enterprises hope to deploy a high-intelligence, high-availability, and high-reliability storage network (SAN) on the basis of cost control ), or, if you want to extend your SAN infrastructure from an entry-level network to enterprise-level deployment, try to protect your SAN infrastructure investment. Cisco's upcoming CiscoMDS9100 series of multi-layer smart Optical Fiber switches will make customers' wishes a reality.
CISCO mds FC optical fiber switch configuration reference(1) There are several concepts that must be clarified (different from brocade ):(1) brocade divides zones directly. While mds divides zones under vsan, mds can divide several vsan first, and each vsan includes several zones.(2) brocase: the default port is open,
) and connect the launch end of the testing terminal to the network cable at one end of the computer, then, use the receiver to test the network cable of the optical fiber switch of the Internet cafe one by one, and find out the end of the signal to connect to the indicator. The end is mounted to the number tube and stabbed into the status of the optical fiber
The implementation of the multi-port Cisco switch module is a common problem. How to configure the Cisco switch module, any problems related to ports will be fully resolved in this article.
Cisco
Document directory
1. Collect the WWN address of the SAN Switch:
2. It takes 5 steps to register licnese from the official brocade website.
3. Import the license key:
Technorati labels: brocade, brocade, San, optical fiber switch, port Activation
Port activation process
I have previously reprinted an article about port activation of the brocade San optical fiber switch. You only need to use a direct connection to connect the NIC AND THE brocade switch.The IP address of the computer is set to 10.77.77.0. Enter the default IP address 10.77.77.77 in the browser to directly configure the vswitch.There is no random network cable, onl
(config) #no monitor session 1Switch (config) #endSwitch#wrSwitch#show MonitorNo SPAN configuration is present in the system.3. Other(1) Port image filtering, port mirroring can do filter.Monitor session session_number Filter VLAN Vlan-id [, |-]* * Specifies which VLANs belong to the traffic that the source port is entering, and can be emitted from the destinati
Port security Configuration for the Cisco PT Simulation Experiment (7) switchExperimental Purpose : Master the port security function of the switch, control the user's secure accessExperimental Background : The company network adopts the personal fixed IP Internet program, in order to prevent the company internal User
In the middle of a Cisco switching network, how do I find out which port of the switch is connected to the IP address of a machine? The most convenient and quick way is to use the User tracking function of the CiscoWorks 2000 LMS network management software. The graphical interface is clear at a glance.
If you do not have this software, you can use the following
The port rate between switches and switches, between switches and routers, does not meet the actual rate and requires tying more than two ports together to load balance and prevent single points of failure.1. Select Switch SW2960 to configure the F0/1 and F0/2 port modes to truck#conf Terminal into privileged mode#interface Range Fa0/1–2 used to bind a set of po
I will talk about two tips, one about monitoring switch port traffic and the other about store value.
1. Monitor switch port traffic
Switch monitoring document in the production environment on the Internet. Therefore, it is complete, and a key knowledge is interspersed in th
Cisco switch port broadcast storm settings are more practical. When a port receives a large number of broadcast, unicast, Or multicast packets, a broadcast storm occurs. Forwarding these packets will slow down the network or cause timeout. Using broadcast storm control on ports can effectively avoid network paralysis c
We have explained a lot about the configurations of CISCO switches. Here we will mainly explain the port security configurations of CISCO 3550 switches. Scenario: There is a CISCO3550 switch in a certain unit. For the sake of network security, the security requirements for some ports are high, that is, only the specifi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.