EasyManua.ls Logo

IBM RackSwitch G8000 User Manual

IBM RackSwitch G8000
362 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #175 background imageLoading...
Page #175 background image
© Copyright IBM Corp. 2011 Chapter 14. VMready 173
VLAN Maps
A VLAN map (VMAP) is a type of Access Control List (ACL) that is applied to a
VLAN or VM group rather than to a switch port as with regular ACLs (see “Access
Control Lists” on page 79). In a virtualized environment, VMAPs allow you to create
traffic filtering and metering policies that are associated with a VM group VLAN,
allowing filters to follow VMs as they migrate between hypervisors.
N/OS 6.8 supports up to 128 VMAPs. Individual VMAP filters are configured in the
same fashion as regular ACLs, except that VLANs cannot be specified as a filtering
criteria (unnecessary, since VMAPs are assigned to a specific VLAN or associated
with a VM group VLAN).
VMAPs are configured using the following ISCLI configuration command path:
Once a VMAP filter is created, it can be assigned or removed using the following
commands:
For regular VLANs, use config-vlan mode:
For a VM group, use the global configuration mode:
Note: Each VMAP can be assigned to only one VLAN or VM group. However, each
VLAN or VM group may have multiple VMAPs assigned to it.
The optional
serverports
or
non-serverports
parameter can be specified to
apply the action (to add or remove the VMAP) for either the switch server ports
(
serverports
) or switch uplink ports (
non-serverports
). If omitted, the
operation will be applied to all ports in the associated VLAN or VM group.
Note: VMAPs have a lower priority than port-based ACLs. If both an ACL and a
VMAP match a particular packet, both filter actions will be applied as long as
there is no conflict. In the event of a conflict, the port ACL will take priority,
though switch statistics will count matches for both the ACL and VMAP.
RS G8000(config)# access-control vmap <VMAP ID> ?
action Set filter action
egress-port Set to filter for packets egressing this port
ethernet Ethernet header options
ipv4 IP version 4 header options
meter ACL metering configuration
packet-format Set to filter specific packet format types
re-mark ACL re-mark configuration
statistics Enable access control list statistics
tcp-udp TCP and UDP filtering options
RS G8000(config)# vlan <VLAN ID>
RS G8000(config-vlan)# [no] vmap <VMAP ID> [serverports|
non-serverports]
RS G8000(config)# [no] virt vmgroup <ID> vmap <VMAP ID>
[serverports|non-serverports]

Table of Contents

Other manuals for IBM RackSwitch G8000

Question and Answer IconNeed help?

Do you have a question about the IBM RackSwitch G8000 and is the answer not in the manual?

IBM RackSwitch G8000 Specifications

General IconGeneral
ModelG8000
CategoryNetwork Router
MAC Address Table Size32, 000 entries
RAM512 MB
Power RedundancyYes
VLAN SupportYes
Layer 3 RoutingYes
LayerLayer 2/Layer 3
Power SupplyDual AC or DC
Jumbo Frame SupportYes
Routing ProtocolOSPF, RIP, BGP
Remote Management ProtocolSSH, SNMP
FeaturesVLAN, QoS
Compliant StandardsIEEE 802.1Q
ManagementCLI, Web interface
Port Configuration48 x 10/100/1000 Mbps ports, 4 x 10 Gigabit Ethernet SFP+ ports

Summary

Chapter 1. Switch Administration

Command Line Interface

Explains the N/OS Command Line Interface (CLI) for switch administration, including menu structure and commands.

Establishing a Connection

Covers initial switch connection methods and requirements for remote access via network.

Using SSH to Access the Switch

Describes Secure Shell (SSH) as a secure alternative to Telnet for remote switch management.

Chapter 2. Initial Setup

Information Needed for Setup

Lists essential information required for the initial switch setup process.

Setup Part 1: Basic System Configuration

Guides through initial system configuration, including date, time, Spanning Tree, port, and IP interface settings.

Setup Part 2: Port Configuration

Details the steps for configuring individual ports, including flow control and autonegotiation.

Setup Part 3: VLANs

Covers the configuration of Virtual Local Area Networks (VLANs), including naming and port assignment.

Setup Part 4: IP Configuration

Explains how to configure IP interfaces, including IP address, subnet mask, and VLAN assignment.

IP Interfaces

Details configuring IP interfaces for defining network connections and IP presence on the network.

Setup Part 5: Final Steps

Covers the final steps of the setup utility, including reviewing, applying, and saving configuration changes.

Chapter 3. Switch Software Management

Loading New Software to Your Switch

Explains how to load new software images (image1, image2, boot) onto the switch.

Recovering from a Failed Upgrade

Provides a procedure to recover from a failed software upgrade using XModem download.

Chapter 4. Securing Administration

Secure Shell and Secure Copy

Details Secure Shell (SSH) and Secure Copy (SCP) features for secure remote management and file transfer.

Configuring SSH/SCP Features on the Switch

Explains how to enable/disable SSH and SCP, and configure the SCP administrator password.

Using SSH and SCP Client Commands

Shows the format for using SSH and SCP client commands to log in and copy files.

End User Access Control

Describes configuring end-user accounts for tasks via switch CLI commands, requiring username/password authentication.

Chapter 5. Authentication & Authorization Protocols

RADIUS Authentication and Authorization

Explains RADIUS support for authenticating and authorizing remote administrators using a client/server model.

Configuring RADIUS on the Switch

Provides procedures to configure RADIUS authentication, including server IPs, secret, and retry settings.

TACACS+ Authentication

Discusses TACACS+ protocol support for authentication and authorization, highlighting advantages over RADIUS.

LDAP Authentication and Authorization

Describes the LDAP method for authenticating and authorizing remote administrators using a client/server model.

Configuring the LDAP Server

Guides on configuring G8000 user groups and accounts within the LDAP server's domain.

Chapter 6. 802.1X Port-Based Network Access Control

Extensible Authentication Protocol over LAN

Explains the IEEE 802.1X protocol and EAPoL for port-based network access control.

Chapter 7. Access Control Lists

IPv4 ACLs

Details support for IPv4 ACLs, including configuration paths and number of supported ACLs.

IPv6 ACLs

Details support for IPv6 ACLs, including configuration paths and number of supported ACLs.

Chapter 8. VLANs

VLAN Tagging

Details 802.1Q VLAN tagging, placing VLAN identifiers in frame headers for multi-VLAN port membership.

Private VLANs

Describes Private VLANs for Layer 2 isolation, controlling traffic within a VLAN domain.

Chapter 9. Ports and Trunking

Static Trunks

Details static trunk requirements and configuration rules for creating trunk groups.

Configuring a Static Port Trunk

Provides a step-by-step example for configuring static port trunks between two switches.

Link Aggregation Control Protocol

Explains Link Aggregation Control Protocol (LACP) as an IEEE standard for grouping physical ports into logical ports.

Configuring LACP

Details the procedure to configure LACP for ports to participate in link aggregation.

Chapter 10. Spanning Tree Protocols

Spanning Tree Protocol Modes

Describes the STP modes supported: RSTP, PVRST, and MSTP.

Rapid Spanning Tree Protocol (RSTP)

Explains RSTP for rapid convergence and fast re-configuration in networks carrying delay-sensitive traffic.

Multiple Spanning Tree Protocol (MSTP)

Describes MSTP for rapid convergence and load balancing in VLAN environments using multiple STGs.

Chapter 11. Quality of Service

Using ACL Filters

Details how Access Control Lists (ACLs) are used to classify and segment traffic for different service levels.

ACL Metering and Re-Marking

Explains configuring QoS meters to define traffic profiles and re-mark packets for service levels.

Using DSCP Values to Provide QoS

Describes using DiffServ Code Points (DSCP) to classify traffic and provide QoS functions.

Chapter 12. Virtualization

Chapter 13. Stacking

The Master Switch

Describes the role of the Master switch in controlling stack operation and distributing configuration.

Configuring a Stack

Provides procedures for creating a stack of switches, including choosing a Master and configuring stacking mode.

Configuring Each Switch in a Stack

Details steps for configuring each switch in a stack, including enabling stacking and setting membership mode.

Upgrading Software in an Existing Stack

Details how to upgrade software on all stacked switches simultaneously via the Master switch.

Replacing or Removing Stacked Switches

Provides procedures for replacing or removing stacked switches while minimizing disruption.

Chapter 14. VMready

Virtual Link Aggregation (VLAGs)

Details VLAGs for pairing switches as peers to establish multi-port trunks, providing redundancy.

Stacking

Explains stacking for aggregating multiple switches into a unified system for simplified management and increased capacity.

VMready

Describes VMready software for virtualization awareness, automatic VE discovery, and VM group configuration.

Distributed VM Groups

Describes distributed VM groups synchronized with a virtualization management server for centralized VE configuration.

VM Profiles

Explains VM profiles required for distributed VM groups, defining VLAN and bandwidth shaping characteristics.

Assigning a vCenter

Provides requirements and commands for assigning a vCenter to the switch for VE information collection.

VM Policy Bandwidth Control

Allows specifying data flow limits for VEs, attaching policies to VEs rather than switch ports.

VMready Configuration Example

Provides a step-by-step example for configuring VMready features, including VM groups and profiles.

Chapter 15. Basic IP Routing

Routing Between IP Subnets

Discusses building versatile topologies and performing routing functions at wire speed with switched topologies.

ECMP Static Routes

Details Equal-Cost Multi-Path (ECMP) for routing packets along multiple equal-cost paths and load sharing.

Dynamic Host Configuration Protocol

Explains DHCP as a protocol for automatically assigning IP addresses and configuration information to network devices.

Chapter 16. Internet Protocol Version 6

IPv6 Interfaces

Details configuring IPv6 addresses manually or using stateless autoconfiguration on interfaces.

Neighbor Discovery

Explains the Neighbor Discovery protocol (ND) for gathering information about IPv6 nodes and their link-layer addresses.

Chapter 17. IPsec with IPv6

IPsec Protocols

Describes the IPsec protocols supported: Authentication Header (AH), Encapsulating Security Payload (ESP), and IKEv2.

Internet Key Exchange Version 2 (IKEv2)

Explains IKEv2 for mutual authentication and establishing security associations for IPsec.

Using IPsec with the RackSwitch G8000

Describes IPsec support for fragmentation and reassembly of IP packets, acting as an end node.

Setting up Authentication

Covers setting up key policy authentication for IPsec, including preshared keys and digital certificates.

Creating an IKEv2 Proposal

Guides on creating an IKEv2 proposal with multiple encryption and integrity algorithms.

Importing an IKEv2 Digital Certificate

Provides steps to import CA certificate, host key file, and host certificate file for authentication.

Generating an IKEv2 Digital Certificate

Details creating an IKEv2 digital certificate by defining information for the various fields.

Enabling IKEv2 Preshared Key Authentication

Explains setting up IKEv2 preshared key authentication, including local and remote keys.

Setting Up a Key Policy

Covers defining an IPsec key policy, including creating transform sets and traffic selectors.

Chapter 18. Routing Information Protocol

RIPv2

Details RIPv2 as the preferred configuration, its expanded information, security features, and multicast UDP use.

Chapter 19. Internet Group Management Protocol

IGMP Snooping

Explains IGMP Snooping for listening to IGMP conversations and conserving network resources.

IGMP Snooping Configuration Example

Shows configuration steps for IGMP Snooping on the G8000, including VLANs, IP interfaces, and STP.

IGMP Relay

Explains IGMP Relay functionality, allowing the switch to act as an IGMP Proxy device.

Configure IGMP Relay

Details the procedure to configure IGMP Relay, including IP interfaces, VLANs, and Mrouter setup.

Troubleshooting

Provides steps to resolve common IGMP Snooping and Relay configuration issues.

Chapter 21. Border Gateway Protocol

Forming BGP Peer Routers

Details establishing TCP connections between BGP routers to form peer relationships and exchange routes.

What is a Route Map?

Explains route maps for controlling and modifying routing information, used by OSPF and BGP.

Selecting Route Paths in BGP

Explains BGP's criteria for selecting the best path from multiple learned routes.

BGP Failover Configuration

Provides an example for creating redundant default gateways for BGP failover.

Chapter 22. OSPF

OSPFv2 Implementation in IBM N/OS

Describes OSPFv2 implementation in N/OS, covering parameters, area definition, and route summarization.

Defining Areas

Explains how to designate the backbone area (area 0) and configure other OSPF areas with index and ID.

Summarizing Routes

Details route summarization for condensing routing information and reducing network complexity.

Virtual Links

Describes using virtual links to connect areas to the backbone through another non-backbone area.

Authentication

Details OSPF authentication for trusted routing devices using simple password or MD5 cryptographic authentication.

OSPFv2 Configuration Examples

Provides step-by-step instructions for configuring OSPFv2, including simple domains, virtual links, and route summarization.

Example 2: Virtual Links

Provides a configuration example for connecting areas via virtual links through transit areas.

Example 3: Summarizing Routes

Shows an example of OSPF route summarization for advertising single summary routes.

OSPFv3 Implementation in IBM N/OS

Describes OSPFv3 implementation, its support for IPv6, and independent command paths.

Chapter 23. Basic Redundancy

Trunking for Link Redundancy

Explains how multiple switch ports combined into trunks provide robust, high-bandwidth connections and fault tolerance.

Virtual Link Aggregation

Describes VLAGs for pairing switches as peers to establish multi-port trunks, providing redundancy.

Hot Links

Provides basic link redundancy with fast recovery for network topologies requiring Spanning Tree to be turned off.

Active MultiPath Protocol

Explains Active MultiPath Protocol (AMP) for connecting switches in a loop topology and load-balancing traffic.

Stacking for High Availability Topologies

Explains how stacking provides redundancy by aggregating switches into a unified system.

Chapter 24. Layer 2 Failover

Monitoring Trunk Links

Details how Layer 2 Failover can be enabled on any trunk group to monitor links and disable control ports on failure.

Manually Monitoring Port Links

Describes configuring ports/trunks to monitor for link failures and disable control ports when the trigger limit is reached.

Configuring Layer 2 Failover

Details the procedure to configure a Layer 2 Failover Manual Monitor.

Chapter 25. Virtual Router Redundancy Protocol

VRRP Overview

Explains VRRP for redundant router configurations, eliminating single points-of-failure in LANs.

Master and Backup Virtual Router

Describes the selection of a virtual router master and how backups assume responsibilities if the master fails.

VRRP Operation

Details how the virtual router master responds to ARP and ICMP requests, and how backups take over.

Selecting the Master VRRP Router

Explains the priority-based bidding process for determining the VRRP master router.

Failover Methods

Describes failover methods based on VRRP and N/OS proprietary extensions for high availability.

Active-Active Redundancy

Explains active-active configurations where two switches provide redundancy and process traffic on different subnets.

Configuring the Switch for Tracking

Guides on configuring the switch for tracking VRRP priority based on user preferences and network environment.

High Availability Configurations

Discusses useful and easily deployed redundant configurations, including active-active setups.

VRRP High-Availability Using Multiple VIRs

Shows an example configuration using multiple G8000s as VRRP routers in an active-active setup.

VRRP High-Availability Using VLAGs

Explains using VRRP with VLAGs and LACP-capable servers for seamless redundancy.

Chapter 26. Link Layer Discovery Protocol

Enabling or Disabling LLDP

Details how to globally enable or disable LLDP on the G8000.

Transmit and Receive Control

Covers configuring transmit and receive LLDP information on a port-by-port basis.

Chapter 27. Simple Network Management Protocol

SNMP Version 1 & Version 2

Details accessing the SNMP agent using community strings and configuring trap hosts.

SNMP Version 3

Explains SNMP version 3 as an enhanced version with additional security and authentication features.

SNMPv3 Trap Host Configuration

Guides on configuring SNMPv3 traps, choosing privacy and authentication options, and user table configuration.

Chapter 28. Remote Monitoring

Chapter 30. Port Mirroring

Related product manuals