Operation Manual – Stack-Cluster
H3C S3100 Series Ethernet Switches
Chapter 2 Cluster
2-19
z
Display the tree structure three layers above or below the specified node.
z
Display the topology between two connected nodes.
Note:
The topology information is saved as a topology.top file in the Flash memory to the
administrative device. You cannot specify the file name manually.
2)
Cluster device blacklist function
To ensure stability and security of the cluster, you can use the blacklist to restrict the
devices to be added to the cluster. After you add the MAC address of the device that
you need to restrict into the cluster blacklist, even if the cluster function is enabled on
this device and the device is normally connected to the current cluster, this device
cannot join the cluster and participate in the unified management and configuration of
the cluster.
II. Configure the enhanced cluster features
Complete the following tasks to configure the enhanced cluster feature:
Task
Remarks
Configure cluster topology management function
Required
Configure cluster device blacklist
Required
III. Configure cluster topology management function
1) Configuration
prerequisites
Before configuring the cluster topology management function, make sure that:
z
The basic cluster configuration is completed.
z
Devices in the cluster work normally.
2) Configuration
procedure
Follow these steps to configure cluster topology management function on a
management device:
Operation
Command
Description
Enter system view
system-view
—
Enter cluster view
cluster
—