332
C
HAPTER
30: C
LUSTER
Configure cluster topology management function
1
Configuration prerequisites
Before configuring the cluster topology management function, make sure that:
■
The basic cluster configuration is completed.
■
Devices in the cluster work normally.
2
Configuration procedure
Perform the following configuration on the management device.
Configure cluster device blacklist
Perform the following configuration on the management device.
Table 256
Configure cluster topology management function
Operation
Command
Description
Enter system view
system-view
-
Enter cluster view
cluster
-
Check the current topology
and save it as the standard
topology.
topology accept
{
all
[
save-to
{
ftp-server
|
local-flash
} ] |
mac-address
mac-address
|
member-id
member-id
|
administrator
}
Required
Save the standard topology to
the Flash memory of the
administrative device
topology save-to
local-flash
Required
Restore the standard topology
from the Flash memory of the
administrative device
topology restore-from
local-flash
Optional
Display the detailed
information about a single
device
display ntdp single-device
mac-address
mac-address
Optional
These commands can be
executed in any view.
Display the topology of the
current cluster
display cluster
current-topology
[
mac-address
mac-address1
[
to-mac-address
mac-address2
]
| member-id
member-id1
[
to-member-id
member-id2
] ]
Display the information about
the base topology of the
cluster
display cluster
base-topology
[
mac-address
mac-address
|
member
member-id
]
Display the information about
all the devices in the base
cluster topology
display cluster
base-members
Table 257
Configure the cluster device blacklist
Operation
Command
Description
Enter system view
system-view
-
Enter cluster view
cluster
-
Add the MAC address of a
specified device to the cluster
blacklist
black-list add-mac
mac-address
Optional
By default, the cluster blacklist
is empty.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...