602
C
HAPTER
32: C
LUSTERING
■
Topology collection: Clustering implements NTDP (Neighbor Topology Discovery
Protocol) to collect information on device connections and candidate devices
within a specified hop range.
■
Member recognition: Members in the cluster can be located, thus the
management device can recognize them and deliver configuration and
management commands.
■
Member management: Devices can be added into or removed from a cluster on
the management device. Management device authentication and handshake
interval can also be configured on the management device.
Related configurations are described in the following sections.
Switch Roles
Switches in a cluster are assigned with different roles according to their own
functions. You can specify or change the role for a switch.
A switch in a cluster can be the management device, a member device or a candidate
device.
Figure 175 shows the role changing rule.
Table 655
Devices in a cluster
Role
Configurations
Functions
Management
device
Is configured with a
public IP address.
Receives management
commands that the user
sends through the public
network for processing.
Provides management interfaces for all
switches in the cluster.
Manages member devices through command
redirection.
Forwards commands to be executed on
member devices to the proper member for
processing.
Supports neighbor discovery, topology
collection, cluster management, cluster state
maintenance and proxies.
Member device
Often is not configured
with public IP address.
Acts as cluster members
Supports neighbor discovery, being managed
by the management device, running commands
from proxies and failure/log report.
Candidate
device
Often not configured with
a public IP address.
Candidate devices are switches that are not
cluster members and can be added into a cluster.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...