beautypg.com

Configuring the enhanced cluster features, Enhanced cluster feature overview – H3C Technologies H3C S3600 Series Switches User Manual

Page 820

background image

1-16

To do…

Use the command…

Remarks

Return to system view

quit

Return to user view

quit

Switch between management
device and member device

cluster switch-to
{ member-number |
mac-address H-H-H |
administrator }

Optional

You can use this command
switch to the view of a member
device and switch back.

Configure the MAC address of
the management device

administrator-address
mac-address name name

Optional

By default, a switch does not
belong to any cluster.

Trace a device through MAC
address or IP address

tracemac { by-mac
mac-address vlan vlan-id |
by-ip
ip-address } [ nondp ]

Optional

Available in any view

Configuring the Enhanced Cluster Features

Enhanced cluster feature overview

1) Cluster topology management function

After the cluster topology becomes stable, you can use the topology management commands on the

cluster administrative device to save the topology of the current cluster as the standard topology and

back up the standard topology on the Flash memory of the administrative device.

When errors occur to the cluster topology, you can replace the current topology with the standard

cluster topology and restore the administrative device using the backup topology on the Flash memory,

so that the devices in the cluster can resume normal operation.

With the display cluster current-topology command, the switch can display the topology of the

current cluster in a tree structure. The output formats include:

z

Display the tree structure three layers above or below the specified node.

z

Display the topology between two connected nodes.

The topology information is saved as topology.top in the Flash memory to the administrative device.

You cannot specify the file name manually.

2) Cluster device blacklist function

To ensure stability and security of the cluster, you can use the blacklist to restrict the devices to be

added to the cluster. After you add the MAC address of the device that you need to restrict into the

cluster blacklist, even if the cluster function is enabled on this device and the device is normally

connected to the current cluster, this device cannot join the cluster and participate in the unified

management and configuration of the cluster.

This manual is related to the following products: