Fujitsu BX600 User Manual 2

User Interface Description
English
PRIMERGY BX600 Blade Server Systems
Intelligent Blade Panel Module 30/12
PRIMERGY BX600 Blade Server Systems
Intelligent Blade Panel Module 30/12
Edition March 2008
CommentsSuggestionsCorrections
Feel free to send us your comments by e-mail to:
manuals@fujtsu-siemens.com
Certified documentation according to DIN EN ISO 9001:2000
To ensure a consistently high quality standard and user-friendliness, this documentation was created to meet the regulations of a quality management system which complies with the requirements of the standard DIN EN ISO 9001:2000.
cognitas. Gesellschaft für Technik-Dokumentation mbH
www.cognitas.de
Copyright and Trademarks
Copyright © Fujitsu Siemens Computers GmbH 2008. All rights reserved.
Delivery subject to availability; right of technical modifications reserved. All hardware and software names used are trademarks of their respective manufacturers.
Important Notes
Introduction
Networking Planning
Making Network Connection
Configuration the IBP
Web Base Command Interface
Command Reference
Using SNMP
System Defaulting
Troubleshooting and Tips
3
Intelligent Blade Panel Module
CONTENTS
1 Important Notes ........................................................................................................... 8
1.1 Information About Boards ..................................................................................... 8
1.2 Compliance Statements........................................................................................9
2 Introduction................................................................................................................12
2.1 Features of the IBP Module................................................................................ 13
2.1.1 MAC Address Supported Features................................................................13
2.1.2 Layer 2 Features ...........................................................................................14
2.1.3 IBP Module Management Features...............................................................16
2.1.4 Security Feature ............................................................................................18
2.2 Description of Hardware.....................................................................................19
2.2.1 Ethernet Ports................................................................................................19
2.3 Features and Benefits ........................................................................................ 23
2.4
2.5
2.6
3 Network Planning ......................................................................................................29
3.1
4 Making Network Connections....................................................................................30
4.1
4.2
4.3
5 Configuration the IBP Module.................................................................................... 33
5.1 Overview ............................................................................................................33
5.2 Connecting the IBP Module................................................................................ 34
5.3 Start up and Configuration the IBP Module ........................................................36
5.4 Configuring the Terminal.....................................................................................37
5.5 Booting Device ................................................................................................... 38
5.6 Software Download ............................................................................................ 39
Notational Conventions
Ta r g e t Group
Technical Data
Introduction to
Connecting to 1000BASE-T Devices
1000BASE-T Cable Requirements
1000BASE-T Pin Assignments
.......................................................................................................26
....................................................................................................27
IBP .............................................................................................. 29
.......................................................................................25
............................................................................32
..................................................................30
.....................................................................31
5.6.1 In BootROM Back Door CLI ..........................................................................39
5.6.2 In Operation Code CLI...................................................................................40
6 Web-Based Management Interface...........................................................................43
6.1 Overview ............................................................................................................43
6.2 Main Menu.......................................................................................................... 44
6.2.1 Groups Administration ...................................................................................44
6.2.2 Panel Settings Menu .....................................................................................61
6.2.3 Security Menu................................................................................................90
4
Intelligent Blade Panel Module
6.2.4 Extended Configuration Menu .....................................................................100
7 Command Reference ..............................................................................................131
7.1 CLI Command Format......................................................................................131
7.2 CLI Mode-based Topology................................................................................132
7.3 System Information and Statistics commands.................................................. 134
7.3.1 show arp ......................................................................................................134
7.3.2 show calendar..............................................................................................134
7.3.3 show eventlog ..............................................................................................135
7.3.4 show running-config.....................................................................................135
7.3.5 show sysinfo ................................................................................................136
7.3.6 show system ................................................................................................ 137
7.3.7 show hardware.............................................................................................137
7.3.8 show version ................................................................................................138
7.3.9 show loginsession........................................................................................139
7.4 Device Configuration Commands..................................................................... 140
7.4.1 Interface ....................................................................................................... 140
7.4.2 L2 MAC Address and Multicast Forwarding Database Tables .....................153
7.4.3 IGMP Snooping............................................................................................157
7.4.4 Port Channel ................................................................................................158
7.4.5 Uplink Sets ...................................................................................................159
7.4.6 Port Group ...................................................................................................160
7.4.7 Port Backup .................................................................................................162
7.4.8 Link State ..................................................................................................... 164
7.4.9 VLAN Port Groups ....................................................................................... 165
7.4.10 Service LAN ...............................................................................................168
7.4.11 Service VLAN .............................................................................................170
7.5 Management Commands ................................................................................. 172
7.5.1 Network Commands .................................................................................... 172
7.5.2 Serial Interface Commands .........................................................................177
7.5.3 Telnet Session Commands .......................................................................... 180
7.5.4 SNMP Server Commands ............................................................................ 186
7.5.5 SNMP Trap Commands ...............................................................................194
7.5.6 HTTP commands .........................................................................................197
7.5.7 Secure Shell (SSH) Commands .................................................................. 201
7.5.8 DHCP Client Commands .............................................................................204
7.5.9 LOCK Commands ........................................................................................ 206
7.6 System Log Management Commands ............................................................. 208
5
Intelligent Blade Panel Module
7.6.1 Show Commands ........................................................................................208
7.6.2 show logging buffered .................................................................................208
7.6.3 show logging traplog....................................................................................209
7.6.4 Configuration Commands............................................................................210
7.7 Script Management Commands.......................................................................215
7.7.1 script apply ..................................................................................................215
7.7.2 script delete ................................................................................................. 215
7.7.3 script list.......................................................................................................216
7.7.4 script show...................................................................................................216
7.8 User Account Management Commands...........................................................217
7.8.1 Show Commands ........................................................................................217
7.8.2 Configuration Commands............................................................................217
7.9 Security Commands ......................................................................................... 220
7.9.1 Show Commands ........................................................................................220
7.9.2 Configuration Commands............................................................................231
7.9.3 Dot1x Configuration Commands .................................................................234
7.9.4 Radius Configuration Commands................................................................240
7.9.5 TACACS Configuration Commands ............................................................ 244
7.9.6 Port Security Configuration Commands ......................................................248
7.10 SNTP Commands.............................................................................................251
7.10.1 Show Commands ........................................................................................ 251
7.10.2 Configuration Commands............................................................................252
7.11 System Utilities.................................................................................................257
7.11.1 clear............................................................................................................. 257
7.11.2 copy.............................................................................................................263
7.11.3 delete........................................................................................................... 266
7.11.4 dir.................................................................................................................266
7.11.5 whichboot ....................................................................................................267
7.11.6 boot-system.................................................................................................267
7.11.7 ping.............................................................................................................. 268
6
7.11.8 traceroute ....................................................................................................269
7.11.9 logging cli-command....................................................................................270
7.11.10 calendar set.................................................................................................270
7.11.11 reload...........................................................................................................271
7.11.12 configure...................................................................................................... 271
7.11.13 disconnect ...................................................................................................271
7.11.14 hostname.....................................................................................................272
Intelligent Blade Panel Module
7.11.15 quit............................................................................................................... 272
7.12 DHCP Commands............................................................................................273
7.12.1 ip dhcp restart..............................................................................................273
7.12.2 ip dhcp client-identifier.................................................................................273
8 Using SNMP ............................................................................................................ 274
8.1
Supported MIBs
8.2
Accessing MIB Objects
8.3
Supported Tr a p s
9
Default Settings ....................................................................................................... 281
9.1 The overview system default settings ..............................................................281
9.2 The default settings for all the configuration commands .................................. 282
10 Troubleshooting and Tips.........................................................................................286
10.1
Diagnosing
10.2
Accessing the Management Interface
................................................................................................275
.....................................................................................277
...............................................................................................280
IBP
Indicators
................................................................................286
...............................................................287
7
Intelligent Blade Panel Module
Information About Boards Important Notes
1 Important Notes
Store this manual close to the device. If you pass the device on to third parties, you should pass this manual on with it.
Be sure to read this page carefully and note the information before you open the device.
You cannot access the IBP Module without first opening the device. How to dismantle and reassemble the device is described in the Operating Manual accompanying the device.
Please observe the safety information provided in the “Important Notes” chapter in the device’s operating manual.
Components can become very hot during operation. Ensure you do not touch components when handling the device. There is a danger of burns!
The warranty is invalidated if the device is damaged during the installation.
1.1 Information About Boards
To prevent damage to the device or the components and conductors on it, please take great care when you insert or remove it. Take great care to ensure that the board is slotted in straight, without damaging components or conductors on it, or any other components.
Be especially careful with the locking mechanisms (catches, centering pins etc.) when you replace the board.
Never use sharp objects (screwdrivers) for leverage.
Boards with electrostatic sensitive devices (ESD) are identifiable by the label shown.
When you handle boards fitted with ESDs, you must, under all circumstances, observe the following points:
You must always discharge static build up (e.g., by touching a grounded object) before working.
The equipment and tools you use must be free of static charges.
Remove the power plug from the mains supply before inserting or removing boards containing ESDs.
Always hold boards with ESDs by their edges. 
Never touch pins or conductors on boards fitted with 
ESDs.
8
Intelligent Blade Panel Module
Compliance Statements Introduction
1.2 Compliance Statements
FCC Class A Compliance
This equipment has been tested and found to comply with the limits for a “Class A” digital device, pursuant to Part 15 of the FCC rules and meets all requirements of the Canadian Interference-Causing Equipment Regulations. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in strict accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.  Increase the separation between equipment and the receiver.  Connect the equipment into an outlet on a circuit different from that to which  the receiver is
connected.
Consult the dealer or an experienced   radio/TV technician for help.
Fujitsu Siemens Computers is not responsible for any radio or television interference caused by unauthorized modifications of this equipment or the substitution or attachment of connecting cables and equipment other than those specified by Fujitsu Siemens Computers. The correction of interferences caused by such unauthorized modification, substitution or attachment will be the responsibility of the user.
You may use unshielded twisted-pair (UTP) cables for RJ-45 connections – Category 3 or greater for 10 Mbps connections, Category 5 for 100 Mbps connections, and Category 5 or 5e for 1000 Mbps connections.
Wear an anti-static wrist strap or take other suitable measures to prevent
electrostatic discharge when handling this equipment.
Industry Canada - Class A
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus as set out in the interference-causing equipment standard entitled “Digital Apparatus,” ICES-003 of the Department of Communications.
Cet appareil numérique respecte les limites de bruits radioélectriques appli- cables aux appareils numériques de Classe A prescrites dans la norme sur le matériel brouilleur: “Appareils Numériques,” NMB-003 édictée par le ministère des Communications.
9
Intelligent Blade Panel Module
Compliance Statements Introduction
Japan VCCI Class A
CE Mark Declaration of Conformance for EMI and Safety (EEC)
This information technology equipment complies with the requirements of the Council Directive 89/336/EEC on the Approximation of the laws of the Member States relating to Electromagnetic Compatibility and 73/23/EEC for electrical equipment used within certain voltage limits and the Amendment Directive
93/68/EEC. For the evaluation of the compliance with these Directives, the following standards were applied:
RFI Emission: • Limit class A according to EN 55022:1998
• Limit class A for harmonic current emission according to EN 61000-3-2/1995
• Limitation of voltage fluctuation and flicker in low-voltage supply system according to EN 61000-3-3/1995
Immunity: • Product family standard according to EN 55024:1998
LVD:
• Electrostatic Discharge according to EN 61000-4-2:1995
(Contact Discharge: ±4 kV, Air Discharge: ±8 kV)
• Radio-frequency electromagnetic field according to EN 61000-4-3:1996
(80 - 1000 MHz with 1 kHz AM 80% Modulation: 3 V/m)
• Electrical fast transient/burst according to EN 61000-4-4:1995 (AC/DC power supply: ±1 kV, Data/Signal lines: ±0.5
• Surge immunity test according to EN 61000-4-5:1995
(AC/DC Line to Line: ±1 kV, AC/DC Line to Earth: ±2 kV)
• Immunity to conducted disturbances, Induced by radio-frequency fields:
EN 61000-4-6:1996 (0.15 - 80 MHz with 1 kHz AM 80% Modulation: 3 V/m)
• Power frequency magnetic field immunity test according to EN 61000-4-
8:1993 (1 A/m at frequency 50 Hz)
• Vol tage dips, short interruptions and voltage variations immunity test according to EN 61000-4-11:1994 (>95% Reduction @10 ms, 30% Reduction @500 ms, >95% Reduction @5000 ms)
• EN 60950 (A1/1992; A2/1993; A3/1993; A4/1995; A11/1997)
kV)
Do not plug a phone jack connector in the RJ-45 port. This may damage
this device. Les raccordeurs ne sont pas utilisé pour le système télépho- nique!
10
Intelligent Blade Panel Module
Compliance Statements Introduction
Taiwan BSMI Class A
Australia AS/NZS 3548 (1995) - Class A
11
Intelligent Blade Panel Module
Features of the IBP Module Introduction
2 Introduction
The PRIMERGY BX600 Blade Server system is a modular server system that can integrates up to 10 server modules, four IBP Modules (one IBP will be included in the base enclosure, the other three are optional) and two Management Modules (MMB). The IBP Module provides networking connectivity to PRIMERGY BX600 Blade Server. The Management Modules provides a single point of control for the PRIMERGY BX600 Blade Server.
The PRIMERGY BX600 Intellignent Blade Panel (IBP) Modules are 42-port devices that are connected to servers through the mid-plane connectors located on PRIMERGY BX600 Blade Server middle plane. The device has 42 ports. The ports numeration starts from the internal ports g1-g30 connected to server blades, and ports g31-g42 are the external ports connecting the IBP Module to the network through the internal ports.
• 12 external RJ-45 connectors for 10/100/1000 Base-T copper ports (uplinks).
• 30 internal ports connected to servers through PRIMERGY BX600 Blade Server mid-plane connector of a VHDM type.
The terminal connection to the device is provided through the MMB board only. No access point is provided on the IBP Module front panel. For debugging and management purposes, a UART bus of each IBP Module is connected to the MMB board. The MMB board can select for management only one IBP at a time.
The IBP Module receives a power supply (12 V dc) through the mid-plane connector. A four system LED indicates the IBP Module status (Power module,MMB-selected or not).
The following figure illustrates the PRIMERGY BX600:
Figure 1-1. PRIMERGY BX600 IBP Module Front Panel
12
Intelligent Blade Panel Module
Features of the IBP Module Introduction
2.1 Features of the IBP Module
The IBP provides a wide range of advanced performance-enhancing features. Multicast filtering provides support for real-time network applications. Flow control eliminates the loss of packets due to bottlenecks caused by port saturation. And broadcast storm suppression prevents broadcast traffic storms from engulfing the network. Some of the management features are briefly described below.
Head of Line Blocking
Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the same egress port resources. HOL blocking queues packets, and the packets at the head of the queue are forwarded before packets at the end of the queue.
Flow Control Support (IEEE 802.3X)
Flow control enables lower speed devices to communicate with higher speed devices, by requesting that the higher speed device refrains from sending packets. Transmissions are temporarily halted to prevent buffer overflows.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is unavailable for additional traffic.
Jumbo Frames Support
Jumbo frames are frames with an MTU size of up to 9K bytes, and better utilize the network by transporting the same data using less frames. The main benefits of this facility are reduced transmission overhead, and reduced host processing overhead. Less frames leads to less I/O interrupts. This facility is typically used for server-to-server transfers.
MDI/MDIX Support
The IBP Module automatically detects whether the cable connected to an RJ-45 port is crossed or straight through. Standard wiring for end stations is Media-Dependent Interface (MDI) and the standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
Auto Negotiation
Auto negotiation allows an IBP Module to advertise modes of operation. The auto negotiation function provides the means to exchange information between two devices that share a point-to-point link segment, and to automatically configure both devices to take maximum advantage of their transmission capabilities.
2.1.1 MAC Address Supported Features
MAC Address Capacity Support
The IBP Module supports up to 16K MAC addresses. The IBP Module reserves specific MAC addresses for system use.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative to learning them
13
Intelligent Blade Panel Module
Features of the IBP Module Introduction
from incoming frames. These user-defined entries are not subject to aging, and are preserved across resets and reboots.
Self-Learning MAC Addresses
The IBP Module enables automatic MAC address learning from incoming packets. The MAC addresses are stored in the Bridging Table.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period are aged out. This prevents the Bridging Table from overflowing.
Port Security
Port security prevents unauthorized users from accessing your network. It allows each port to learn, or be assigned, a list of MAC addresses for devices authorized to access the network through that port. Any packet received on the port must have a source address that appears in the authorized list, otherwise it will be dropped. Port security is disabled on all ports by default, but can be enabled on a per-port basis.
MAC Multicast Support
Multicast service is a limited broadcast service, which allows one-to-many and many-to-many connections for information distribution. Layer 2 Multicast service is where a single frame is addressed to a specific Multicast address, from where copies of the frame are transmitted to the relevant ports.
2.1.2 Layer 2 Features
IGMP Snooping
IGMP Snooping examines IGMP frame contents, when they are forwarded by the IBP Module from work stations to an upstream Multicast router. From the frame, the IBP Module identifies work stations configured for Multicast sessions, and which Multicast routers are sending Multicast frames.
Broadcast Storm Control
Storm Control enables limiting the amount of Multicast and Broadcast frames accepted and forwarded by the IBP Module. When Layer 2 frames are forwarded, Broadcast and Multicast frames are flooded to all ports on the relevant VLAN. This occupies bandwidth, and loads all nodes connected on all ports.
VLAN Transparency Supported Features
The IBP supports VLAN transparency feature. All packets will be forwarded without any modifications as they are received.
Link Aggregation
One Aggregated Links may be defined, with up to 8 member ports, to form a single Link Aggregated Group (LAG). This enables:
• Fault tolerance protection from physical link disruption
• Higher bandwidth connections
• Improved bandwidth granularity
• High bandwidth server connectivity LAG is composed of ports with the same speed, set to full-duplex operation.
14
Intelligent Blade Panel Module
Features of the IBP Module Introduction
Uplink Set Support
Uplink Sets are used to define the external connection. An “Uplink Set” is defined as a set of 1 to n external (uplink) ports, which is used in port group definitions to connect a group of server blades to the customer’s LAN. All members of a Uplink Set will form a LAG.
Port Group Support
Port Group feature is supported on IBP. Port Groups combine several internal ports into a group. Up to 30 groups are available for IBP. Each Port Group could be combined with a uplink set to be as its external connection. Packets only are forwarding within the same group.
VLAN Port Group Support
VLAN Port Group feature is used to define groups on VLAN basis, which are sharing the same Uplink Set. Up to 30 groups are available for IBP. Packets received on internal ports should be untagged packets, and the packets egress on uplink port should be tagged with the VLAN Port Group’s VLAN IDs.
Within the set of VLAN Port Groups sharing the same Uplink Set one VLAN can optionally be defined as “native VLAN”. This changes the tagging behavior at the uplink port for this native VLAN ID. Incoming untagged packets tagged with the native VLAN Id and forwarded to all the downlinks of this VLAN group. Incoming packets tagged with the native VLAN ID are dropped.
Service VLAN & Service LAN Support
Service VLAN & Service LAN are supported in IBP to provide dedicated ports for handling specific VLAN tagged packets. The packets with the same VLAN will be forwarded within the members. Their operations are very similar but in Service LAN, the tagged of packet egress on the uplink ports will be stripped and send as untagged packet. The members of the Service LAN & Service VLAN can be overlapped with the members of port group or VLAN Port group with different VLAN ID.
Port Backup Support
Port Backup feature is supported on IBP for redundant uplink ports. Two aggregation groups are created automatically as the Port Group is created. One of the aggregation groups are defined as active aggregation link, and the other is defined as backup aggregation group. As the active aggregation group is link down, the backup aggregation group will be activated for transmittion. After the active aggregation group is link up again, the backup aggregation group will be deactivated.
Failover Propogation Support
Blade Server has a dual-port network interface controller, and it realizes the redundant LAN ports in case of using NIC management program with LAN teaming function. In order to improve the switching time and realize the “rapid” fail-over of redundant LAN ports, Failover Propogation feature is introduced in IBP for uplink ports to speed up the switching of the redundant LAN ports.
Link Aggregation and LACP
LACP uses peer exchanges across links to determine, on an ongoing basis, the aggregation capability of various links, and continuously provides the maximum level of aggregation capability achievable between a given pair of systems. LACP automatically determines,
15
Intelligent Blade Panel Module
Features of the IBP Module Introduction
configures, binds and monitors the port binding to aggregators within the system.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network server upon system startup. DHCP service is an on-going process. DHCP is an extension to BootP. For more information on DHCP, see "Defining DHCP IP Interface Parameters".
2.1.3 IBP Module Management Features
The Intelligent Blade Panel can either be managed through the console port (out-of-band management) or through the network (in-band management) with SNMP, TELNET or HTTP
protocols.
Various Files of Management Operation:
z There are three types of files for the Intelligent Blade Panel:
Configuration Files: The file stores system configuration information
Operation Code: Executed after system boot-up, also known as Run Time Image
BootRom Image: The images brought up by loader when power up. Also known as
POST (Power On Self-Test)
z Due to the size of flash memory, the Intelligent Blade Panel supports only two copies for
Configuration files and Operation Code respectively, but only one copy for BootRom
Image.
Duplication of Management file
The Intelligent Blade Panel can copy those three types of files in three different ways.
1. Local file to local file copy: The Intelligent Blade Panel can copy an existed local Configuration File to another local file. Copy exited local Operation Code to another local file is not permitted.
2. Remote TFTP Server to Local file copy: The Intelligent Blade Panel can support to download Configuration File or Operation Code from remote server to local file.
3. Local file to remote server: The Intelligent Blade Panel can support to upload an existed local Configuration File to the remote server.
4. Running Config to local file copy
5. Running Config to remote TFTP server
6. Local file to Running Config copy
7. Remote TFTP server to Running Config copy
Select Start-up Files
Users can select one of two copies for Configuration Files and Operation Codes as start-up file which is used as default bootup configuration and execution image, And the other copy of Configuration File and Operation Code will be used for backup.
Save Configuration as file
Users can save the running configuration as a file for future use. This newly saved configuration file can be selected as start-up file later on. Or users can upload this saved
configuration to the remote server for backup.
16
Intelligent Blade Panel Module
Features of the IBP Module Introduction
Provision
The Intelligent Blade Panel allows users to select the Configuration files to configure the system. There are two timings to configure system: Start-up and Run time.
Start-up: Select the Configuration File for start-up purpose.
Run time: Users can choose a new configuration file to reconfigure the system while system running, without rebooting the system. This function is available for CLI only.
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. Events are sent as SNMP traps to a Trap Recipient List.
SNMP Version 1,Version 2, and Version 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol. To control access to the system, a list of community entries is defined, each of which consists of a community string and its access privileges. There are 2 levels of SNMP security read-only and read-write.
Web Based Management
With web based management, the system can be managed from any web browser. The system contains an Embedded Web Server (EWS), which serves HTML pages, through which the system can be monitored and configured. The system internally converts web-based input into configuration commands, MIB variable settings and other management-related settings.
Configuration File Download and Upload
The IBP Module configuration is stored in a configuration file. The Configuration file includes both system wide and port specific IBP Module configuration. The system can display configuration files in the form of a collection of CLI commands, which are stored and manipulated as text files.
TFTP Trivial File Transfer Protocol
The IBP Module supports boot image, software and configuration upload/download via TFTP.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP, which provides comprehensive network traffic monitoring capabilities (as opposed to SNMP which allows network IBP Module management and monitoring). RMON is a standard MIB that defines current and historical MAC-layer statistics and control objects, allowing real-time information to be captured across the entire network.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry practice. CLI is composed of mandatory and optional elements. The CLI interpreter provides command and keyword completion to assist user and shorten typing.
Syslog
Syslog is a protocol that allows event notifications to be sent to a set of remote servers, where they can be stored, examined and acted upon. Multiple mechanisms are implemented to send notification of significant events in real time, and keep a record of these events for after-the-fact usage.
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network IBP Module clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. Time sources are established by Stratums. Stratums define the distance from the
17
Intelligent Blade Panel Module
Features of the IBP Module Introduction
reference clock. The higher the stratum (where zero is the highest), the more accurate the clock.
2.1.4 Security Feature SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data through privacy, authentication, and data integrity. It relies upon certificates and public and private keys. SSL version 3 and TLS version 1 are currently supported.
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol (EAP).
Locked Port Support
Locked Port increases network security by limiting access on a specific port only to users with specific MAC addresses. These addresses are either manually defined or learned on that port. When a frame is seen on a locked port, and the frame source MAC address is not tied to that port, the protection mechanism is invoked.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user database, which contains per-user authentication information, such as user name, password and accounting information. For more information, see "Configuring RADIUS Global Parameters".
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to an IBP Module. SSH version 1 and version 2 are currently supported. The SSH server feature enables an SSH client to establish a secure, encrypted connection with a IBP Module. This connection provides functionality that is similar to an inbound telnet connection. SSH uses RSA Public Key cryptography for IBP Module connections and authentication.
TACACS+
TACACS+ provides centralized security for validation of users accessing the IBP Module. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes.
18
Intelligent Blade Panel Module
System LED
There is one IBP Module system LED with dual functions, controlled by MMB for error status reporting and blade identification. Different flashing frequencies are used to indicate the different functions. There are two functions, identification and error reporting, with identification having a higher priority than error reporting.
NOTE: If there is an error and the identification function is activated, the LED still functions as
an identification LED. The LED can only be disabled by the MMB with a 255 seconds timeout. If an error is happening, the LED for error reporting will always be flashing and cannot be turn off. The following table describes the system LED indications.
Features and Benefits Introduction
2.2 Description of Hardware
IBP Module Port Configurations PRIMERGY BX600 Front Panel Port Description
The PRIMERGY BX600 IBP Module contains 12 Gigabit Ethernet ports for connecting to the network and 30 Gigabit Ethernet ports for connecting PRIMERGY BX600 Blade Server management MMB modules.
The 12 Gigabit Ethernet ports can operate at 10, 100 or 1000 Mbps. These ports support auto negotiation, duplex mode (Half or Full duplex), and flow control. The 30 Gigabit Ethernet ports that connect to server modules can only operate at 1000 Mbps, full-duplex. These 30 ports also support flow control.
The following figure illustrates the PRIMERGY BX600 IBP front panel.
Figure 1. PRIMERGY BX600 IBP Front Panel
2.2.1 Ethernet Ports Up-link Ports
12 external RJ-45 ports support IEEE 802.3x auto-negotiation of speed, duplex mode, and flow control. Each port can operate at 10 Mbps, 100 Mbps and 1000 Mbps, full and half duplex, and control the data stream to prevent buffers from overflowing. The up-link ports can be connected to other IEEE 802.3ab 1000BASE-T compliant devices up to 100 m (328 ft.) away using Category 5 twisted-pair cable. These ports also feature automatic MDI/MDI-X operation, so you can use straight-through cables for all connections. These up-link ports are named g31 – g42 in the configuration interface.
Note – Note that when using auto-negotiation, the speed, transmission mode and flow control
19
Intelligent Blade Panel Module
Features of the IBP Module Introduction
can be automatically set if this feature is also supported by the attached device. Otherwise, these items can be manually configured for any connection.
Note – Auto-negotiation must be enabled for automatic MDI/MDI-X pin-out configuration. Internal Ports
The IBP also includes 30 internal 1000BASE-X Gigabit Ethernet ports that connect to the server blades in the chassis. These ports are fixed at 1000 Mbps, full duplex. The internal ports are named g1 – g30 in the configuration interface. The 30 internal ports connect with server blade as following diagram.
20
Intelligent Blade Panel Module
Features of the IBP Module Introduction
21
Intelligent Blade Panel Module
Features of the IBP Module Introduction
PRIMERGY GbE Switch Blade 30/12 Internal Ports List
PRIMERGY BX620
S4 Nic No.
Blade No 1 Nic 1 Net 1 Port 1 Blade No 6 Nic 1 Net 1 Port 16
Blade No 1 Nic 2 Net 2 Port 1 Blade No 6 Nic 2 Net 2 Port 16
Blade No 1 Nic 3 Net 1 Port 2 Blade No 6 Nic 3 Net 1 Port 17
Blade No 1 Nic 4 Net 2 Port 2 Blade No 6 Nic 4 Net 2 Port 17
Blade No 1 Nic 5 Net 1 Port 3 Blade No 6 Nic 5 Net 1 Port 18
Blade No 1 Nic 6 Net 2 Port 3 Blade No 6 Nic 6 Net 2 Port 18
Blade No 2 Nic 1 Net 1 Port 4 Blade No 7 Nic 1 Net 1 Port 19
Blade No 2 Nic 2 Net 2 Port 4 Blade No 7 Nic 2 Net 2 Port 19
Blade No 2 Nic 3 Net 1 Port 5 Blade No 7 Nic 3 Net 1 Port 20
Blade No 2 Nic 4 Net 2 Port 5 Blade No 7 Nic 4 Net 2 Port 20
Blade No 2 Nic 5 Net 1 Port 6 Blade No 7 Nic 5 Net 1 Port 21
Blade No 2 Nic 6 Net 2 Port 6 Blade No 7 Nic 6 Net 2 Port 21
Blade No 3 Nic 1 Net 1 Port 7 Blade No 8 Nic 1 Net 1 Port 22
I/O Switch
Blade Module.
Internal
Ports Mapping
PRIMERGY BX620
S4 Nic No.
I/O Switch
Blade Module.
Internal
Ports Mapping
Blade No 3 Nic 2 Net 2 Port 7 Blade No 8 Nic 2 Net 2 Port 22
Blade No 3 Nic 3 Net 1 Port 8 Blade No 8 Nic 3 Net 1 Port 23
Blade No 3 Nic 4 Net 2 Port 8 Blade No 8 Nic 4 Net 2 Port 23
Blade No 3 Nic 5 Net 1 Port 9 Blade No 8 Nic 5 Net 1 Port 24
Blade No 3 Nic 6 Net 2 Port 9 Blade No 8 Nic 6 Net 2 Port 24
Blade No 4 Nic 1 Net 1 Port 10 Blade No 9 Nic 1 Net 1 Port 25
Blade No 4 Nic 2 Net 2 Port 10 Blade No 9 Nic 2 Net 2 Port 25
Blade No 4 Nic 3 Net 1 Port 11 Blade No 9 Nic 3 Net 1 Port 26
Blade No 4 Nic 4 Net 2 Port 11 Blade No 9 Nic 4 Net 2 Port 26
Blade No 4 Nic 5 Net 1 Port 12 Blade No 9 Nic 5 Net 1 Port 27
Blade No 4 Nic 6 Net 2 Port 12 Blade No 9 Nic 6 Net 2 Port 27
Blade No 5 Nic 1 Net 1 Port 13 Blade No 10 Nic 1 Net 1 Port 28
Blade No 5 Nic 2 Net 2 Port 13 Blade No 10 Nic 2 Net 2 Port 28
Blade No 5 Nic 3 Net 1 Port 14 Blade No 10 Nic 3 Net 1 Port 29
Blade No 5 Nic 4 Net 2 Port 14 Blade No 10 Nic 4 Net 2 Port 29
Blade No 5 Nic 5 Net 1 Port 15 Blade No 10 Nic 5 Net 1 Port 30
Blade No 5 Nic 6 Net 2 Port 15 Blade No 10 Nic 6 Net 2 Port 30
22
Intelligent Blade Panel Module
Features of the IBP Module Introduction
2.2.2 Status of LEDs
The front panel contains light emitting diodes (LED) that indicate the status of links, and IBP diagnostics.
Port LEDs
Each of uplink port has two LED indicators.
One Gbe Port LED definition:
LED Color Function
LED-A
(Speed)
LED-B
(Link/Activity)
Orange Port Link at 1000 Mbps
Green Port Link at 100 Mbps
Off Port Link at 10 Mbps
Yellow Network Link
Yellow Blink Network Activity
Off No Network Link or port disable
Power, Manage of LED indicator:
LED Color Function
TOP Green Power LED
BUTTOM
Green Identify LED
System LED
There is one IBP Module system LED with dual functions, controlled by MMB for error status reporting and blade identification. Different flashing frequencies are used to indicate the different functions. There are two functions, identification and error reporting, with identification having a higher priority than error reporting.
NOTE: If there is an error and the identification function is activated, the LED still functions as
an identification LED. The LED can only be disabled by the MMB with a 255 seconds timeout. If an error is happening, the LED for error reporting will always be flashing and cannot be turn off. The following table describes the system LED indications.
2.3 Features and Benefits
2.3.1 Connectivity
l
30 internal Gigabit ports for easy network integration of your server cards
l
l
23
12
external 1000BASE-T Gigabit ports for uplinking to the corporate network
Support for auto MDI/MDI-X on external ports allows any connections to be made with
Intelligent Blade Panel Module
Features of the IBP Module Introduction
straight-through cable (with auto-negotiation enabled)
l
Auto-negotiation enables each port to automatically select the optimum speed (10, 100
or 1000 Mbps) and communication mode (half or full duplex) if this feature is supported by the attached device; otherwise the port can be configured manually
l
IEEE 802.3ab Gigabit Ethernet compliance ensures compatibility with standards-based
2.3.2 Performance
l
Transparent bridging
l
Aggregate bandwidth up to
l
Switching Table with
l
Filtering and forwarding at line speed
l
Non-blocking switching architecture
2.3.3 Management
network cards and switches from any vendor
12
Gbps
16K
MAC address entries
l
Telnet, SNMP/RMON and Web-based interface
l
Multicast Switching based on IGMP (Internet Group Management Protocol) Snooping and
Multicast Filtering
l
Broadcast storm suppression
l
Link aggregaton
l
Management access security provided with username/password, and SNMP community
names
24
Intelligent Blade Panel Module
p
l
Telnet, SNMP/RMON and Web-based interface
l
Multicast Switching based on IGMP (Internet Group Management Protocol) Snooping and
Multicast Filtering
l
Broadcast storm suppression
l
Link aggregaton
l
Management access security provided with username/password, and SNMP community
names
Notational Conventions
2.4
Notational Conventions
Introduction
The meanings of the symbols and fonts used in this manual are as follows:
I
CAUTION!
!
“Quotation marks”
Pay particular attention to texts marked with this symbol.
to
Failure system,
indicate names of chapters and terms that are being em
This symbol is followed by supplementary information, remarks and
observe this warning endangers your life, destroys th
hasized
tips.
25
Intelligent Blade Panel Module
Ta r g e t Group
2.5
Target Group
Introduction
This manual is intended for those responsible for installing and configuring network connections. This manual contains all the information required to configure the IBP.
26
Intelligent Blade Panel Module
Technical Data
CSA
950
2.6
Technical Data
Introduction
Electrical data
Operating voltage
Maximum current
National
Product safety
Electromagnetic compatibility
and international standards
Interference emission
Harmonic current
flicker
Interference immunity
+12 VDC @ 3 A max
11 A max @ 3.3 VDC
IEC 60950 / EN 60950 / UL 1950,
22.2 No.
FCC class A
Industry Canada class A EN60005-2 EN60005-3
VCCI class A
AS / NZS 3548 class A
EN 55022
EN 6100-3-2 JEIDA
class
A
CE certification to EU directives:
Dimensions
Length
Height
242 mm
110 mm
EN 61000-3-3
EN 55024,
73/23/EEC (low voltage directive)
89/336/EEC Compatibility )
-
-
(Electromagnetic
27
Intelligent Blade Panel Module
Technical Data
Introduction
Enviro nmental conditions
Environment class 3K2
Environment class 2K2
Temperature:
– Operating (3K2)
– Transport (2K2)
DIN IEC 721 part 3-3
DIN IEC 721 part 3-2
0 °C .... 50 °C
-40 °C .... 70 °C
Humidity 10 ... 90%
Condensation while operating must be avoided.
28
Intelligent Blade Panel Module
Introduction to
IBP Network Planning
3 Network Planning
3.1
Introduction to
The
Intelligent Blade Panel M
connecting administrative effort and network skills required to connect to the network are minimized. The number and type of configuration options on the complexity and to minimize the impact on upstream networking devices.
multi-linked becomes as easy as connecting a single server to the network.
the PRIMERGY BX600 Blade Server systems to the network infrastructure. The
The
IBP
requires basic administration tasks similar to those required to connect a single
server to the network. Connecting the Blade Center with up to ten server blades
IBP
odule (IBP) provides a simple Ethernet interface option for
IBP
are restricted to reduce the initial setup
The default network configuration of the
Area
Network (VLAN). All of the uplink ports in each Port Group are aggregated together into a
IBP is
consists of a single, untagged Virtual Local
static Link Aggregation Group (LAG, or trunk group), which is fully compatible with Cisco Ether Channel prevent network loops, since the uplink ports act as a single link.
technology. This configuration eliminates the need for Spanning Tree Protocol to
The
IBP
provides improved network reliability. All of the uplink ports in each Port Group
participates
in a
static LAG, so if a link fails, the existing traffic is redirected to the other links.
The
IBP
(10/100/1000
software permits the copper TX uplink ports to auto-negotiate the speed
Mbps), duplex (full/half) and flow-control settings of each link (the default set- ting). You can also fix these port characteristics to specified values. All of the uplink ports in each Port Group must be configured to the same port characteristics.
With Network Adaptor Teaming configured on the server blade Ethernet NIC, the servers can maintain redundant links to multiple enhanced when ware
reliability. The L2 Failover option allows the
all of its external uplinks are inactive. This causes the Network Adaptor Teaming soft-
to
failover to the other
IBP
(s) in the Blade Server Chassis.
IBP
within the Blade Sever chassis to provide
IBP to
disable the server-blade ports
29
Intelligent Blade Panel Module
Loading...
+ 258 hidden pages