type, VLAN ID and CoS value.

13.2.1 IP Precedence value rewrite

This section describes how to configure IP precedence value rewrite which rewrites IP precedence value of packets which has the specified CoS value in the specified port in VLAN.

Beginning in privileged EXEC mode, follow these steps to configure IP precedence value rewrite on specific interface:

Command Purpose Step 1 configure Enter global configuration mode Step 2 diffserv Enable DiffServ Admin mode. Step 3 class-map match-all

class-map-name Create a DiffServ class with a class-map name.

Step 4 match cos <0-7> Configure a match condition based on a CoS value..

Step 5 exit Return to global configuration mode. Step 6 policy-map policy-name in Create a DiffServ policy with a policy-map

name. Step 7 class class-map-name Attach the DiffServ class to this policy. Step 8 mark ip-precedence <0-7> Configure marking action on the specific IP

precedence value. Step 9 exit Return to policy-map configuration mode. Step 10 exit Return to global configuration mode. Step 11 interface interface-id Specify the interface, and enter interface

configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface).

Step 12 service-policy in policy-map-name Specify the policy which will be applied to this interface.

Step 13 exit Return to global configuration mode. Step 14 exit Return to privileged EXEC mode. Step 15 show class-map Verify the configuration. Step 16 show policy-map Verify the configuration. Step 17 show policy-map interface

interface-id in Verify the configuration.

To configure an IP precedence rewrite to interface, use the DiffServ configuration command. To display the policy configuration, use show policy-map privileged EXEC command. To display the class configuration, use show class-map privileged EXEC command.

Page 51: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 49

In this example, DiffServ is configured on interface 0/1 to rewrites IP precedence value of packets which has the specified CoS value in the specified port in VLAN:

(BX900-CB1)#configure

(BX900-CB1)(Config)#diffserv

(BX900-CB1)(Config)#class-map match-all class1

(BX900-CB1)(Config-classmap)#match cos 5

(BX900-CB1)(Config-classmap)#exit

(BX900-CB1)(Config)#policy-map policy1 in

(BX900-CB1)(Config-policy-map)#class class1

(BX900-CB1)(Config-policy-classmap)#mark ip-precedence 2

(BX900-CB1)(Config-policy-classmap)#exit

(BX900-CB1)(Config-policy-map)#exit

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#service-policy in policy1

(BX900-CB1)(Interface BX900-CB1/0/1)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show class-map

Class

Class Name Type Reference Class Name

------------------------------- ----- -------------------------------

class1 All

(BX900-CB1)#show policy-map

Policy Name Policy Type Class Members

------------------------------- ----------- -------------------------------

policy1 In class1

(BX900-CB1)#show policy-map interface 0/1 in

Interface...................................... BX900-CB1/0/1

Direction...................................... In

Operational Status............................. Down

Policy Name.................................... policy1

Interface Summary:

Page 52: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 50

Class Name..................................... class1

In Offered Packets............................. 0

In Discarded Packets........................... 0

(BX900-CB1)#

Page 53: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 51

13.2.2 Change queue of packets in VLAN

This section describes how to configure change queue function which changes queue which the received packets in ingress port use in egress port.

Beginning in privileged EXEC mode, follow these steps to configure change queue on specific interface:

Command Purpose Step 1 configure Enter global configuration mode Step 2 diffserv Enable DiffServ Admin mode. Step 3 class-map match-all

class-map-name Create a DiffServ class with a class-map name.

Step 4 match cos <0-7> Configure a match condition based on a CoS value..

Step 5 exit Return to global configuration mode. Step 6 policy-map policy-name in Create a DiffServ policy with a policy-map

name. Step 7 class class-map-name Attach the DiffServ class to this policy. Step 8 assign-queue <0-6> Set queue ID to which traffic class is

assigned. Step 9 exit Return to policy-map configuration mode. Step 10 exit Return to global configuration mode. Step 11 interface interface-id Specify the interface, and enter interface

configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface).

Step 12 service-policy in policy-map-name Specify the policy which will be applied to this interface.

Step 13 exit Return to global configuration mode. Step 14 exit Return to privileged EXEC mode. Step 15 show policy-map

policy-map-name Verify the configuration.

To configure change queue to interface, use the diffserv global configuration command. To display the policy configuration, use show policy-map privileged EXEC command. To display the class configuration, use show class-map privileged EXEC command.

In this example, DiffServ is configured on interface 0/1 to change queue which the received packets in ingress port use in egress port:

(BX900-CB1)#configure

(BX900-CB1)(Config)#diffserv

(BX900-CB1)(Config)#class-map match-all class2

(BX900-CB1)(Config-classmap)#match cos 2

(BX900-CB1)(Config-classmap)#exit

(BX900-CB1)(Config)#policy-map policy2 in

Page 54: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 52

(BX900-CB1)(Config-policy-map)#class class2

(BX900-CB1)(Config-policy-classmap)#assign-queue 7

(BX900-CB1)(Config-policy-classmap)#exit

(BX900-CB1)(Config-policy-map)#exit

(BX900-CB1)(Config)#interface 0/1

(BX900-CB1)(Interface BX900-CB1/0/1)#service-policy in policy2

(BX900-CB1)(Interface BX900-CB1/0/1)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show class-map

Class

Class Name Type Reference Class Name

------------------------------- ----- -------------------------------

class1 All

class2 All

(BX900-CB1)#show policy-map

Policy Name Policy Type Class Members

------------------------------- ----------- -------------------------------

policy1 In class1

policy2 In class2

(BX900-CB1)#show policy-map policy2

Policy Name.................................... policy2

Policy Type.................................... In

Class Name..................................... class2

Assign Queue................................... 7

(BX900-CB1)#

Page 55: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 53

14 Configuring IGMP/MLD Snooping The IGMP/MLD snooping function is configured from uplink set. All groups use the uplink set as its external connection will have the same configuration at the same time. This chapter describes how to configure the IGMP/MLD snooping on a specific uplink set.

Beginning in privileged EXEC mode, follow these steps to configure IGMP/MLD Snooping on specific uplink set:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 igmpsnooping uplinkSetName Enable IGMP/MLD snooping for the specific

uplink set and its associated groups. Step 3 exit Return to privileged mode. Step 4 show igmpsnooping Display IGMP/MLD snooping information.

In this example, IGMP/MLD snooping is configured on default uplink set:

(BX900-CB1)#configure

(BX900-CB1)(Config)#igmpsnooping default

(BX900-CB1)(Config)#exit

(BX900-CB1)#show igmpsnooping

Uplink Set name Igmp snooping

--------------------------------- --------------

default yes

(BX900-CB1)#

Page 56: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 54

15 Configuring IEEE 802.1X Authentication This chapter describes how to configure IEEE 802.1X authentication.

15.1 Using Local User Name/ Password

This section describes how to configure IEEE 802.1X authentication by using local user name and password.

Beginning in privileged EXEC mode, follow these steps to configure IEEE 802.1X authentication:

Command Purpose Step 1 configure Enter global configuration mode Step 2 dot1x system-auth-control Enable IEEE 802.1X authentication

support on the switch Step 3 exit Return to global configuration mode. Step 4 show dot1x summary interface-id Show detailed status for specified port

To enable/disable IEEE 802.1X authentication for on a switch, use the dot1x system-auth-control/no dot1x system-auth-control global configuration command. The default authentication mode of port control is auto. You can specify the mode you want by using dot1x port-control all mode global configuration command or dot1x port-control mode interface configuration command. To display the configuration, use show dot1x summary interface-id privileged EXEC command.

In this example, we configure all interfaces to force-authorized mode but interface 0/6 to auto authentication mode. Then check the authenticated state for the interface 0/6.

(BX900-CB1)(Config)#dot1x port-control all force-authorized

(BX900-CB1)(Config)#interface 0/6

(BX900-CB1)(Interface BX900-CB1/0/6)#dot1x port-control auto

(BX900-CB1)(Interface BX900-CB1/0/6)#exit

(BX900-CB1)(Config)#exit

(BX900-CB1)#show dot1x summary 0/6

Operating Reauthentication

Interface Control Mode Control Mode Enabled Port Status

--------- ------------------ ------------------ ---------------- ------------

BX900-CB1/0/6 auto auto FALSE Authorized

Page 57: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 55

(BX900-CB1)#

Page 58: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 56

15.2 Using Remote RADIUS Server

This section describes how to configure IEEE 802.1X authentication by using remote RADIUS server.

Beginning in privileged EXEC mode, follow these steps to configure IEEE 802.1X authentication:

Command Purpose Step 1 configure Enter global configuration mode Step 2 radius-server host auth

ip-addr/hostname Create a radius server for IEEE 802.1X authentication

Step 3 radius-server key auth ip-addr/hostnam <0/7> key-value

Give s radius share key to a radius server

Step 4 authentication login list-name radius Create a authentication list for radius Step 5 dot1x system-auth-control Enable IEEE 802.1X authentication

support on the switch Step 6 dot1x default-login list-name Assign an authentication list to IEEE

802.1X default login for non-configured users

Step 7 exit Return to global configuration mode. Step 8 show authentication Verify the configuration. Step 9 show radius Verify the configuration.

To assign a remote radius server for IEEE 802.1X, use radius-server host auth ip-addr/hostname. To create an authentication list for radius, use authentication login list-name radius. To assign an authentication list for IEEE 802.1X non-configured users, use dot1x default-login list-name.

In this example, a radius server 192.168.3.1 will be assigned to authenticate IEEE 802.1X with share key secret.

(BX900-CB1)(Config)#radius-server host auth 192.168.3.1

(BX900-CB1)(Config)#radius-server key auth 192.168.3.1 0 secret

(BX900-CB1)(Config)#authentication login test-list radius

(BX900-CB1)(Config)#dot1x system-auth-control

(BX900-CB1)(Config)#dot1x default-login test-list

(BX900-CB1)(Config)#dot1x port-control all auto

(BX900-CB1)(Config)#exit

(BX900-CB1)#show authentication

Authentication Login List Method 1 Method 2 Method 3

------------------------- -------- -------- --------

defaultList local undefined undefined

Page 59: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 57

test-list radius undefined undefined

(BX900-CB1)#show radius

Current Server Host Address.................... 192.168.3.1

Number of Configured Servers................... 1

Number of Retransmits.......................... 4

Timeout Duration............................... 5

RADIUS Accounting Mode......................... Disable

RADIUS Dead Time............................... 255

RADIUS Attribute 4 Mode........................ Disable

RADIUS Attribute 4 Value....................... 0.0.0.0

(BX900-CB1)#

Page 60: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 58

16 Configuring Port Mirroring This chapter describes how to configure port mirroring function.

Beginning in privileged EXEC mode, follow these steps to configure port mirroring:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 port-monitor session session-id

mode Enable admin mode.

Step 3 port-monitor session session-id source interface interface-id [rx| tx]

Setting port-monitor source port. The interface can be a physical Layer 2 interface or a port channel (logical interface).

Step 4 port-monitor session session-id destination interface interface-id

Setting port-monitor destination port.

Step 5 show port-monitor session session-id

Verify the configuration.

To enable/disable a port mirroring session, use port-monitor session session-id mode / no port-monitor session session-id mode global configuration command. To configure a source port, use port-monitor session session-id source interface global configuration command, to configure a destination port, use port-monitor session session-id destination interface global configuration command. To display port mirroring configuration, use show port-monitor session session-id privileged EXEC command.

In this example, interface 0/46 is configured to monitor the transmitted and received packets of interface 0/40 and to monitor the received packets of interface 0/41:

(BX900-CB1)#configure

(BX900-CB1)(Config)#port-monitor session 1 mode

(BX900-CB1)(Config)#port-monitor session 1 source interface 0/40

(BX900-CB1)(Config)#port-monitor session 1 source interface 0/41 rx

(BX900-CB1)(Config)#port-monitor session 1 destination interface 0/46

(BX900-CB1)(Config)#exit

(BX900-CB1)#

(BX900-CB1)#show port-monitor session 1

Session ID Admin Mode Dest.Port Sour.Port Type

---------- ---------- ---------- ------------- -----

1 Enable BX900-CB1/0/46 BX900-CB1/0/40 Rx,Tx

BX900-CB1/0/41 Rx

(BX900-CB1)#

Page 61: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 59

17 Configuring SNMP Agent This chapter describes how to configure SNMP agent which informs MIB information of SNMP host.

17.1 Configuring SNMP Community

Beginning in privileged EXEC mode, follow these steps to configure SNMP v1/v2 agent community:

Command Purpose Step 1 configure Enter global configuration mode Step 2 snmp-server community

community-name1 Create a snmp community. The default access mode is READ-ONLY.

Step 3 snmp-server community community-name2

Create another snmp community.

Step 4 snmp-server community rw community-name2

Set the access mode of the SNMP community to READ-WRITE access mode..

Step 5 exit Return to global configuration mode. Step 6 show snmp Verify the configuration.

To configure snmp community, use the snmp-server global configuration command. To display the snmp configuration, use show snmp privileged EXEC command.

In this example, two snmp communities are created for read and read-write:

(BX900-CB1)(Config)#snmp-server community public

(BX900-CB1)(Config)#snmp-server community private

(BX900-CB1)(Config)#snmp-server community rw private

(BX900-CB1)(Config)#exit

(BX900-CB1)#show snmp

SNMP Community Name Client IP Address Client IP Mask Access Mode Status

------------------- ----------------- ----------------- ----------- --------

public 0.0.0.0 0.0.0.0 Read Only Enable

private 0.0.0.0 0.0.0.0 Read/Write Enable

(BX900-CB1)#

Page 62: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 60

17.2 Configuring SNMP User

Beginning in privileged EXEC mode, follow these steps to configure SNMPv3 agent user:

Command Purpose Step 1 configure Enter global configuration mode Step 2 snmp-server user v3-username

[auth <md5|noauth|sha> <0|7> v3-password [priv <des> <0|7> v3-encripted-password]]

Create a SNMPv3 username

Step 3 exit Return to global configuration mode. Step 4 show snmp user Verify the configuration.

To configure SNMPv3 user, use the snmp-server global configuration command. To display the SNMPv3 configuration, use show snmp user privileged EXEC command.

In this example, one SNMPv3 user is created for MD5 authentication and plain password:

(BX900-CB1)(Config)#snmp-server user v3_user auth md5 0 v3_password

(BX900-CB1)(Config)#exit

(BX900-CB1)#show snmp user

User Name Authentication Encryption

----------------- ------------------- -----------------

v3_user MD5 None

(BX900-CB1)#

Page 63: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 61

17.3 Configuring SNMP Remote EngineID

Beginning in privileged EXEC mode, follow these steps to configure SNMPv3 remote Engine ID:

Command Purpose Step 1 configure Enter global configuration mode Step 2 snmp-server engineID remote

<ipAddr|ipv6Addr> <engineid-string>

Create a remote engine ID

Step 3 exit Return to global configuration mode. Step 4 show snmp engineID Verify the configuration.

To configure SNMPv3 remote EngineID, use the snmp-server engineID global configuration command. To display the SNMPv3 configuration, use show snmp engineID privileged EXEC command.

In this example, one SNMPv3 remote EngineID is created for station 172.16.2.100:

(BX900-CB1)(Config)#snmp-server engineID remote 172.16.2.100 8000052301AC100266

(BX900-CB1)(Config)#exit

(BX900-CB1)#show snmp engineID

Remote EngineID IP Address

------------------------ ---------------

8000052301AC100266 172.16.2.100

(BX900-CB1)#

A remote engine ID is required when a SNMPv3 inform is configured. The remote engine ID is used to compute the security digest for authenticating and encrypting packets sent to a user on the remote host.

Page 64: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 62

17.4 Configuring SNMP Traps

Beginning in privileged EXEC mode, follow these steps to configure SNMP trap receiver:

Command Purpose Step 1 configure Enter global configuration mode Step 2 snmptrap trap-name ipaddress

snmpversion <snmpv1|snmpv2|snmpv3>

Create a SNMP trap and specify the client IP address to receive SNMP traps. trap-name should be SNMPv2 community string or SNMPv3 user name.

Step 3 exit Return to global configuration mode. Step 4 show snmptrap Verify the configuration.

To configure SNMP trap, use the snmptrap global configuration command. To display the SNMP trap configuration, use show snmptrap privileged EXEC command.

As configuring the SNMPv3 trap, the security level of the trap has to be the same or lower than the one of the SNMP user. (Refer to section 17.2 Configuring SNMP User)

In this example, create and activate the SNMPv2 and v3 trap for SNMP trap receiver:

(BX900-CB1)(Config)#snmptrap public 192.168.2.2 snmpversion snmpv2

(BX900-CB1)(Config)#snmptrap v3_user 192.168.2.2 snmpversion snmpv3 auth

(BX900-CB1)(Config)#exit

(BX900-CB)#show snmptrap

SNMP Trap Name IP Address SNMP Version Status

------------------- ----------------- -------------- --------

public 192.168.2.2 snmpv2 Enable

v3_user 192.168.2.2 snmpv3 Enable

(BX900-CB)#

Page 65: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 63

17.5 Configuring SNMP Informs

Beginning in privileged EXEC mode, follow these steps to configure SNMP informs receiver:

Command Purpose Step 1 configure Enter global configuration mode Step 2 snmpinform inform-name ipaddress

snmpversion <snmpv2|snmpv3> Create a SNMP inform and specify the client IP address to receive SNMP informs. Inform-name should be SNMPv2 community string or SNMPv3 user name.

Step 3 exit Return to global configuration mode. Step 4 show snmpinform Verify the configuration.

To configure SNMP informs, use the snmpinform global configuration command. To display the SNMP informs configuration, use show snmpinform privileged EXEC command.

As configuring the SNMPv3 informs, the security level of inform has to be the same or lower than the one of the SNMP user. (Refer to section 17.2 Configuring SNMP User)

In this example, create and activate the SNMPv2 and v3 informs for SNMP informs receiver:

(BX900-CB1)(Config)#snmpinform public 192.168.2.2 version snmpv2

(BX900-CB1)(Config)#snmpinform v3_user 192.168.2.2 version snmpv3 auth

(BX900-CB1)(Config)#exit

(BX900-CB)#show snmpinform

SNMP Inform Name IP Address SNMP Version Status

------------------- ----------------- -------------- --------

public 192.168.2.2 snmpv2 Enable

v3_user 192.168.2.2 snmpv3(Auth) Enable

(BX900-CB)#

Page 66: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 64

18 Configuring System Log This chapter describes how to configure system log function which sends system logs to syslog server.

Beginning in privileged EXEC mode, follow these steps to configure system logs to syslog server:

Command Purpose Step 1 configure Enter global configuration mode. Step 2 logging host hostaddress [port]

[severitylevel] Set the IP address and port number of logging host/server which syslog message to be sent.

Step 3 logging syslog To enable the syslog to configured hosts. Step 4 exit Return to privileged EXEC mode. Step 5 show logging Verify the configuration of syslog Step 6 show logging host Verify the configuration of syslog host

To create a syslog host, use logging host global configuration command. To enable or disable syslog, use logging syslog global configuration command.

In this example, create a logging host to sent critical messages and enable the syslog client.

(BX900-CB1)(Config)#logging host 172.16.2.109 514 critical

(BX900-CB1)(Config)#logging syslog

(BX900-CB1)(Config)#exit

(BX900-CB1)#show logging

Logging Client Local Port : 514

CLI Command Logging : disabled

Console Logging : disabled

Console Logging Severity Filter : alert

Buffered Logging : enabled

Syslog Logging : enabled

Log Messages Received : 94

Log Messages Dropped : 0

Log Messages Relayed : 14

Page 67: PRIMERGY BX900/BX400 Blade Server Systems - Fujitsu …manuals.ts.fujitsu.com/file/10223/sb6-sb11a-sb11-ibp-c… ·  · 2012-02-22PRIMERGY BX900/BX400 Blade Server Systems ... Step

© 2011 Fujitsu Technology Solutions 65

(BX900-CB1)#show logging hosts

Index IP Address Severity Port Status

----- ----------------- ----------- ------ -------------

1 172.16.2.109 critical 514 Active