Lenovo RackSwitch G8264CS manuals
RackSwitch G8264CS
Table of contents
RackSwitch G8264CS
Table of contents
RackSwitch G8264CS
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Preface
- Who Should Use This Book
- How This Book Is Organized
- Typographic Conventions
- Chapter 1. ISCLI Basics
- ISCLI Command Modes
- Global Commands
- Command Line Interface Shortcuts
- User Access Levels
- Idle Timeout
- Chapter 2. Information Commands
- System Information
- CLI Display Information
- Error Disable and Recovery Information
- SNMPv3 System Information
- SNMPv3 USM User Table Information
- SNMPv3 View Table Information
- SNMPv3 Access Table Information
- SNMPv3 Group Table Information
- SNMPv3 Target Address Table Information
- SNMPv3 Target Parameters Table Information
- SNMPv3 Dump Information
- General System Information
- Show Specific System Information
- Show Recent Syslog Messages
- User Status
- LDAP Information
- Layer 2 Information
- X Information
- FDB Information
- FDB Multicast Information
- Show All FDB Information
- Link Aggregation Control Protocol Information
- Link Aggregation Control Protocol
- Layer 2 Failover Information
- Hot Links Information
- LLDP Information
- LLDP Remote Device Information
- Unidirectional Link Detection Information
- x Discovery Information
- OAM Discovery Information
- vLAG Information
- vLAG Aggregation Information
- Spanning Tree Information
- RSTP Information
- PVRST Information
- Spanning Tree Bridge Information
- Spanning Tree Root Information
- Multiple Spanning Tree Information
- Link Aggregation Group (LAG) Information
- VLAN Information
- Layer 3 Information
- IP Routing Information
- Show All IP Route Information
- ARP Information
- ARP Address List Information
- Show All ARP Entry Information
- Dynamic ARP Inspection Information
- BGP Information
- BGP Peer Information
- BGP Group Information
- BGP Summary Information
- OSPF Information
- OSPF General Information
- OSPF Loopback Information
- OSPF Database Information
- OSPFv3 Information
- OSPFv3 Information Dump
- OSPFv3 Database Information
- OSPFv3 Route Codes Information
- Routing Information Protocol
- RIP Routes Information
- IPv6 Routing Information
- IPv6 Routing Table Information
- IPv6 Neighbor Cache Information
- IPv6 Neighbor Discovery Prefix Information
- ECMP Static Route Information
- igmp group information
- vrrp information
- interface information
- quality of service information
- access control list information
- rmon history information
- rmon alarm information
- rmon event information
- link status information
- port information
- Virtual NIC (vNIC) Information Commands
- vNIC Information
- vNIC Group Information
- EVB Information
- EVB VSIType Information
- EVB VMs Information
- Converged Enhanced Ethernet Information
- DCBX Information
- DCBX Control Information
- DCBX Feature Information
- DCBX ETS Information
- DCBX PFC Information
- DCBX Application Protocol Information
- ETS Information
- PFC Information
- FCoE Initialization Protocol Snooping Information
- FIP Snooping FCoE Forwarder Information
- Fibre Channel Information
- Fabric Login Database Information
- Fabric Configuration Status Database Information
- NPV Traffic Information
- FC Port Information
- Information Dump
- Chapter 3. Statistics Commands
- Port Statistics
- X Authenticator Statistics
- X Authenticator Diagnostics
- BootStrap Protocol Relay Statistics
- Bridging Statistics
- Ethernet Statistics
- Interface Statistics
- Interface Protocol Statistics
- RMON Statistics
- QoS Queue Counter‐Based Statistics
- QoS Queue Rate‐Based Statistics
- Multicast QoS Queue Counter‐Based Statistics
- Multicast QoS Queue Rate‐Based Statistics
- Link Aggregation Group (LAG) Statistics
- Layer 2 Statistics
- FDB Statistics
- LACP Statistics
- Hotlinks Statistics
- LLDP Port Statistics
- Spanning Tree Statistics
- layer 3 statistics
- ipv6 statistics
- arp statistics
- dns statistics
- icmp statistics
- igmp statistics
- ospf statistics
- ospf global statistics
- vrrp statistics
- routing information protocol statistics
- dhcp snooping statistics
- management processor statistics
- mp packet statistics
- cpu statistics
- qos statistics
- acl statistics
- snmp statistics
- ntp statistics
- statistics dump
- Chapter 4. Configuration Commands
- viewing and saving changes
- system configuration
- System Host Log Configuration
- SSH Server Configuration
- RADIUS Server Configuration
- TACACS+ Server Configuration
- LDAP Server Configuration
- NTP Server Configuration
- System SNMP Configuration
- SNMPv3 Configuration
- User Security Model Configuration
- SNMPv3 View Configuration
- View‐based Access Control Model Configuration
- SNMPv3 Group Configuration
- SNMPv3 Community Table Configuration
- SNMPv3 Target Address Table Configuration
- SNMPv3 Target Parameters Table Configuration
- SNMPv3 Notify Table Configuration
- System Access Configuration
- Management Network Configuration
- User Access Control Configuration
- System User ID Configuration
- Strong Password Configuration
- HTTPS Access Configuration
- Custom Daylight Saving Time Configuration
- sFlow Configuration
- sFlow Port Configuration
- Server Port Configuration
- Port Configuration
- Port Error Disable and Recovery Configuration
- Port Link Configuration
- Temporarily Disabling a Port
- UniDirectional Link Detection Configuration
- Port OAM Configuration
- Port ACL Configuration
- Port WRED Configuration
- Port WRED Transmit Queue Configuration
- Quality of Service Configuration
- DSCP Configuration
- Control Plane Protection
- Weighted Random Early Detection Configuration
- WRED Transmit Queue Configuration
- Access Control Configuration
- Access Control List Configuration
- ACL Mirroring Configuration
- IPv4 Filtering Configuration
- TCP/UDP Filtering Configuration
- Packet Format Filtering Configuration
- ACL Metering Configuration
- acl group configuration
- port mirroring
- layer 2 configuration
- x global configuration
- x guest vlan configuration
- x port configuration
- spanning tree configuration
- mstp configuration
- forwarding database configuration
- static fdb configuration
- lldp configuration
- lldp port configuration
- link aggregation control protocol configuration
- lacp port configuration
- layer 2 failover configuration
- hot links configuration
- vlan configuration
- private vlan configuration
- layer 3 configuration
- IP Interface Configuration
- IPv6 Neighbor Discovery Configuration
- Default Gateway Configuration
- IPv4 Static Route Configuration
- IP Multicast Route Configuration
- ARP Configuration
- Dynamic ARP Inspection Configuration
- IP Forwarding Configuration
- Network Filter Configuration
- Routing Map Configuration
- IP Access List Configuration
- Autonomous System Filter Path Configuration
- Routing Information Protocol Configuration
- RIP Interface Configuration
- RIP Route Redistribution Configuration
- Open Shortest Path First Configuration
- Area Index Configuration
- OSPF Summary Range Configuration
- OSPF Interface Configuration
- OSPF Virtual Link Configuration
- OSPF Host Entry Configuration
- OSPF Route Redistribution Configuration
- Open Shortest Path First Version 3 Configuration
- OSPFv3 Area Index Configuration
- OSPFv3 Summary Range Configuration
- OSPFv3 AS‐External Range Configuration
- OSPFv3 Interface Configuration
- OSPFv3 over IPSec Configuration
- OSPFv3 Virtual Link Configuration
- OSPFv3 over IPSec for Virtual Link Configuration
- OSPFv3 Host Entry Configuration
- OSPFv3 Redistribute Entry Configuration
- OSPFv3 Redistribute Configuration
- Border Gateway Protocol Configuration
- BGP Peer Configuration
- BGP Aggregation Configuration
- BGP Neighbor Redistribution Configuration
- BGP Peering Group Configuration
- BGP Neighbor Group Redistribution Configuration
- mld global configuration
- IGMP Configuration
- IGMP Snooping Configuration
- IGMPv3 Configuration
- IGMP Relay Configuration
- IGMP Relay Multicast Router Configuration
- IGMP Static Multicast Router Configuration
- IGMP Filtering Configuration
- IGMP Advanced Configuration
- IGMP Querier Configuration
- IKEv2 Configuration
- ipsec configuration
- domain name system configuration
- bootstrap protocol relay configuration
- vrrp configuration
- virtual router configuration
- virtual router priority tracking configuration
- virtual router group configuration
- vrrp interface configuration
- vrrp tracking configuration
- pim interface configuration
- ipv6 static route configuration
- dhcp snooping
- remote monitoring configuration
- rmon event configuration
- rmon alarm configuration
- VM Policy Bandwidth Management
- VM Group Configuration
- VM Check Configuration
- VM Profile Configuration
- VMWare Configuration
- Miscellaneous VMReady Configuration
- Virtual NIC Configuration
- Virtual NIC Group Configuration
- Edge Virtual Bridge Configuration
- Edge Virtual Bridge VSI Type Database Configuration
- Edge Virtual Bridge VSI Type Profile Configuration
- Service Location Protocol Configuration
- Configuration Dump
- Saving the Active Switch Configuration
- Restoring the Active Switch Configuration
- USB Copy
- Chapter 5. Operations Commands
- Operations‐Level Port Commands
- Operations‐Level VRRP Commands
- VMware Operations
- VMware Distributed Virtual Switch Operations
- VMware Distributed Port Group Operations
- Edge Virtual Bridge Operations
- Chapter 6. Boot Options
- Scheduled Reboot of the Switch
- Netboot Configuration
- Security Policy Configuration
- Configuring the Number of Spanning Tree Groups
- Machine Type Model Configuration
- QSFP Port Configuration
- USB Boot Configuration
- Updating the Switch Software Image
- Loading New Software to Your Switch
- Selecting a Software Image to Run
- Selecting a Configuration Block
- Setting an Entitlement Serial Number
- Rebooting the Switch
- Using the Boot Management Menu
- Boot Recovery Mode
- Recover from a Failed Image Upgrade using TFTP
- Recovering from a Failed Image Upgrade using XModem Download
- Physical Presence
- Chapter 7. Maintenance Commands
- forwarding database maintenance
- debugging commands
- arp cache maintenance
- ip route manipulation
- igmp snooping maintenance
- igmp multicast routers maintenance
- clearing dump information
- unscheduled system dumps
- Appendix A. Lenovo N/OS System Log Messages
- Appendix B. Getting help and technical assistance
- Appendix C. Notices
- important notes
- recycling information
- particulate contamination
- telecommunication regulatory statement
- electronic emission notices
- germany class a statement
- japan vcci class a statement
- taiwan class a compliance statement
RackSwitch G8264CS
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Preface
- Who Should Use This Guide
- What You'll Find in This Guide
- Additional References
- Typographic Conventions
- Part 1: Getting Started
- Chapter 1. Switch Administration
- Administration Interfaces
- Establishing a Connection
- Using the Switch Data Ports
- Using Telnet
- Using SSH with Password Authentication
- Using SSH with Public Key Authentication
- Using a Web Browser
- Browser‐Based Interface Summary
- Using Simple Network Management Protocol
- BOOTP/DHCP Client IP Address Services
- DHCP SYSLOG Server
- Domain‐Specific BOOTP Relay Agent Configuration
- Easy Connect Wizard
- Basic System Mode Configuration Example
- Redundant Mode Configuration Example
- Switch Login Levels
- Setup vs. the Command Line
- Idle Disconnect
- Boot Strict Mode
- Acceptable Cipher Suites
- Configuring Strict Mode
- Chapter 2. Initial Setup
- Information Needed for Setup
- Default Setup Options
- Stopping and Restarting Setup Manually
- Setup Part 1: Basic System Configuration
- Setup Part 2: Port Configuration
- Setup Part 3: VLANs
- Setup Part 4: IP Configuration
- Loopback Interfaces
- Loopback Interface Limitations
- Setup Part 5: Final Steps
- Optional Setup for Telnet Support
- Chapter 3. Switch Software Management
- Loading New Software to Your Switch
- Loading Software via BBI
- USB Options
- USB Copy
- The Boot Management Menu
- Recovering from a Failed Boot Image
- Part 2: Securing the Switch
- Chapter 4. Securing Administration
- Secure Shell and Secure Copy
- To Enable or Disable SCP Apply and Save
- To Load a Switch Configuration File from the SCP Host
- To Load Switch Configuration Files from the SCP Host
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- User Access Control
- Re‐Enabling Locked Accounts
- Chapter 5. Authentication & Authorization Protocols
- RADIUS Authentication and Authorization
- switch user accounts
- command authorization and logging
- ldap authentication and authorization
- Chapter 6. 802.1X Port-Based Network Access Control
- extensible authentication protocol over lan
- eapol message exchange
- guest vlan
- supported radius attributes
- eapol configuration guidelines
- Chapter 7. Access Control Lists
- summary of packet classifiers
- summary of acl actions
- ACL Port Mirroring
- ACL Logging
- Rate Limiting Behavior
- ACL Configuration Examples
- ACL Example 3
- ACL Example 6
- VLAN Maps
- Using Storm Control Filters
- Part 3: Switch Basics
- Chapter 8. VLANs
- VLANs Overview
- PVID/Native VLAN Numbers
- VLAN Tagging/Trunk Mode
- Ingress VLAN Tagging
- Limitations
- VLAN Topologies and Design Considerations
- VLAN Configuration Example
- Protocol‐Based VLANs
- PVLAN Priority Levels
- Configuring PVLAN
- Private VLANs
- Configuration Guidelines
- Chapter 9. Ports and Link Aggregation
- Configuring QSFP+ Ports
- Aggregation Overview
- Static LAGs
- Configuring a Static LAG
- link aggregation control protocol
- configuring lacp
- Chapter 10. Spanning Tree Protocols
- adding and removing ports from stgs
- rapid spanning tree protocol
- rstp configuration example
- multiple spanning tree protocol
- mstp configuration guidelines
- port type and link type
- Chapter 11. Virtual Link Aggregation Groups
- Configuring VLAGs
- Basic VLAG Configuration
- Configuring the VLAG
- VLAG Configuration ‐ VLANs Mapped to MSTI
- VLAGs with VRRP
- Task 2: Configure VLAG Peer 2
- Two‐tier vLAGs with VRRP
- vLAG Peer Gateway
- Task 1: Configure Layer 2/3 border switches
- VLAG with PIM
- Health Check
- Chapter 12. Quality of Service
- QoS Overview
- Using ACL Filters
- ACL Metering and Re‐Marking
- Using DSCP Values to Provide QoS
- Per Hop Behavior
- QoS Levels
- DSCP Re‐Marking Configuration Examples
- Using 802.1p Priority to Provide QoS
- Queuing and Scheduling
- WRED with ECN
- Configuring WRED/ECN
- WRED/ECN Configuration Example
- Configure Global Profile for ECN
- Configure Port‐level Profile for ECN
- Part 4: Advanced Switching Features
- Chapter 13. Virtualization
- Chapter 14. Virtual NICs
- Defining Server Ports
- Chapter 15. Stacking
- stacking overview
- stack membership
- master failover
- configuring a stack
- removing a switch from the stack
- ISCLI Stacking Commands
- Chapter 16. VMready
- VE Capacity
- Local VM Groups
- Distributed VM Groups
- Initializing a Distributed VM Group
- Synchronizing the Configuration
- VMcheck
- Virtual Distributed Switch
- Migrating to vDS
- Virtualization Management Servers
- vCenter Scans
- Exporting Profiles
- Pre‐Provisioning VEs
- VM Policy Bandwidth Control
- Bandwidth Policies vs. Bandwidth Shaping
- VMready Information Displays
- vCenter Hypervisor Hosts
- vCenter VEs
- VMready Configuration Example
- Chapter 17. FCoE and CEE
- Fibre Channel over Ethernet
- FCoE Requirements
- Converged Enhanced Ethernet
- Effects on 802.1p Quality of Service
- Effects on Flow Control
- global configuration
- pfc configuration example
- enhanced transmission selection
- configuring dcbx
- Chapter 18. Fibre Channel
- Implementing Fibre Channel
- Fibre Channel VLANs
- Switching Mode
- NPV Manual Disruptive Load‐Balancing
- Zones
- Zonesets
- Activating a Zoneset
- Optimized FCoE Traffic Flow
- Storage Management Initiative Specification (SMI‐S)
- Fibre Channel Configuration
- Example 2: Full Fabric FC/FCoE Switch
- Fibre Channel Standard Protocols Supported
- Chapter 19. Edge Virtual Bridging
- EVB Operations Overview
- VLAN Behavior
- EVB Configuration
- Chapter 20. Static Multicast ARP
- Configuring Static Multicast ARP
- Chapter 21. Dynamic ARP Inspection
- Interface Trust States and Network Security
- DAI Configuration Guidelines and Restrictions
- Part 5: IP Routing
- Chapter 22. Basic IP Routing
- IP Routing Benefits
- example of subnet routing
- using vlans to segregate broadcast domains
- dynamic host configuration protocol
- dhcp relay agent
- Chapter 23. Internet Protocol Version 6
- ipv6 address format
- ipv6 address types
- ipv6 address autoconfiguration
- neighbor discovery
- supported applications
- ipv6 configuration examples
- Chapter 24. IPsec with IPv6
- ipsec protocols
- Chapter 25. Routing Information Protocol
- distance vector protocol
- ripv2 in ripv1 compatibility mode
- rip features
- rip configuration example
- Chapter 26. Internet Group Management Protocol
- IGMP Terms
- How IGMP Works
- IGMP Capacity and Default Values
- IGMP Snooping
- IGMP Groups
- IGMP Snooping Configuration Guidelines
- IGMP Snooping Configuration Example
- Advanced Configuration Example: IGMP Snooping
- Prerequisites
- Troubleshooting IGMP Snooping
- IGMP Relay
- Configure IGMP Relay
- Advanced Configuration Example: IGMP Relay
- Configuration
- Troubleshooting IGMP Relay
- Additional IGMP Features
- Configuring the Action
- Chapter 27. Multicast Listener Discovery
- MLD Terms
- How MLD Works
- How Flooding Impacts MLD
- Dynamic Mrouters
- MLD Capacity and Default Values
- Configuring MLD
- Chapter 28. Border Gateway Protocol
- Internal Routing Versus External Routing
- Route Reflector
- Configuring Route Reflection
- Restrictions
- Forming BGP Peer Routers
- Dynamic Peers
- loopback interfaces
- incoming and outgoing route maps
- aggregating routes
- bgp attributes
- selecting route paths in bgp
- bgp failover configuration
- default redistribution and route aggregation example
- Chapter 29. Open Shortest Path First
- types of ospf areas
- types of ospf routing devices
- neighbors and adjacencies
- the shortest path first tree
- configurable parameters
- defining areas
- using the area id to assign the ospf area number
- interface cost
- default routes
- host routes for load balancing
- ospf features not supported in this release
- OSPFv2 Configuration Examples
- Example 1: Simple OSPF Domain
- Example 2: Virtual Links
- Configuring OSPF for a Virtual Link on Switch #2
- Other Virtual Link Options
- Example 3: Summarizing Routes
- Verifying OSPF Configuration
- OSPFv3 Implementation in Enterprise NOS
- OSPFv3 Identifies Neighbors by Router ID
- Neighbor Configuration Example
- Chapter 30. Protocol Independent Multicast
- PIM Overview
- Supported PIM Modes and Features
- Basic PIM Settings
- PIM Neighbor Filters
- Additional Sparse Mode Settings
- Specifying a Bootstrap Router
- Using PIM with Other Features
- PIM Configuration Examples
- Example 2: PIM‐SM with Static RP
- Part 6: High Availability Fundamentals
- Chapter 31. Basic Redundancy
- Aggregating for Link Redundancy
- Hot Links
- Configuring Hot Links
- Chapter 32. Layer 2 Failover
- setting the failover limit
- l2 failover with other features
- Chapter 33. Virtual Router Redundancy Protocol
- vrrp overview
- master and backup virtual router
- selecting the master vrrp router
- failover methods
- virtual router deployment considerations
- high availability configurations
- Part 7: Network Management
- Chapter 34. Link Layer Discovery Protocol
- lldp overview
- enabling or disabling lldp
- LLDP Receive Features
- Time‐to‐Live for Received Information
- LLDP Example Configuration
- Chapter 35. Simple Network Management Protocol
- SNMP Version 3
- User Configuration Example
- Configuring SNMP Trap Hosts
- SNMPv2 Trap Host Configuration
- SNMPv3 Trap Host Configuration
- SNMP MIBs
- Switch Images and Configuration Files
- Loading a New Switch Image
- Saving the Switch Configuration
- Chapter 36. Service Location Protocol
- Active DA Discovery
- SLP Configuration
- Chapter 37. Secure Input/Output Module
- SIOM Overview
- Setting an SIOM Security Policy
- Secure Protocols
- Insecure Protocols Unaffected by SIOM
- Implementing Secure LDAP (LDAPS)
- Disabling LDAPS
- Syslogs and LDAPS
- Using Cryptographic Mode
- Part 8: Monitoring
- Chapter 38. Remote Monitoring
- RMON Overview
- RMON Group 1—Statistics
- RMON Group 2—History
- alarm mib objects
- Chapter 39. sFlow
- Chapter 40. Port Mirroring
- configuring port mirroring
- Part 9: Appendices
- Appendix A. Glossary
- Appendix B. VLAN Tagging Changes Since N/OS 7.9
- Appendix C. Getting help and technical assistance
- Appendix D. Notices
- important notes
- recycling information
- particulate contamination
- telecommunication regulatory statement
- electronic emission notices
- japan vcci class a statement
- taiwan class a compliance statement
- Index