Cluster Configuration Tasks
331
n
■
When using the tracemac command to locate a device by its IP address, the
switch will query the corresponding ARP entry of the IP address, and then
query the MAC address based on the ARP entry to locate the specified device
finally.
■
If the IP address has its corresponding ARP entry, but its corresponding MAC
address is not in the MAC address table, the switch will fail to locate the
specified device.
■
If you build a cluster from the CLI or web interface and then you disable
clustering for the commander, you may lose the cluster configuration and need
to rebuild this if you wish to keep the cluster.
Configuring the
Enhanced Cluster
Features
Enhanced cluster feature overview
To configure the enhanced cluster features:
1
Cluster topology management function
After the cluster topology becomes stable, you can use the topology management
commands on the cluster administrative device to save the topology of the current
cluster as the standard topology and back up the standard topology on the Flash
memory of the administrative device .
When errors occur to the cluster topology, you can replace the current topology
with the standard cluster topology and restore the administrative device using the
backup topology on the Flash memory, so that the devices in the cluster can
resume normal operation.
With the
display cluster current-topology
command, the switch can display the
topology of the current cluster in a tree structure. The output formats include:
■
Display the tree structure three layers above or below the specified node.
■
Display the topology between two connected nodes.
n
The topology information is saved as a topology.top file in the Flash memory to
the administrative device. You cannot specify the file name manually.
2
Cluster device blacklist function
To ensure stability and security of the cluster, you can use the blacklist to restrict
the devices to be added to the cluster. After you add the MAC address of the
device that you need to restrict into the cluster blacklist, even if the cluster
function is enabled on this device and the device is normally connected to the
current cluster, this device cannot join the cluster and participate in the unified
management and configuration of the cluster.
Configure the enhanced cluster features
Table 255
The enhanced cluster feature configuration tasks
Operation
Description
Related section
Configure cluster topology
management function
Required
“Configure cluster topology
management function”
Configure the cluster device
blacklist
Required
“Configure cluster device
blacklist”
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...