54
HA C
ONFIGURATION
Introduction to HA
HA (high availability) is to achieve a high availability of the system and to recover
the system as soon as possible in the event of fabric failures so as to shorten the
MTBF (Mean Time Between Failure) of the system.
The functions of HA are mainly implemented by the application running on master
and slave modules. The two modules are working in the master-slave mode: one
module works in master mode, the other work in slave mode. If the master-slave
system detects a fault in the master module, a hot master-slave switchover will be
performed automatically. The slave module will try to connect and control the
system bus while the original master module will try to disconnect from the bus.
Thus, the master-slave switchover of the active system is completed, and at the
same time the original master module is reset to recover as soon as possible and
then function as the slave module. Even if the master module fails, the slave
module can also take its role to ensure the normal operation, and the system can
recover as soon as possible.
Switch 8800 Family series support hot swap of master and slave modules. The hot
swap of master modules will cause master-slave switchover.
Switch 8800 Family series support manual master-slave switchover. You can
change the current module state manually by executing command.
The configuration file of slave is copied from master module at the same time. This
can ensure that the slave system continues to operate in the same configuration as
that of the original active system after the slave system has taken place of the
active system. Switch 8800 Family series support automatic synchronization. The
active system stores its configuration file and backup the configuration file to the
slave system simultaneously when the master’s configuration file is modified,
ensuring the consistency of the configurations of the active system and slave
system.
Besides, the system can monitor the power supply and the working environment
of the system and give timely alarms to avoid the escalation of failures and ensure
safe operations of the system.
c
CAUTION:
The Switch 8800 Family active and standby modules must both be in
position and run the same version of program. Otherwise, the switch cannot
operate normally.
Configuring HA
The following sections describe the HA configuration tasks:
■
“Restarting the Slave System Manually”
■
“Starting the Master-Slave Switchover Manually”
Summary of Contents for Switch 8807
Page 14: ......
Page 32: ...32 CHAPTER 2 COMMAND LINE INTERFACE...
Page 50: ...50 CHAPTER 5 MANAGEMENT INTERFACE CONFIGURATION...
Page 54: ...54 CHAPTER 6 CONFIGURATION FILE MANAGEMENT...
Page 64: ...64 CHAPTER 8 SUPER VLAN CONFIGURATION...
Page 70: ...70 CHAPTER 9 ISOLATE USER VLAN CONFIGURATION...
Page 78: ...78 CHAPTER 10 IP ADDRESS CONFIGURATION...
Page 82: ...82 CHAPTER 11 IP PERFORMANCE CONFIGURATION flag ACK window 16079...
Page 100: ...100 CHAPTER 13 ETHERNET PORT CONFIGURATION...
Page 114: ...114 CHAPTER 15 PORT ISOLATION CONFIGURATION...
Page 158: ...158 CHAPTER 18 DIGEST SNOOPING CONFIGURATION...
Page 162: ...162 CHAPTER 19 FAST TRANSITION...
Page 219: ......
Page 220: ...220 CHAPTER 24 VLAN ACL CONFIGURATION...
Page 234: ...234 CHAPTER 25 802 1X CONFIGURATION...
Page 284: ...284 CHAPTER 28 IP ROUTING PROTOCOL OVERVIEW...
Page 290: ...290 CHAPTER 29 STATIC ROUTE CONFIGURATION...
Page 338: ...338 CHAPTER 31 OSPF CONFIGURATION...
Page 392: ...392 CHAPTER 33 BGP CONFIGURATION...
Page 404: ...404 CHAPTER 34 IP ROUTING POLICY CONFIGURATION...
Page 406: ...406 CHAPTER 35 ROUTE CAPACITY CONFIGURATION...
Page 408: ...408 CHAPTER 36 RECURSIVE ROUTING CONFIGURATION...
Page 416: ...416 CHAPTER 37 IP MULTICAST OVERVIEW...
Page 430: ...430 CHAPTER 39 IGMP SNOOPING CONFIGURATION...
Page 454: ...454 CHAPTER 42 IGMP CONFIGURATION...
Page 462: ...462 CHAPTER 43 PIM DM CONFIGURATION...
Page 506: ...506 CHAPTER 46 MBGP MULTICAST EXTENSION CONFIGURATION...
Page 528: ...528 CHAPTER 48 MPLS BASIC CAPABILITY CONFIGURATION...
Page 632: ...632 CHAPTER 51 MPLS VLL...
Page 652: ...652 CHAPTER 52 VPLS CONFIGURATION...
Page 666: ...666 CHAPTER 53 VRRP CONFIGURATION...
Page 680: ...680 CHAPTER 56 ARP TABLE SIZE CONFIGURATION...
Page 718: ...718 CHAPTER 59 NETSTREAM CONFIGURATION...
Page 728: ...728 CHAPTER 61 POE CONFIGURATION...
Page 736: ...736 CHAPTER 63 UDP HELPER CONFIGURATION...
Page 746: ...746 CHAPTER 64 SNMP CONFIGURATION...
Page 792: ...792 CHAPTER 68 FILE SYSTEM MANAGEMENT...
Page 800: ...800 CHAPTER 69 DEVICE MANAGEMENT...
Page 810: ...810 CHAPTER 70 FTP TFTP CONFIGURATION...
Page 840: ...840 CHAPTER 72 SYSTEM MAINTENANCE AND DEBUGGING...
Page 844: ...844 CHAPTER 74 PACKET STATISTICS CONFIGURATION...
Page 846: ...846 CHAPTER 75 ETHERNET PORT LOOPBACK DETECTION...
Page 860: ...860 CHAPTER 76 QINQ CONFIGURATION...
Page 866: ...866 CHAPTER 77 NQA CONFIGURATION...
Page 876: ...876 CHAPTER 78 PASSWORD CONTROL CONFIGURATION...