92
Configuring Switch Clusters
Restrictions for Configuring Switch Clusters
Has CDP version 2 enabled.
Is not a command or cluster member switch of another cluster.
If a cluster standby group exists, the switch is connected to every standby cluster command switch through at least
one common VLAN. The VLAN to each standby cluster command switch can be different.
Is connected to the cluster command switch through at least one common VLAN.
Catalyst 1900, Catalyst 2820, Catalyst 2900 XL, Catalyst 2950, and Catalyst 3500 XL candidate and cluster
member switches must be connected through their management VLAN to the cluster command switch and
standby cluster command switches. For complete information about these switches in a switch-cluster
environment, refer to the software configuration guide for that specific switch.
This requirement does not apply if you have a Catalyst 2970, Catalyst 3550, Catalyst 3560, or Catalyst 3750
cluster command switch. Candidate and cluster member switches can connect through any VLAN in common
with the cluster command switch.
Restrictions for Configuring Switch Clusters
We do not recommend using the
ip http access-class
global configuration command to limit access to specific hosts
or networks. Access should be controlled through the cluster command switch or by applying access control lists (ACLs)
on interfaces that are configured with IP address. For more information on ACLs, see
Configuring Network Security with
Information About Configuring Switch Clusters
A
switch cluster
is a set of up to 16 connected, cluster-capable Catalyst switches that are managed as a single entity.
The switches in the cluster use the switch clustering technology so that you can configure and troubleshoot a group of
different Catalyst desktop switch platforms through a single IP address.
In a switch cluster, one switch must be the
cluster command switch
and up to 15 other switches can be
cluster member
switches
. The total number of switches in a cluster cannot exceed 16 switches. The cluster command switch is the single
point of access used to configure, manage, and monitor the cluster member switches. Cluster members can belong to
only one cluster at a time.
Benefits of Clustering Switches
Management of switches regardless of their interconnection media and their physical locations. The switches can
be in the same location, or they can be distributed across a Layer 2 or Layer 3 (if your cluster is using a
Catalyst 3550, Catalyst 3560, or Catalyst 3750 switch as a Layer 3 router between the Layer 2 switches in the
cluster) network.
Cluster members are connected to the cluster command switch according to the connectivity guidelines described
in the
Automatic Discovery of Cluster Candidates and Members, page 94
. This section includes management VLAN
considerations for the Catalyst 1900, Catalyst 2820, Catalyst 2900 XL, Catalyst 2950, and Catalyst 3500 XL
switches. For complete information about these switches in a switch-cluster environment, refer to the software
configuration guide for that specific switch.
Command-switch redundancy if a cluster command switch fails. One or more switches can be designated as
standby cluster command switches
to avoid loss of contact with cluster members. A
cluster standby group
is a group
of standby cluster command switches.
Management of a variety of switches through a single IP address. This preserves IP addresses, especially if you have
a limited number of them. All communication with the switch cluster is through the cluster command switch IP
address.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...