388
C
HAPTER
45: C
ONFIGURATION
OF
N
EWLY
A
DDED
C
LUSTER
F
UNCTIONS
#
user-interface aux 0
user-interface vty 0 4
#
return
Configuring Topology
Authentication
You can save a reference topology file that serves as the basis of the current network
topology. It can be used to locate problems in subsequent network topologies. After
you confirm the structure of the current network through CLI according to the actual
cluster deployment, the master device generates a reference topology file named
topology.top. The file is saved in the Flash. It contains the information about the link
states of all the nodes in the cluster.
A reference topology file contains a white list and a black list.
■
The white list contains legal devices. (Legal devices are those confirmed by users.)
■
The blacklist contains illegal devices. (Illegal devices are those that fail to pass the
topology authentication.)
Thereafter, each time a device attempts to join a cluster, the master device
automatically initiates topological authentication based on the reference topology
file.
■
If the device is in the black list, the master device denies the device.
■
If the device is in the white list, the master device adds the device to the cluster
and automatically delivers the private configuration of the node to the device.
■
If the device is neither in the blacklist nor the white list, the master device adds the
device to the cluster but do not deliver private configuration to the device. The
app file on the device cannot be automatically upgraded.
■
Only the candidates passing topology authentication become member devices of
the cluster, and only the devices confirmed by users can be added to the white list.
Configuration prerequisites
■
NDP and NTDP configurations are performed on the related cluster devices.
■
The cluster is created and enabled. That is, you can manage cluster members
through the master device.
Summary of Contents for 3CR17660-91
Page 10: ...8 CONTENTS ...
Page 14: ...4 ABOUT THIS GUIDE ...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION ...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION ...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION ...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION ...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT ...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET ...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION ...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION ...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION ...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION ...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION ...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES ...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION ...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging ...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER ...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING ...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging ...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST ...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS ...