101
Configuring Switch Clusters
Managing Switch Clusters
Managing Switch Clusters
Using the CLI to Manage Switch Clusters
You can configure cluster member switches from the CLI by first logging into the cluster command switch. Enter the
rcommand
user EXEC command and the cluster member switch number to start a Telnet session (through a console or
Telnet connection) and to access the cluster member switch CLI. The command mode changes, and the Cisco IOS
commands operate as usual. Enter the
exit
privileged EXEC command on the cluster member switch to return to the
command-switch CLI.
This example shows how to log into member-switch 3 from the command-switch CLI:
switch#
rcommand 3
If you do not know the member-switch number, enter the
show cluster members
privileged EXEC command on the
cluster command switch.
The Telnet session accesses the member-switch CLI at the same privilege level as on the cluster command switch. The
Cisco IOS commands then operate as usual.
Catalyst 1900 and Catalyst 2820 CLI Considerations
If your switch cluster has Catalyst 1900 and Catalyst 2820 switches running standard edition software, the Telnet session
accesses the management console (a menu-driven interface) if the cluster command switch is at privilege level 15. If the
cluster command switch is at privilege level 1 to 14, you are prompted for the password to access the menu console.
Command-switch privilege levels map to the Catalyst 1900 and Catalyst 2820 cluster member switches running
standard and Enterprise Edition Software as follows:
If the command-switch privilege level is 1 to 14, the cluster member switch is accessed at privilege level 1.
If the command-switch privilege level is 15, the cluster member switch is accessed at privilege level 15.
Note:
The Catalyst 1900 and Catalyst 2820 CLI is available only on switches running Enterprise Edition Software.
For more information about the Catalyst 1900 and Catalyst 2820 switches, refer to the installation and configuration
guides for those switches.
Using SNMP to Manage Switch Clusters
When you first power on the switch, SNMP is enabled if you enter the IP information by using the setup program and
accept its proposed configuration.
When you create a cluster, the cluster command switch manages the exchange of messages between cluster member
switches and an SNMP application. The cluster software on the cluster command switch appends the cluster member
switch number (
@esN
, where
N
is the switch number) to the first configured read-write and read-only community strings
on the cluster command switch and propagates them to the cluster member switch. The cluster command switch uses
this community string to control the forwarding of gets, sets, and get-next messages between the SNMP management
station and the cluster member switches.
Note:
When a cluster standby group is configured, the cluster command switch can change without your knowledge. Use
the first read-write and read-only community strings to communicate with the cluster command switch if there is a
cluster standby group configured for the cluster.
If the cluster member switch does not have an IP address, the cluster command switch redirects traps from the cluster
member switch to the management station, as shown in
. If a cluster member switch has its own
IP address and community strings, the cluster member switch can send traps directly to the management station, without
going through the cluster command switch.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...