4
XRN C
ONFIGURATION
This chapter covers the following topics:
n
Introduction to XRN
n
Configuring an XRN Fabric
n
Fabric Configuration Example
Introduction to XRN
Several XRN Switches of the same model can be interconnected to create a “Fabric”,
in which each Switch is a unit. The ports used to interconnect all the units are called
Fabric ports, while the other ports that are used to connect the Fabric to users are
called user ports. In this way, you can increase ports and switching capability by
adding devices to the Fabric. In addition, reliability of the system will be improved
because the devices within the Fabric can backup each other. This feature brings you
many advantages:
n
Realizes unified management of multiple devices. Only one connection and one IP
address are required to manage the entire Fabric. Therefore, management cost is
reduced.
n
Enables you to purchase devices on demand and expand network capacity
smoothly. Protects your investment to the full extent during network upgrade.
n
Ensures high reliability by N+1 redundancy, avoids single point failure, and lessens
service interruption.
Figure 17
Fabric Example
Fabric Topology Mapper (FTM) function can manage and maintain Fabric topology.
FTM on each unit exchanges information with other units, including unit ID, Fabric
name, and the authentication mode between units, by using a special kind of
protocol packets. It manages and maintains Fabric topology according to the acquired
information. For example, when a new device is connected to a Fabric, FTM will
determine whether it should establish a new Fabric with the device according to the
information.
Configuring an XRN
Fabric
FTM provides user interfaces. You can configure VLAN unit IDs, Fabric name, and the
authentication mode between units by using the command.
Fabric
Fabric port
user port
Fabric
Fabric port
user port
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...