OneStart

Lenovo RackSwitch G8264 manuals

RackSwitch G8264 first page preview

RackSwitch G8264

Brand: Lenovo | Category: Switch
Table of contents
  1. installation guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Safety Information
  6. Safety Statements
  7. Other Important Safety Notices
  8. Chapter 1. The RackSwitch G7028
  9. Notices and Statements in this Document
  10. Related Documentation
  11. Chapter 2. Switch Components
  12. Management Panel
  13. RJ-45 Management Port
  14. System Status LEDs
  15. SFP+ Ports
  16. RJ-45 Ports
  17. Rear Panel
  18. Chapter 3. Installing G7028 Hardware and Options
  19. Before Installing the G7028
  20. Required Tools
  21. Preventing Electric Shock
  22. Handling Static-Sensitive Devices
  23. Installing the G7028 in a Rack
  24. Installing the G7028 in a Lenovo System x or Power Rack
  25. Installing the G7028 in a Lenovo iDataPlex Rack
  26. Installing the Air-Duct Option
  27. Installing Port Transceivers
  28. Installing an SFP+ Optical Transceiver
  29. Chapter 4. Removing and Replacing G7028 Components
  30. Removing the G7028 from a Standard Equipment Rack
  31. Removing the G7028 from a Lenovo System x or Power Rack
  32. Removing the G7028 from a Lenovo iDataPlex Rack
  33. Removing the Air-Duct Option
  34. Replacing the G7028
  35. Chapter 5. Initializing the G7028
  36. Using the Management Port
  37. Configuring an IP Interface for Remote Access
  38. Updating Firmware
  39. Chapter 6. Troubleshooting
  40. Appendix A. Getting Help and Technical Assistance
  41. Appendix B. Notices
  42. Trademarks
  43. Recycling information
  44. Particulate Contamination
  45. Telecommunication Regulatory Statement
  46. Germany Class A Statement
  47. VCCI Class A Statement
  48. Russia Electromagnetic Interference (EMI) Class A Statement
  49. Appendix C. Technical Specifications
  50. Power Specifications
RackSwitch G8264 first page preview

RackSwitch G8264

Brand: Lenovo | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Preface
  13. Who Should Use This Guide
  14. What You'll Find in This Guide
  15. Additional References
  16. Typographic Conventions
  17. Part 1: Getting Started
  18. Chapter 1. Switch Administration
  19. Administration Interfaces
  20. Establishing a Connection
  21. Using the Switch Data Ports
  22. Using Telnet
  23. Using SSH with Password Authentication
  24. Using SSH with Public Key Authentication
  25. Using a Web Browser
  26. Browser‐Based Interface Summary
  27. Using Simple Network Management Protocol
  28. BOOTP/DHCP Client IP Address Services
  29. DHCP SYSLOG Server
  30. Domain‐Specific BOOTP Relay Agent Configuration
  31. Easy Connect Wizard
  32. Basic System Mode Configuration Example
  33. Redundant Mode Configuration Example
  34. Switch Login Levels
  35. Administrator Password Recovery
  36. Setup vs. the Command Line
  37. Idle Disconnect
  38. Boot Strict Mode
  39. Acceptable Cipher Suites
  40. Configuring Strict Mode
  41. Scripting
  42. Chapter 2. Initial Setup
  43. Information Needed for Setup
  44. Default Setup Options
  45. Setting the Management Interface Default IP Address
  46. Stopping and Restarting Setup Manually
  47. Setup Part 1: Basic System Configuration
  48. Setup Part 2: Port Configuration
  49. Setup Part 3: VLANs
  50. Setup Part 4: IP Configuration
  51. Loopback Interfaces
  52. Loopback Interface Limitations
  53. Setup Part 5: Final Steps
  54. Optional Setup for Telnet Support
  55. Chapter 3. Switch Software Management
  56. Loading New Software to Your Switch
  57. Loading Software via BBI
  58. Updating Software on vLAG Switches
  59. USB Copy
  60. The Boot Management Menu
  61. Recovering from a Failed Boot Image
  62. Part 2: Securing the Switch
  63. Chapter 4. Securing Administration
  64. Secure Shell and Secure Copy
  65. To Enable or Disable SCP Apply and Save
  66. To Load a Switch Configuration File from the SCP Host
  67. To Load Switch Configuration Files from the SCP Host
  68. end user access control
  69. user access control
  70. listing current users
  71. Chapter 5. Authentication & Authorization Protocols
  72. radius authentication and authorization
  73. switch user accounts
  74. command authorization and logging
  75. ldap authentication and authorization
  76. Chapter 6. 802.1X Port-Based Network Access Control
  77. Extensible Authentication Protocol over LAN
  78. EAPoL Authentication Process
  79. EAPoL Message Exchange
  80. EAPoL Port States
  81. Supported RADIUS Attributes
  82. EAPoL Configuration Guidelines
  83. Chapter 7. Access Control Lists
  84. Summary of Packet Classifiers
  85. Summary of ACL Actions
  86. Assigning Individual ACLs to a Port
  87. Metering
  88. ACL Port Mirroring
  89. ACL Logging
  90. Rate Limiting Behavior
  91. ACL Configuration Examples
  92. ACL Example 3
  93. ACL Example 6
  94. VLAN Maps
  95. Management ACLs
  96. Using Storm Control Filters
  97. Chapter 8. Secure Input/Output Module
  98. SIOM Overview
  99. Setting an SIOM Security Policy
  100. Secure Protocols
  101. Insecure Protocols Unaffected by SIOM
  102. Implementing Secure LDAP (LDAPS)
  103. Disabling LDAPS
  104. Syslogs and LDAPS
  105. Using Cryptographic Mode
  106. Part 3: Switch Basics
  107. Chapter 9. VLANs
  108. vlans overview
  109. vlan topologies and design considerations
  110. vlan configuration example
  111. pvlan priority levels
  112. configuring pvlan
  113. Chapter 10. Ports and Link Aggregation
  114. static lags
  115. link aggregation control protocol
  116. configuring lacp
  117. Chapter 11. Spanning Tree Protocols
  118. PVRST Mode
  119. Port States
  120. Simple STP Configuration
  121. Per‐VLAN Spanning Tree Groups
  122. VLANs and STG Assignment
  123. Manually Assigning STGs
  124. Adding and Removing Ports from STGs
  125. The Switch‐Centric Model
  126. Configuring Multiple STGs
  127. Rapid Spanning Tree Protocol
  128. RSTP Configuration Example
  129. Multiple Spanning Tree Protocol
  130. MSTP Configuration Guidelines
  131. MSTP Example 2
  132. Port Type and Link Type
  133. Chapter 12. Virtual Link Aggregation Groups
  134. VLAG Capacities
  135. Configuring VLAGs
  136. Basic VLAG Configuration
  137. Configuring the VLAG
  138. VLAG Configuration ‐ VLANs Mapped to MSTI
  139. Configuring Health Check
  140. VLAGs with VRRP
  141. Task 2: Configure VLAG Peer 2
  142. Two‐tier vLAGs with VRRP
  143. vLAG Peer Gateway
  144. Task 1: Configure Layer 2/3 border switches
  145. VLAG with PIM
  146. Health Check
  147. Chapter 13. Quality of Service
  148. qos overview
  149. using acl filters
  150. using dscp values to provide qos
  151. per hop behavior
  152. qos levels
  153. queuing and scheduling
  154. Chapter 14. Precision Time Protocol
  155. Part 4: Advanced Switching Features
  156. Chapter 15. OpenFlow
  157. port membership
  158. OpenFlow Ports
  159. Link Aggregation
  160. Data Path ID
  161. sFlow Compatibility
  162. OpenFlow Groups
  163. Configuring OpenFlow
  164. Configuration Example 2 ‐ Default Boot Profile
  165. Feature Limitations
  166. Chapter 16. Deployment Profiles
  167. Available Profiles
  168. Selecting Profiles
  169. Automatic Configuration Changes
  170. Chapter 17. Virtualization
  171. Chapter 18. Stacking
  172. Stacking Overview
  173. Stacking Limitations
  174. Stack Membership
  175. Merging Independent Stacks
  176. Backup Switch Selection
  177. No Backup
  178. Configuring a Stack
  179. Stacking VLANs
  180. Configuring a Management IP Interface
  181. Additional Master Configuration
  182. Binding Members to the Stack
  183. Managing the Stack
  184. Accessing the Member Switch CLI
  185. Upgrading Software in an Existing Stack
  186. removing a switch from the stack
  187. Chapter 19. Virtual NICs
  188. Chapter 20. VMready
  189. Pre‐Provisioning VEs
  190. VM Policy Bandwidth Control
  191. Bandwidth Policies vs. Bandwidth Shaping
  192. VMready Information Displays
  193. vCenter Hypervisor Hosts
  194. vCenter VEs
  195. vCenter VE Details
  196. VMready Configuration Example
  197. Chapter 21. FCoE and CEE
  198. Fibre Channel over Ethernet
  199. FCoE Requirements
  200. Converged Enhanced Ethernet
  201. Effects on 802.1p Quality of Service
  202. Effects on Flow Control
  203. FCoE Initialization Protocol Snooping
  204. Port FCF and ENode Detection
  205. FCoE ACL Rules
  206. FCoE VLANs
  207. Operational Commands
  208. Priority‐Based Flow Control
  209. Global vs. Port‐by‐Port Configuration
  210. PFC Configuration Example
  211. Enhanced Transmission Selection
  212. Priority Groups
  213. Assigning Priority Values to a Priority Group
  214. Configuring ETS
  215. Data Center Bridging Capability Exchange
  216. Enabling and Disabling DCBX
  217. Configuring DCBX
  218. Chapter 22. Edge Virtual Bridging
  219. deleting a vlan
  220. unsupported features
  221. Chapter 23. Static Multicast ARP
  222. Chapter 24. Dynamic ARP Inspection
  223. interface trust states and network security
  224. dai configuration example
  225. Chapter 25. Unified Fabric Port
  226. tunnel mode
  227. access mode
  228. layer 2 failover
  229. Part 5: IP Routing
  230. Chapter 26. Basic IP Routing
  231. IP Routing Benefits
  232. Example of Subnet Routing
  233. Using VLANs to Segregate Broadcast Domains
  234. ARP ‐ Local Proxy
  235. ECMP Static Routes
  236. Configuring ECMP Static Routes
  237. Dynamic Host Configuration Protocol
  238. DHCP Relay Agent
  239. Chapter 27. Policy-Based Routing
  240. PBR Policies and ACLs
  241. Configuring Route Maps
  242. Example PBR Configuration
  243. Configuring PBR with other Features
  244. Dynamic PBR (Multi‐Tenant)
  245. Chapter 28. Routed Ports
  246. Overview
  247. Configuring a Routed Port
  248. OSPF Configuration Example
  249. Configuring PIM on Routed Ports
  250. Configuring BGP on Routed Ports
  251. Limitations
  252. Chapter 29. Internet Protocol Version 6
  253. IPv6 Limitations
  254. IPv6 Address Format
  255. IPv6 Address Types
  256. ipv6 address autoconfiguration
  257. neighbor discovery
  258. supported applications
  259. ipv6 configuration examples
  260. Chapter 30. IPsec with IPv6
  261. ipsec protocols
  262. Chapter 31. Routing Information Protocol
  263. distance vector protocol
  264. ripv2 in ripv1 compatibility mode
  265. rip features
  266. rip configuration example
  267. Chapter 32. Internet Group Management Protocol
  268. igmp terms
  269. how igmp works
  270. igmp snooping
  271. igmp groups
  272. igmp snooping configuration example
  273. troubleshooting igmp snooping
  274. IGMP Relay
  275. Configure IGMP Relay
  276. Advanced Configuration Example: IGMP Relay
  277. Configuration
  278. Troubleshooting IGMP Relay
  279. Additional IGMP Features
  280. Configuring the Action
  281. Chapter 33. Multicast Listener Discovery
  282. MLD Terms
  283. How MLD Works
  284. How Flooding Impacts MLD
  285. Dynamic Mrouters
  286. MLD Capacity and Default Values
  287. Configuring MLD
  288. Chapter 34. Border Gateway Protocol
  289. Internal Routing Versus External Routing
  290. Route Reflector
  291. Configuring Route Reflection
  292. Restrictions
  293. Forming BGP Peer Routers
  294. Dynamic Peers
  295. Next Hop Peer IP Address
  296. Precedence
  297. Aggregating Routes
  298. BGP Communities
  299. BGP Attributes
  300. Next Hop Attribute
  301. selecting route paths in bgp
  302. bgp failover configuration
  303. default redistribution and route aggregation example
  304. Chapter 35. Open Shortest Path First
  305. types of ospf areas
  306. types of ospf routing devices
  307. neighbors and adjacencies
  308. the shortest path first tree
  309. configurable parameters
  310. defining areas
  311. using the area id to assign the ospf area number
  312. interface cost
  313. default routes
  314. virtual links
  315. host routes for load balancing
  316. ospf features not supported in this release
  317. other virtual link options
  318. verifying ospf configuration
  319. ospfv3 configuration example
  320. Chapter 36. Protocol Independent Multicast
  321. PIM Overview
  322. Supported PIM Modes and Features
  323. Basic PIM Settings
  324. PIM Neighbor Filters
  325. Additional Sparse Mode Settings
  326. Specifying a Bootstrap Router
  327. Using PIM with Other Features
  328. PIM Configuration Examples
  329. Example 2: PIM‐SM with Static RP
  330. Part 6: High Availability Fundamentals
  331. Chapter 37. Basic Redundancy
  332. Aggregating for Link Redundancy
  333. Hot Links
  334. Configuring Hot Links
  335. Stacking for High Availability Topologies
  336. Chapter 38. Layer 2 Failover
  337. Monitoring LAG Links
  338. Manually Monitoring Port Links
  339. L2 Failover with Other Features
  340. Configuration Guidelines
  341. Chapter 39. Virtual Router Redundancy Protocol
  342. vrrp overview
  343. master and backup virtual router
  344. selecting the master vrrp router
  345. failover methods
  346. virtual router deployment considerations
  347. high availability configurations
  348. Part 7: Network Management
  349. Chapter 40. Link Layer Discovery Protocol
  350. lldp overview
  351. enabling or disabling lldp
  352. Chapter 41. Simple Network Management Protocol
  353. snmp version 3
  354. Configuring SNMP Trap Hosts
  355. SNMPv2 Trap Host Configuration
  356. SNMPv3 Trap Host Configuration
  357. SNMP MIBs
  358. Switch Images and Configuration Files
  359. Loading a New Switch Image
  360. Saving the Switch Configuration
  361. Chapter 42. Service Location Protocol
  362. Active DA Discovery
  363. SLP Configuration
  364. Chapter 43. NETCONF
  365. NETCONF Overview
  366. XML Requirements
  367. Installing the NETCONF Client
  368. Using Juniper Perl Client
  369. Establishing a NETCONF Session
  370. NETCONF Operations
  371. Protocol Operations Examples
  372. edit‐config
  373. copy‐config
  374. delete‐config
  375. unlock
  376. close‐session
  377. get‐configuration
  378. get‐interface‐information
  379. Part 8: Monitoring
  380. Chapter 44. Remote Monitoring
  381. RMON Overview
  382. RMON Group 1—Statistics
  383. RMON Group 2—History
  384. RMON Group 3—Alarms
  385. RMON Group 9—Events
  386. Chapter 45. sFlow
  387. Chapter 46. Port Mirroring
  388. configuring port mirroring
  389. Part 9: Appendices
  390. Appendix A. Getting help and technical assistance
  391. Appendix B. Notices
  392. important notes
  393. recycling information
  394. particulate contamination
  395. telecommunication regulatory statement
  396. electronic emission notices
  397. japan vcci class a statement
  398. taiwan class a compliance statement
RackSwitch G8264 first page preview

RackSwitch G8264

Brand: Lenovo | Category: Switch
RackSwitch G8264 first page preview

RackSwitch G8264

Brand: Lenovo | Category: Switch
RackSwitch G8264 first page preview

RackSwitch G8264

Brand: Lenovo | Category: Switcher
Related products
RackSwitch G8264CSRackSwitch G8296RackSwitch G8272RackSwitch G8332RackSwitch G8052RackSwitch G8124ERackSwitch G7028RackSwitch G7052ThinkSystem NE2580O RackSwitchThinkSystem NE10032O RackSwitch
Lenovo categories
More Lenovo categories