Displaying and Maintaining Cluster Configuration
333
Displaying and
Maintaining Cluster
Configuration
After the above configuration, you can execute the
display
commands in any
view to display the configuration and running status of cluster, so as to verify your
configuration.
Cluster Configuration
Example
Basic Cluster
Configuration Example
Network requirements
Three switches compose a cluster, where:
■
The Switch 4210 serves as the management device.
■
The rest are member devices.
Delete the specified MAC
address from the cluster
blacklist
black-list delete-mac
mac-address
Optional
Delete a device from the
cluster add this device to the
cluster blacklist
delete-member
member-id
[
to-black-list
]
Optional
Displays the information
about the devices in the
cluster blacklist
display cluster black-list
Optional
This command can be
executed in any view.
Table 257
Configure the cluster device blacklist
Operation Command Description
Table 258
Display and maintain cluster configuration
Operation
Command
Description
Display all NDP configuration
and running information
(including the interval to send
NDP packets, the holdtime,
and all neighbors discovered)
display ndp
You can execute the
display
command in any view.
Display NDP configuration
and running information on
specified ports (including the
neighbors discovered by NDP
on the ports)
display ndp interface
port-list
Display global NTDP
information
display ntdp
Display device information
collected by NTDP
display ntdp device-list
[
verbose
]
Display status and statistics
information about the cluster
display cluster
Display information about the
candidate devices of the
cluster
display cluster candidates
[
mac-address
H-H-H
|
verbose
]
Display information about the
member devices of the cluster
display cluster members
[
member-number
|
verbose
]
Clear the statistics on NDP
ports
reset ndp statistics
[
interface
port-list
]
You can execute the
reset
command in user view.
Summary of Contents for 4210 PWR
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Page 340: ...338 CHAPTER 30 CLUSTER...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...