Fujitsu Siemens Computers PRIMERGY BX Operating and installation instructions

Lan Switch and Router Blade
1
PRIMERGY
BX
Blade
Server
Systems
LA
N
Router and
Switch
Blade
User
Interface
De
scri
ption
Editon March 2006

Lan Switch and Router Blade
2
Comments…
Suggestions…
Corrections…
The
User
Documentation
Department
would
like
to
know
your
opinion
on
this
manual. Your
feedback
helps
us
to
optimize
our
documentation
to
suit
your
individual
needs.
Fax
forms
for
sending
us
your
comments
are
included
at
the
back
of
the
manual.
There
you
will
also
find
the
addresses
of
the
relevant
User
Documentation
Department
Copyright
and
Trademarks
Copyright
©
2006
Fujitsu
Siemens
Computers
GmbH. All
rights
reserved.
Delivery
subject
to
availability;
right
of
technical
modifications
reserved.
All
hardware
and
software
names
used
are
trademarks
of
their
respective
manufacturers.

Lan Switch and Router Blade
3
Important Notes
Introduction
Networking Planning
Making Network Connection
Configuration the Switch Blade
Web Base Command Interface
Command Reference
UsingSNMP
System Defaulting
Troubleshooting and Tips

Lan Switch and Router Blade
4
CONTENTS
1Important Notes...............................................................................................................10
1.1 Information About Boards..........................................................................................10
1.2 Compliance Statements ............................................................................................ 11
2Introduction .....................................................................................................................14
2.1 Features of the Switch...............................................................................................14
2.1.1 MAC Address Supported Features................................................................15
2.1.2 Layer 2 Features ................................................................................................... 16
2.1.3 Spanning Tree Protocol Features..........................................................................18
2.1.4 Ethernet Switch Module Management Features ...................................................19
2.1.5 Security Features.....................................................................................................21
2.1.6 Quality of Service Features...................................................................................21
2.1.7 Layer III Routing Features.....................................................................................23
IP Routing..................................................................................................................23
Routing Information Protocol (RIP)............................................................................23
BOOTP/DHCP Relay Agent.......................................................................................24
Virtual Router Redundancy Protocol (VRRP)............................................................24
Router Discovery .......................................................................................................24
Virtual LAN (VLAN) Routing ......................................................................................25
Route Redistribution ..................................................................................................25
Route Preferences.....................................................................................................25
Open Shortest Path First (OSPF)..............................................................................26
DNS and DNS Relay .................................................................................................27
IP Multinetting ............................................................................................................27
2.1.8 IP Multicast Features ............................................................................................27
IGMPv3......................................................................................................................27
Protocol Independent Multicast – Dense Mode (PIM-DM) ........................................28
Protocol Independent Multicast – Sparse Mode (PIM-SM)........................................29
Distance Vector Multicast Routing Protocol (DVMRP) ..............................................30
2.2 Description of Hardware............................................................................................31
2.2.1 Ethernet Ports .......................................................................................................31
2.3 Features and Benefits ...............................................................................................33
2.4
Notational
Conventions
..............................................................................................34
2.5
Ta r g e t
Group
..............................................................................................................35
2.6
Technical
Data
...........................................................................................................36
3Network Planning ............................................................................................................38

Lan Switch and Router Blade
5
3.1
Introduction
to
Switching
...........................................................................................38
3.2
Sample
Applications
..................................................................................................39
4Making Network Connections ......................................................................................... 41
4.1
Connecting
to
1000BASE-T
Devices
.........................................................................41
4.2
1000BASE-T
Cable
Requirements
............................................................................42
4.3
1000BASE-T
Pin
Assignments
...................................................................................43
5Configuration the Switch Blade Module ..........................................................................44
5.1 Overview ...................................................................................................................44
5.2 Connecting the Ethernet Switch Module ...................................................................45
5.3 Start up and Configuration the Ethernet Switch Module............................................47
5.4 Configuring the Terminal ...........................................................................................48
5.5 Booting Device ..........................................................................................................49
5.6 Software Download ...................................................................................................50
5.6.1 In BootROM Back Door CLI ..........................................................................50
5.6.2 In Operation Code CLI...................................................................................51
6Web-Based Management Interface ................................................................................54
6.1 Overview ...................................................................................................................54
6.2 Main Menu ................................................................................................................55
6.2.1 System Menu.................................................................................................55
6.2.2 Switching Menu ........................................................................................... 113
6.2.3 Routing Menu ..............................................................................................153
6.2.4 Security Menu..............................................................................................212
6.2.5 QOS Menu...................................................................................................231
6.2.6 IP Multicast Menu ........................................................................................255
7Command Reference ....................................................................................................285
7.1 CLI Command Format.............................................................................................285
7.2 CLI Mode-based Topology ......................................................................................286
7.3 System Information and Statistics commands.........................................................288
7.3.1 show arp......................................................................................................288
7.3.2 show calendar .............................................................................................288
7.3.3 show eventlog..............................................................................................289
7.3.4 show running-config ....................................................................................289
7.3.5 show sysinfo ................................................................................................ 290
7.3.6 show system................................................................................................ 291
7.3.7 show hardware ............................................................................................291
7.3.8 show version................................................................................................292
7.3.9 show loginsession .......................................................................................293

Lan Switch and Router Blade
6
7.4 Device Configuration Commands............................................................................294
7.4.1 Interface.......................................................................................................294
7.4.2 L2 MAC Address and Multicast Forwarding Database Tables.....................307
7.4.3 VLAN Management .....................................................................................312
7.4.4 GVRP and Bridge Extension ....................................................................... 326
7.4.5 IGMP Snooping ...........................................................................................336
7.4.6 Port Channel................................................................................................348
7.4.7 Storm Control............................................................................................... 355
7.4.8 L2 Priority ....................................................................................................362
7.4.9 Port Mirror....................................................................................................364
7.5 Management Commands ........................................................................................366
7.5.1 Network Commands .................................................................................... 366
7.5.2 Serial Interface Commands .........................................................................373
7.5.3 Telnet Session Commands..........................................................................376
7.5.4 SNMP Server Commands ........................................................................... 382
7.5.5 SNMP Trap Commands............................................................................... 391
7.5.6 HTTP commands.........................................................................................395
7.5.7 Secure Shell (SSH) Commands .................................................................. 399
7.5.8 DHCP Client Commands............................................................................. 401
7.5.9 DHCP Relay Commands.............................................................................402
7.6 Spanning Tree Commands......................................................................................405
7.6.1 Show Commands ........................................................................................405
7.6.2 Configuration Commands............................................................................412
7.7 System Log Management Commands ....................................................................422
7.7.1 Show Commands ........................................................................................422
7.7.2 show logging buffered .................................................................................423
7.7.3 show logging traplog....................................................................................423
7.7.4 Configuration Commands............................................................................424
7.8 Script Management Commands..............................................................................429
7.8.1 script apply ..................................................................................................429
7.8.2 script delete .................................................................................................429
7.8.3 script list....................................................................................................... 430
7.8.4 script show...................................................................................................430
7.9 User Account Management Commands..................................................................431
7.9.1 Show Commands ........................................................................................431
7.9.2 Configuration Commands............................................................................432
7.10 Security Commands................................................................................................434

Lan Switch and Router Blade
7
7.10.1 Show Commands ........................................................................................434
7.10.2 Configuration Commands............................................................................446
7.10.3 Dot1x Configuration Commands ................................................................. 448
7.10.4 Radius Configuration Commands................................................................455
7.10.5 TACACS Configuration Commands ............................................................459
7.10.6 Port Security Configuration Commands ......................................................462
7.11 CDP (Cisco Discovery Protocol) Commands ..........................................................465
7.11.1 Show Commands ........................................................................................465
7.11.2 Configuration Commands............................................................................ 467
7.12 Link up & Port Backup State Commands ................................................................470
7.12.1 Show Commands ........................................................................................470
7.12.2 Configuration Commands............................................................................471
7.13 SNTP (Simple Network Time Protocol) Commands................................................ 474
7.13.1 Show Commands ........................................................................................474
7.13.2 Configuration Commands............................................................................476
7.14 System Utilities........................................................................................................481
7.14.1 clear.............................................................................................................481
7.14.2 copy............................................................................................................. 489
7.14.3 delete...........................................................................................................491
7.14.4 dir.................................................................................................................492
7.14.5 whichboot ....................................................................................................492
7.14.6 boot-system.................................................................................................493
7.14.7 ping..............................................................................................................493
7.14.8 traceroute ....................................................................................................494
7.14.9 logging cli-command....................................................................................495
7.14.10calendar set .................................................................................................495
7.14.11reload...........................................................................................................496
7.14.12configure......................................................................................................496
7.14.13disconnect ...................................................................................................497
7.14.14hostname.....................................................................................................497
7.14.15quit ........................................................................................................497
7.15 Differentiated Service Command ............................................................................498
7.15.1 General Commands ....................................................................................499
7.15.2 Class Commands ........................................................................................500
7.15.3 Policy Commands........................................................................................508
7.15.4 Service Commands .....................................................................................514
7.15.5 Show Commands ........................................................................................515

Lan Switch and Router Blade
8
7.16 ACL Command........................................................................................................523
7.16.1 Show Commands ........................................................................................523
7.16.2 Configuration Commands............................................................................526
7.17 CoS (Class of Service) Command ..........................................................................530
7.17.1 Show Commands ........................................................................................530
7.17.2 Configuration Commands............................................................................533
7.18 Address Resolution Protocol (ARP) Commands.....................................................540
7.18.1 Show Commands ........................................................................................540
7.18.2 Configuration Commands............................................................................542
7.19 IP Routing Commands ............................................................................................546
7.19.1 Show Commands ........................................................................................546
7.19.2 Configuration Commands............................................................................550
7.20 Open Shortest Path First (OSPF) Commands ........................................................555
7.20.1 Show Commands ........................................................................................555
7.20.2 Configuration Commands............................................................................564
7.21 Bootp/DHCP Relay Commands ..............................................................................584
7.21.1 show bootpdhcprelay................................................................................... 584
7.21.2 bootpdhcprelay cidoptmode ........................................................................ 585
7.21.3 bootpdhcprelay enable ................................................................................ 585
7.21.4 bootpdhcprelay maxhopcount .....................................................................585
7.21.5 bootpdhcprelay minwaittime ........................................................................ 586
7.21.6 bootpdhcprelay serverip .............................................................................. 586
7.21.7 ip dhcp restart..............................................................................................587
7.21.8 ip dhcp client-identifier.................................................................................587
7.22 Domain Name Server Relay Commands ................................................................588
7.22.1 Show Commands ........................................................................................588
7.22.2 Configuration Commands............................................................................589
7.23 Routing Information Protocol (RIP) Commands ......................................................594
7.23.1 Show Commands ........................................................................................594
7.23.2 Configuration Commands............................................................................597
7.24 Router Discovery Protocol Commands ...................................................................604
7.24.1 show ip irdp .................................................................................................604
7.24.2 ip irdp...........................................................................................................605
7.24.3 ip irdp broadcast .......................................................................................... 605
7.24.4 ip irdp holdtime ............................................................................................605
7.24.5 ip irdp maxadvertinterval .............................................................................606
7.24.6 ip irdp minadvertinterval ..............................................................................606

Lan Switch and Router Blade
9
7.24.7 ip irdp preference.........................................................................................607
7.25 VLAN Routing Commands ......................................................................................607
7.25.1 show ip vlan.................................................................................................607
7.25.2 vlan routing..................................................................................................608
7.26 Virtual Router Redundancy Protocol (VRRP) Commands ......................................609
7.26.1 Show Commands ........................................................................................609
7.26.2 Configuration Commands............................................................................ 611
7.27 Distance Vector Multicast Routing Protocol (DVMRP) Commands.........................615
7.27.1 Show Commands ........................................................................................615
7.27.2 Configuration Commands............................................................................619
7.28 Internet Group Management Protocol (IGMP) Commands .....................................620
7.28.1 Show Commands ........................................................................................620
7.28.2 Configuration Commands............................................................................624
7.29 Multicast Commands...............................................................................................629
7.29.1 Show Commands ........................................................................................629
7.29.2 Configuration Commands............................................................................635
7.30 Protocol Independent Multicast – Dense Mode (PIM-DM) Commands...................641
7.30.1 Show Commands ........................................................................................641
7.30.2 Configuration Commands............................................................................643
7.31 Protocol Independent Multicast – Sparse Mode (PIM-SM) Commands ..................645
7.31.1 Show Commands ........................................................................................645
7.31.2 Configuration Commands............................................................................650
8Using SNMP..................................................................................................................656
8.1
Supported
MIBs
.......................................................................................................657
8.2
Accessing
MIB
Objects
............................................................................................659
8.3
Supported
Tr a p s
......................................................................................................662
9Default Settings.............................................................................................................663
9.1 The overview default settings for the system module are shown in the following table.
................................................................................................................................ 663
9.2
The
default
settings
for
all
the
configuration
commands
are
shown
in
the following
table.
................................................................................................................................ 665
10 Troubleshooting and Tips ..............................................................................................673
10.1
Diagnosing
Switch
Indicators
...................................................................................673
10.2
Accessing
the
Management
Interface
......................................................................673

Information About Boards Important Notes
Lan Switch and Router Blade
10
1 Important Notes
Store this manual close to the device. If you pass the device on to third parties,
you should pass this manual on with it.
Be sure to read this page carefully and note the information before you
open the device.
You cannot access the switch blade without first opening the device. How
to dismantle and reassemble the device is described in the Operating
Manual accompanying the device.
Please observe the safety information provided in the “Important Notes”
chapter in the device’s operating manual.
Components can become very hot during operation. Ensure you do not
touch components when handling the device. There is a danger of burns!
The warranty is invalidated if the device is damaged during the installation.
1.1 Information About Boards
To prevent damage to the device or the components and conductors on it,
please take great care when you insert or remove it. Take great care to ensure
that the board is slotted in straight, without damaging components or
conductors on it, or any other components.
Be especially careful with the locking mechanisms (catches, centering pins etc.)
when you replace the board.
Never use sharp objects (screwdrivers) for leverage.
Boards with electrostatic sensitive devices (ESD) are
identifiable by the label shown.
When you handle boards fitted with ESDs, you must, under
all circumstances, observe the following points:
You must always discharge static build up (e.g., by
touching a grounded object) before working.
The equipment and tools you use must be free of static
charges.
Remove the power plug from the mains supply before
inserting or removing boards containing ESDs.
Always hold boards with ESDs by their edges.
Never touch pins or conductors on boards fitted with
ESDs.

ComplianceStatements Important Notes
Lan Switch and Router Blade
11
!
1.2 Compliance Statements
FCC Class A Compliance
This equipment has been tested and found to comply with the limits for a
“Class A” digital device, pursuant to Part 15 of the FCC rules and meets all
requirements of the Canadian Interference-Causing Equipment Regulations.
These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and
can radiate radio frequency energy and, if not installed and used in strict accordance
with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio
or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between equipment and the receiver.
Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Fujitsu Siemens Computers is not responsible for any radio or television interference
caused by unauthorized modifications of this equipment or the substitution
or attachment of connecting cables and equipment other than those
specified by Fujitsu Siemens Computers. The correction of interferences
caused by such unauthorized modification, substitution or attachment will be the
responsibility of the user.
You may use unshielded twisted-pair (UTP) cables for RJ-45 connections –
Category 3 or greater for 10 Mbps connections, Category 5 for 100 Mbps
connections, and Category 5 or 5e for 1000 Mbps connections.
Wear
an
anti-static
wrist
strap
or
take
other
suitable
measures
to
prevent
electrostatic
discharge
when
handling
this
equipment.
Industry
Canada
-
Class
A
This
digital
apparatus
does
not
exceed
the
Class
A
limits
for
radio
noise emissions
from
digital
apparatus
as
set
out
in
the
interference-causing equipment
standard
entitled
“Digital
Apparatus,”
ICES-003
of
the
Department
of Communications.
Cet
appareil
numérique
respecte
les
limites
de
bruits
radioélectriques
appli- cables
aux
appareils
numériques
de
Classe
A
prescrites
dans
la
norme
sur
le matériel
brouilleur:
“Appareils
Numériques,”
NMB-003
édictée
par
le
ministère des
Communications.

ComplianceStatements Important Notes
Lan Switch and Router Blade
12
!
Japan
VCCI
Class
A
CE
Mark
Declaration
of
Conformance
for
EMI
and
Safety
(EEC)
This
information
technology
equipment
complies
with
the
requirements
of
the Council
Directive
89/336/EEC
on
the
Approximation
of
the
laws
of
the
Member States
relating
to
Electromagnetic
Compatibility
and
73/23/EEC
for
electrical equipment
used
within
certain
voltage
limits
and
the
Amendment
Directive
93/68/EEC.
For
the
evaluation
of
the
compliance
with
these
Directives,
the following
standards
were
applied:
RFI
Emission:
•
Limit
class
A
according
to
EN
55022:1998
•
Limit
class
A
for
harmonic
current
emission
according
to
EN
61000-3-2/1995
•
Limitation
of
voltage
fluctuation
and
flicker
in
low-voltage
supply
system according
to
EN
61000-3-3/1995
Immunity:
•
Product
family
standard
according
to
EN
55024:1998
•
Electrostatic
Discharge
according
to
EN
61000-4-2:1995
(Contact
Discharge:
±4
kV,
Air
Discharge:
±8
kV)
•
Radio-frequency
electromagnetic
field
according
to
EN
61000-4-3:1996
(80
-
1000
MHz
with
1
kHz
AM
80%
Modulation:
3
V/m)
•
Electrical
fast
transient/burst
according
to
EN
61000-4-4:1995
(AC/DC
power supply:
±1
kV,
Data/Signal
lines:
±0.
5
kV)
•
Surge
immunity
test
according
to
EN
61000-4-5:1995
(AC/DC
Line
to
Line:
±1
kV,
AC/DC
Line
to
Earth:
±2
kV)
•
Immunity
to
conducted
disturbances,
Induced
by
radio-frequency
fields:
EN
61000-4-6:1996
(0.15
-
80
MHz
with
1
kHz
AM
80%
Modulation:
3
V/m)
•
Power
frequency
magnetic
field
immunity
test
according
to
EN
61000-4-
8:1993
(1
A/m
at
frequency
50
Hz)
•
Voltage
dips,
short
interruptions
and
voltage
variations
immunity
test according
to
EN
61000-4-11:1994
(>95%
Reduction
@10
ms,
30% Reduction
@500
ms,
>95%
Reduction
@5000
ms)
LVD:
•
EN
60950
(A1/1992;
A2/1993;
A3/1993;
A4/1995;
A11/1997)
Do
not
plug
a
phone
jack
connector
in
the
RJ-45
port.
This
may
damage
this
device.
Les
raccordeurs
ne
sont
pas
utilisé
pour
le
système
télépho- nique!

ComplianceStatements Important Notes
Lan Switch and Router Blade
13
Taiwan
BSMI
Class
A
Australia
AS/NZS
3548
(1995)
-
Class
A

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
14
2 Introduction
The
PRIMERGY
BX
Blade Server system is a modular server system that can integrates
up to 10 server modules, four Ethernet Switch Modules (one switch will be included in the base
enclosure, the other three are optional) and two Management Modules (MMB). The Ethernet
Module provides networking or Switch functions to PRIMERGY BX Blade Server. The
Management Modules provides a single point of control for the PRIMERGY BX Blade Server.
The PRIMERGY BX600 Ethernet Switch Modules are 18-port devices that are
connected to servers through the mid-plane connectors located on PRIMERGY BX Blade
Server middle plane. The device has 18 ports. The ports numeration starts from the internal
ports g1-g10 connected to server blades, and ports g11-g16 are the external ports connecting
the Ethernet Switch Module to the network through the internal ports. The g17 is the XFP
module interface and the g18 port is 10 G the module for CX4 interface.
• six external RJ-45 connectors for 10/100/1000 Base-T copper ports (uplinks).
• two external module CX4 or XFP connectors for 10 Gigabit ports (uplinks).
• 10 internal ports connected to servers through PRIMERGY BX Blade Server mid-plane
connector of a VHDM type.
The terminal connection to the device is provided through the MMB board only. No access
point is provided on the Ethernet Switch Module front panel. For debugging and management
purposes, a UART bus of each Ethernet Switch Module is connected to the MMB board. The
MMB board can select for management only one switch at a time.
The Ethernet Switch Module receives a power supply (12 V dc) through the mid-plane
connector. A four system LED indicates the Ethernet Switch Module status (Power
module,MMB-selected or not, CX4 and XFP interface or not).
The following figure illustrates the PRIMERGY BX600:
Figure 1-1. PRIMERGY BX600 GESwitch Blade Front Panel
2.1 Features of the Switch
The switch provides a wide range of advanced performance-enhancing features.
Multicast filtering provides support for real-time network applications. Port-based
and tagged VLANs, plus support for automatic GVRP VLAN registration provide
traffic security and efficient use of network bandwidth. QoS priority queueing
ensures the minimum delay for moving real-time multi-media data across the

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
15
network. Flow control eliminates the loss of packets due to bottlenecks caused by
port saturation. And broadcast storm suppression prevents broadcast traffic storms
from engulfing the network. Some of the management features are briefly described
below.
Head of Line Blocking
Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing
for the same egress port resources. HOL blocking queues packets, and the packets at the
head of the queue are forwarded before packets at the end of the queue.
Flow Control Support (IEEE 802.3X)
Flow control enables lower speed devices to communicate with higher speed devices, by
requesting that the higher speed device refrains from sending packets. Transmissions are
temporarily halted to prevent buffer overflows.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it
is unavailable for additional traffic.
Jumbo Frames Support
Jumbo frames are frames with an MTU size of up to 9K bytes, and better utilize the network by
transporting the same data using less frames. The main benefits of this facility are reduced
transmission overhead, and reduced host processing overhead. Less frames leads to less I/O
interrupts. This facility is typically used for server-to-server transfers.
MDI/MDIX Support
The Ethernet Switch Module automatically detects whether the cable connected to an RJ-45
port is crossed or straight through. Standard wiring for end stations is Media-Dependent
Interface (MDI) and the standard wiring for hubs and switches is known as Media-Dependent
Interface with Crossover (MDIX).
Auto Negotiation
Auto negotiation allows an Ethernet Switch Module to advertise modes of operation. The auto
negotiation function provides the means to exchange information between two devices that
share a point-to-point link segment, and to automatically configure both devices to take
maximum advantage of their transmission capabilities.
2.1.1 MAC Address Supported Features
MAC Address Capacity Support
The Ethernet Switch Module supports up to 8K MAC addresses. The Ethernet Switch Module
reserves specific MAC addresses for system use.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative to learning them
from incoming frames. These user-defined entries are not subject to aging, and are preserved
across resets and reboots.
Self-Learning MAC Addresses
The Ethernet Switch Module enables automatic MAC address learning from incoming packets.
The MAC addresses are stored in the Bridging Table.

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
16
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period are aged out. This prevents
the Bridging Table from overflowing.
Port Security
Port security prevents unauthorized users from accessing your network. It allows each port to
learn, or be assigned, a list of MAC addresses for devices authorized to access the network
through that port. Any packet received on the port must have a source address that appears in
the authorized list, otherwise it will be dropped. Port security is disabled on all ports by default,
but can be enabled on a per-port basis.
Address Filtering –
This switch provides a packet filter for all traffic entering the CPU port and hence potentially
forwarded or routed to the management network. The packet filter is rule/pattern based and
constitutes a set of patterns which when matched will DROP the packet, and a further set of
patterns which when matched will ACCEPT the packet.
MAC Multicast Support
Multicast service is a limited broadcast service, which allows one-to-many and many-to-many
connections for information distribution. Layer 2 Multicast service is where a single frame is
addressed to a specific Multicast address, from where copies of the frame are transmitted to
the relevant ports.
2.1.2 Layer 2 Features
IGMP Snooping
IGMP Snooping examines IGMP frame contents, when they are forwarded by the Ethernet
Switch Module from work stations to an upstream Multicast router. From the frame, the
Ethernet Switch Module identifies work stations configured for Multicast sessions, and which
Multicast routers are sending Multicast frames.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and
outgoing packets from a monitored port to a monitoring port. Users specify which target port
receives copies of all traffic passing through a specified source port.
Broadcast Storm Control
Storm Control enables limiting the amount of Multicast and Broadcast frames accepted and
forwarded by the Ethernet Switch Module. When Layer 2 frames are forwarded, Broadcast and
Multicast frames are flooded to all ports on the relevant VLAN. This occupies bandwidth, and
loads all nodes connected on all ports.
VLAN Supported Features
The switch supports up to 228 VLANs. A Virtual LAN is a collection of network nodes that share
the same collision domain regardless of their physical location or connection point in the
network. The switch supports tagged VLANs based on the IEEE 802.1Q standard. Members of
VLAN groups can be dynamically learned via GVRP, or ports can be manually assigned to a
specific set of VLANs. This allows the switch to restrict traffic to the VLAN groups to which a
user has been assigned. By segmenting your network into VLANs, you can:

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
17
1) Eliminate broadcast storms which severely degrade performance in a flat network.
2) Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
3) Provide data security by restricting all traffic to the originating VLAN, except
where a connection has been configured between separate VLANs using a router
or Layer 3 switch.
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are
classified as belonging to a VLAN based on either the VLAN tag or based on a combination of
the ingress port and packet contents. Packets sharing common attributes can be grouped in
the same VLAN.
Port Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs based on their ingress port.
For more information, see "Defining VLAN Ports Settings".
IEEE802.1V Protocol Based Virtual LANs (VLANs)
VLAN classification rules are defined on data-link layer (Layer 2) protocol identification.
Protocol based VLANs isolate Layer 2 traffic for differing Layer 3 protocols.
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual bridged LANs, the services provided in VLANs
and the protocols and algorithms involved in the provision of these services. An important
requirement included in this standard is the ability to mark frames with a desired Class of
Service (CoS) tag value (0-7).
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Q-compliant VLAN pruning
and dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the Ethernet
Switch Module registers and propagates VLAN membership on all ports that are part of the
active underlying "Spanning Tree Protocol Features" topology.
GMRP Protocol
GARP Multicast Registration Protocol (GMRP) is a Generic Attribute Registration Protocol
(GARP) application that provides a constrained multicast flooding facility similar to IGMP
snooping. GMRP and GARP are industry-standard protocols defined by the IEEE
802.1p.GMRP provides a mechanism that allows bridges and end stations to dynamically
register group membership information with the MAC bridges attached to the same LAN
segment and for that information to be disseminated across all bridges in the Bridged LAN that
supports extended filtering services. The operation of GMRP relies upon the services provided
by the GARP. GMRP software components run on both the switch and on the host. On the host,
GMRP is typically used with IGMP: the host GMRP software spawns Layer 2 GMRP versions
of the host's Layer 3 IGMP control packets. The switch receives both the Layer 2 GMRP and
the Layer 3 IGMP traffic from the host. The switch uses the received GMRP traffic to constrain

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
18
2.1.3 Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol adds a level of fault
tolerance by allowing two or more redundant connections to be created between a
pair of LAN segments. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure that only one
route exists between any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any reason, an alternate
path will be activated to maintain the connection.
IEEE 802.1w Rapid Spanning Tree
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to about 10% of that required by the
older IEEE 802.1D STP standard. It is intended as a complete replacement for STP,
but can still interoperate with switches running the older standard by automatically
reconfiguring ports to STP-compliant mode if they detect STP protocol messages
from attached devices.
IEEE 802.1s Multiple Spanning Tree
IEEE 802.1s Multiple Spanning Tree - The IEEE 802.1s is the supplement to IEEE Std 802.1Q
adds the facility for VLAN bridges to use multiple spanning trees, providing for traffic belonging
to different VLANs to flow over potentially different paths within the virtual bridged LAN.802.1s
supports spanning tree by per VLAN.
Fast Link
STP can take up to 30-60 seconds to converge. During this time, STP detects possible loops,
allowing time for status changes to propagate and for relevant Ethernet Switch Modules to
respond. 30-60 seconds is considered too long of a response time for many applications. The
Fast Link option bypasses this delay, and can be used in network topologies where forwarding
loops do not occur.
Link Aggregation
One Aggregated Links may be defined, with up to 2 member ports, to form a single Link
Aggregated Group (LAG). This enables:
• Fault tolerance protection from physical link disruption
• Higher bandwidth connections
• Improved bandwidth granularity
• High bandwidth server connectivity
LAG is composed of ports with the same speed, set to full-duplex operation.
Link Aggregation and LACP
LACP uses peer exchanges across links to determine, on an ongoing basis, the aggregation
capability of various links, and continuously provides the maximum level of aggregation
capability achievable between a given pair of systems. LACP automatically determines,
configures, binds and monitors the port binding to aggregators within the system.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network server upon system
startup. DHCP service is an on-going process. DHCP is an extension to BootP. For more
information on DHCP, see "Defining DHCP IP Interface Parameters".

FeaturesoftheSwitch Introduction
Lan Switch and Router Blade
19
2.1.4 Ethernet Switch Module Management Features
The PRIMERGY BX600 can either be managed through the console port (out-of-band
management) or through the network (in-band management) with SNMP, TELNET or HTTP
protocols.
Various Files of Management Operation:
zThere are three types of files for the PRIMERGY BX600:
Configuration Files: The file stores system configuration information
Operation Code: Executed after system boot-up, also known as Run Time Image
BootRom Image: The images brought up by loader when power up. Also known as
POST (Power On Self-Test)
zDue to the size of flash memory, the PRIMERGY BX600 supports only two copies for
Configuration files and Operation Code respectively, but only one copy for BootRom
Image.
Duplication of Management file
The PRIMERGY BX600 can copy those three types of files in three different ways.
1. Local file to local file copy: The PRIMERGY BX600 can copy an existed local
Configuration File to another local file. Copy exited local Operation Code to another
local file is not permitted.
2. Remote TFTP Server to Local file copy: The PRIMERGY BX600 can support to
download Configuration File or Operation Code from remote server to local file.
3. Local file to remote server: The PRIMERGY BX600 can support to upload an existed
local Configuration File to the remote server.
4. Running Config to local file copy
5. Running Config to remote TFTP server
6. Local file to Running Config copy
7. Remote TFTP server to Running Config copy
Select Start-up Files
Users can select one of two copies for Configuration Files and Operation Codes as start-up file
which is used as default bootup configuration and execution image, And the other copy of
Configuration File and Operation Code will be used for backup.
Save Configuration as file
Users can save the running configuration as a file for future use. This newly saved
configuration file can be selected as start-up file later on. Or users can upload this saved
configuration to the remote server for backup.
Provision
The PRIMERGY BX600 allows users to select the Configuration files to configure the system.
There are two timings to configure system: Start-up and Run time.
Start-up: Select the Configuration File for start-up purpose.
Run time: Users can choose a new configuration file to reconfigure the system while system

Start up and Configuration the Ethernet Switch Module Configuration the Switch Blade Module
Lan Switch and Router Blade
20
running, without rebooting the system. This function is available for CLI only.
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. Events are sent as SNMP traps
to a Trap Recipient List.
SNMP Version 1,Version 2, and Version 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol. To control access to
the system, a list of community entries is defined, each of which consists of a community string
and its access privileges. There are 2 levels of SNMP security read-only and read-write.
Web Based Management
With web based management, the system can be managed from any web browser. The
system contains an Embedded Web Server (EWS), which serves HTML pages, through which
the system can be monitored and configured. The system internally converts web-based input
into configuration commands, MIB variable settings and other management-related settings.
Configuration File Download and Upload
The Ethernet Switch Module configuration is stored in a configuration file. The Configuration
file includes both system wide and port specific Ethernet Switch Module configuration. The
system can display configuration files in the form of a collection of CLI commands, which are
stored and manipulated as text files.
TFTP Trivial File Transfer Protocol
The Ethernet Switch Module supports boot image, software and configuration
upload/download via TFTP.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP, which provides comprehensive network
traffic monitoring capabilities (as opposed to SNMP which allows network Ethernet Switch
Module management and monitoring). RMON is a standard MIB that defines current and
historical MAC-layer statistics and control objects, allowing real-time information to be captured
across the entire network.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as possible to common
industry practice. CLI is composed of mandatory and optional elements. The CLI interpreter
provides command and keyword completion to assist user and shorten typing.
Syslog
Syslog is a protocol that allows event notifications to be sent to a set of remote servers, where
they can be stored, examined and acted upon. Multiple mechanisms are implemented to send
notification of significant events in real time, and keep a record of these events for after-the-fact
usage.
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch Module
clock time synchronization up to the millisecond. Time synchronization is performed by a
network SNTP server. Time sources are established by Stratums. Stratums define the distance
from the reference clock. The higher the stratum (where zero is the highest), the more accurate
the clock.
This manual suits for next models
1
Table of contents