![3Com CoreBuilder 3500 Command Reference Manual Download Page 299](http://html1.mh-extra.com/html/3com/corebuilder-3500/corebuilder-3500_command-reference-manual_4589654299.webp)
11
T
RUNKS
You can configure a system to aggregate multiple network links into a
single
trunk
. With trunking you can create high-speed point-to-point or
multipoint connections without changing or replacing existing cabling. In
addition, trunking provides automatic point-to-point redundancy
between two devices. Redundant links normally have one link disabled by
Spanning Tree (to prevent looping); trunking utilizes both links.
This chapter provides guidelines and other key information about how to
configure trunking in your system.
The system treats trunked bridge ports in the same way that it treats
normal individual bridge ports. Also, all higher-level network functions —
including Spanning Tree algorithms, virtual LANs (VLANs), and Simple
Network Management Protocol (SNMP) management — do not
distinguish a trunk from any other network port. Unlike for any other
network port, the system automatically distributes traffic across the ports
that are associated with a trunk. If any of the trunk’s ports go down or
up, the system automatically redistributes traffic across the new
arrangement of operational ports.
For more trunking information, see the
Implementation Guide
for your
system.
Trunks can work with MultiPoint Link Aggregation (MPLA). MPLA is a
feature for the CoreBuilder
®
9400 that increases the capacity and
availability of campus LAN cores without using complex, meshed router
networks. Functioning at Layer 2, MPLA provides both dual-homed link
resiliency and automatic load sharing over point-to-multipoint backbone
connections. MPLA increases network availability using scalable Gigabit
Ethernet connections among multiple campus switches. For more
information about MPLA and trunking, see the
CoreBuilder 9400
Implementation Guide
.
Summary of Contents for CoreBuilder 3500
Page 18: ......
Page 26: ...26 ABOUT THIS GUIDE...
Page 27: ...I GETTING STARTED Chapter 1 Administration Overview Chapter 2 Command Summary...
Page 28: ......
Page 64: ...64 CHAPTER 2 COMMAND SUMMARY...
Page 65: ...II SYSTEM LEVEL FUNCTIONS Chapter 3 System Environment Chapter 4 Module Environment...
Page 66: ......
Page 148: ......
Page 202: ......
Page 248: ...248 CHAPTER 8 FIBER DISTRIBUTED DATA INTERFACE FDDI...
Page 250: ......
Page 320: ...320 CHAPTER 11 TRUNKS...
Page 368: ...368 CHAPTER 14 VIRTUAL LANS VLANS...
Page 394: ......
Page 502: ...502 CHAPTER 17 VIRTUAL ROUTER REDUNDANCY VRRP...
Page 604: ...604 CHAPTER 19 OPEN SHORTEST PATH FIRST OSPF...
Page 660: ...660 CHAPTER 20 IPX...
Page 687: ...VII TRAFFIC POLICY Chapter 22 Quality of Service QoS and RSVP...
Page 688: ......
Page 744: ...744 CHAPTER 22 QUALITY OF SERVICE QOS AND RSVP...
Page 745: ...VIII MONITORING Chapter 23 Event Log Chapter 24 Roving Analysis...
Page 746: ......
Page 754: ...754 CHAPTER 23 EVENT LOG...
Page 764: ...764 CHAPTER 24 ROVING ANALYSIS...
Page 765: ...IX REFERENCE Appendix A Technical Support...
Page 766: ......
Page 772: ...772 APPENDIX A TECHNICAL SUPPORT...
Page 784: ......