Do you have a question about the IBM RackSwitch G8000 and is the answer not in the manual?
Model | G8000 |
---|---|
Category | Network Router |
MAC Address Table Size | 32, 000 entries |
RAM | 512 MB |
Power Redundancy | Yes |
VLAN Support | Yes |
Layer 3 Routing | Yes |
Layer | Layer 2/Layer 3 |
Power Supply | Dual AC or DC |
Jumbo Frame Support | Yes |
Routing Protocol | OSPF, RIP, BGP |
Remote Management Protocol | SSH, SNMP |
Features | VLAN, QoS |
Compliant Standards | IEEE 802.1Q |
Management | CLI, Web interface |
Port Configuration | 48 x 10/100/1000 Mbps ports, 4 x 10 Gigabit Ethernet SFP+ ports |
Explains the N/OS Command Line Interface (CLI) for switch administration, including menu structure and commands.
Covers initial switch connection methods and requirements for remote access via network.
Describes Secure Shell (SSH) as a secure alternative to Telnet for remote switch management.
Lists essential information required for the initial switch setup process.
Guides through initial system configuration, including date, time, Spanning Tree, port, and IP interface settings.
Details the steps for configuring individual ports, including flow control and autonegotiation.
Covers the configuration of Virtual Local Area Networks (VLANs), including naming and port assignment.
Explains how to configure IP interfaces, including IP address, subnet mask, and VLAN assignment.
Details configuring IP interfaces for defining network connections and IP presence on the network.
Covers the final steps of the setup utility, including reviewing, applying, and saving configuration changes.
Explains how to load new software images (image1, image2, boot) onto the switch.
Provides a procedure to recover from a failed software upgrade using XModem download.
Details Secure Shell (SSH) and Secure Copy (SCP) features for secure remote management and file transfer.
Explains how to enable/disable SSH and SCP, and configure the SCP administrator password.
Shows the format for using SSH and SCP client commands to log in and copy files.
Describes configuring end-user accounts for tasks via switch CLI commands, requiring username/password authentication.
Explains RADIUS support for authenticating and authorizing remote administrators using a client/server model.
Provides procedures to configure RADIUS authentication, including server IPs, secret, and retry settings.
Discusses TACACS+ protocol support for authentication and authorization, highlighting advantages over RADIUS.
Describes the LDAP method for authenticating and authorizing remote administrators using a client/server model.
Guides on configuring G8000 user groups and accounts within the LDAP server's domain.
Explains the IEEE 802.1X protocol and EAPoL for port-based network access control.
Details support for IPv4 ACLs, including configuration paths and number of supported ACLs.
Details support for IPv6 ACLs, including configuration paths and number of supported ACLs.
Details 802.1Q VLAN tagging, placing VLAN identifiers in frame headers for multi-VLAN port membership.
Describes Private VLANs for Layer 2 isolation, controlling traffic within a VLAN domain.
Details static trunk requirements and configuration rules for creating trunk groups.
Provides a step-by-step example for configuring static port trunks between two switches.
Explains Link Aggregation Control Protocol (LACP) as an IEEE standard for grouping physical ports into logical ports.
Details the procedure to configure LACP for ports to participate in link aggregation.
Describes the STP modes supported: RSTP, PVRST, and MSTP.
Explains RSTP for rapid convergence and fast re-configuration in networks carrying delay-sensitive traffic.
Describes MSTP for rapid convergence and load balancing in VLAN environments using multiple STGs.
Details how Access Control Lists (ACLs) are used to classify and segment traffic for different service levels.
Explains configuring QoS meters to define traffic profiles and re-mark packets for service levels.
Describes using DiffServ Code Points (DSCP) to classify traffic and provide QoS functions.
Describes the role of the Master switch in controlling stack operation and distributing configuration.
Provides procedures for creating a stack of switches, including choosing a Master and configuring stacking mode.
Details steps for configuring each switch in a stack, including enabling stacking and setting membership mode.
Details how to upgrade software on all stacked switches simultaneously via the Master switch.
Provides procedures for replacing or removing stacked switches while minimizing disruption.
Details VLAGs for pairing switches as peers to establish multi-port trunks, providing redundancy.
Explains stacking for aggregating multiple switches into a unified system for simplified management and increased capacity.
Describes VMready software for virtualization awareness, automatic VE discovery, and VM group configuration.
Describes distributed VM groups synchronized with a virtualization management server for centralized VE configuration.
Explains VM profiles required for distributed VM groups, defining VLAN and bandwidth shaping characteristics.
Provides requirements and commands for assigning a vCenter to the switch for VE information collection.
Allows specifying data flow limits for VEs, attaching policies to VEs rather than switch ports.
Provides a step-by-step example for configuring VMready features, including VM groups and profiles.
Discusses building versatile topologies and performing routing functions at wire speed with switched topologies.
Details Equal-Cost Multi-Path (ECMP) for routing packets along multiple equal-cost paths and load sharing.
Explains DHCP as a protocol for automatically assigning IP addresses and configuration information to network devices.
Details configuring IPv6 addresses manually or using stateless autoconfiguration on interfaces.
Explains the Neighbor Discovery protocol (ND) for gathering information about IPv6 nodes and their link-layer addresses.
Describes the IPsec protocols supported: Authentication Header (AH), Encapsulating Security Payload (ESP), and IKEv2.
Explains IKEv2 for mutual authentication and establishing security associations for IPsec.
Describes IPsec support for fragmentation and reassembly of IP packets, acting as an end node.
Covers setting up key policy authentication for IPsec, including preshared keys and digital certificates.
Guides on creating an IKEv2 proposal with multiple encryption and integrity algorithms.
Provides steps to import CA certificate, host key file, and host certificate file for authentication.
Details creating an IKEv2 digital certificate by defining information for the various fields.
Explains setting up IKEv2 preshared key authentication, including local and remote keys.
Covers defining an IPsec key policy, including creating transform sets and traffic selectors.
Details RIPv2 as the preferred configuration, its expanded information, security features, and multicast UDP use.
Explains IGMP Snooping for listening to IGMP conversations and conserving network resources.
Shows configuration steps for IGMP Snooping on the G8000, including VLANs, IP interfaces, and STP.
Explains IGMP Relay functionality, allowing the switch to act as an IGMP Proxy device.
Details the procedure to configure IGMP Relay, including IP interfaces, VLANs, and Mrouter setup.
Provides steps to resolve common IGMP Snooping and Relay configuration issues.
Details establishing TCP connections between BGP routers to form peer relationships and exchange routes.
Explains route maps for controlling and modifying routing information, used by OSPF and BGP.
Explains BGP's criteria for selecting the best path from multiple learned routes.
Provides an example for creating redundant default gateways for BGP failover.
Describes OSPFv2 implementation in N/OS, covering parameters, area definition, and route summarization.
Explains how to designate the backbone area (area 0) and configure other OSPF areas with index and ID.
Details route summarization for condensing routing information and reducing network complexity.
Describes using virtual links to connect areas to the backbone through another non-backbone area.
Details OSPF authentication for trusted routing devices using simple password or MD5 cryptographic authentication.
Provides step-by-step instructions for configuring OSPFv2, including simple domains, virtual links, and route summarization.
Provides a configuration example for connecting areas via virtual links through transit areas.
Shows an example of OSPF route summarization for advertising single summary routes.
Describes OSPFv3 implementation, its support for IPv6, and independent command paths.
Explains how multiple switch ports combined into trunks provide robust, high-bandwidth connections and fault tolerance.
Describes VLAGs for pairing switches as peers to establish multi-port trunks, providing redundancy.
Provides basic link redundancy with fast recovery for network topologies requiring Spanning Tree to be turned off.
Explains Active MultiPath Protocol (AMP) for connecting switches in a loop topology and load-balancing traffic.
Explains how stacking provides redundancy by aggregating switches into a unified system.
Details how Layer 2 Failover can be enabled on any trunk group to monitor links and disable control ports on failure.
Describes configuring ports/trunks to monitor for link failures and disable control ports when the trigger limit is reached.
Details the procedure to configure a Layer 2 Failover Manual Monitor.
Explains VRRP for redundant router configurations, eliminating single points-of-failure in LANs.
Describes the selection of a virtual router master and how backups assume responsibilities if the master fails.
Details how the virtual router master responds to ARP and ICMP requests, and how backups take over.
Explains the priority-based bidding process for determining the VRRP master router.
Describes failover methods based on VRRP and N/OS proprietary extensions for high availability.
Explains active-active configurations where two switches provide redundancy and process traffic on different subnets.
Guides on configuring the switch for tracking VRRP priority based on user preferences and network environment.
Discusses useful and easily deployed redundant configurations, including active-active setups.
Shows an example configuration using multiple G8000s as VRRP routers in an active-active setup.
Explains using VRRP with VLAGs and LACP-capable servers for seamless redundancy.
Details how to globally enable or disable LLDP on the G8000.
Covers configuring transmit and receive LLDP information on a port-by-port basis.
Details accessing the SNMP agent using community strings and configuring trap hosts.
Explains SNMP version 3 as an enhanced version with additional security and authentication features.
Guides on configuring SNMPv3 traps, choosing privacy and authentication options, and user table configuration.