Chapter 5      Clustering Switches
Planning a Switch Cluster
5-8
Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide
78-6511-05
IP Addresses
Clustering switches conserves IP addresses if you have a limited number of them. 
If you plan to create switch clusters, you must assign IP information to a 
command switch. Through the command-switch IP address, you can manage and 
monitor up to 16 switches.
When a switch joins a cluster, it is managed and communicates with other member 
switches through the command-switch IP address. You can assign an IP address 
to the candidate or member switch, but it is not necessary. When a member switch 
has its own IP address, it remains manageable if it leaves the cluster and becomes 
a standalone switch.
Caution Changing the command-switch IP address ends your CMS session. Restart 
your CMS session by entering the new IP address in the browser Location 
field (Netscape Communicator) or Address field (Microsoft Internet 
Explorer), as described in the release notes.
You can assign IP information by using the setup program (refer to the release 
notes) or by manually assigning it (see the “Changing IP Information” section on 
page 6-2).
Passwords
If you plan to create switch clusters, you should assign an enable secret password 
to the command switch. You can assign a privilege level (1 to 15) to the password, 
where level 15, the default, provides the highest level of security. An enable secret 
password with privilege level 15 is required to access to the switch or switch 
cluster through CMS and TACACS+ authentication. You can assign this password 
by using the setup program (refer to the release notes) or by manually assigning 
it (see the “Changing the Password” section on page 6-15).
It is not necessary to assign passwords to an individual switch if it will be a cluster 
member. If a candidate switch has a password, you must enter that password to 
add the switch to the cluster. When the switch joins the cluster, it inherits the 
command-switch password and retains it when it leaves the cluster. If no 
command-switch password is configured, the member switch inherits a null 
password.