32
C
LUSTERING
Clustering Overview
Clustering enables the network to manage multiple switches through the public IP
address of a switch named the management device. Managed switches in a cluster
are member devices, and often may not have an assigned public IP address.
Management and maintenance on member devices are made through management
device redirection. The management and member devices form a cluster, whose
typical application is shown in Figure 174.
Figure 174
Clustering
Clustering offers the following advantages:
■
Simple configuration and management on multiple switches through one public IP
address on the administer device. Login to the configuration port of each member
device is not necessary.
■
Topology discovery and display functions that help network monitoring and
debugging.
■
Concurrent software upgrade and parameter configurations on multiple switches.
■
Being free from topology and distance limitations.
■
Saving IP address resource.
Clustering provides the following functions:
■
Topology discovery: Clustering implements NDP (Neighbor Discovery Protocol) to
discover information about directly connected neighbor devices, including device
type, software/hardware version, connecting port and so on. The device ID, port
duplex mode, product version and Bootrom version can also be given.
Management Device
Member Device
Member Device
Candidate Device
69.110.1.1
Network Management Device
Cluster
69.110.1.100
Network
Member Device
Management Device
Member Device
Member Device
Candidate Device
69.110.1.1
Network Management Device
Cluster
69.110.1.100
Network
Member Device
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...