Force10 MXL - stack or do not stack
Hi guys,.
If the availability is the most important thing, trunk or battery MXL rocking?
I like simplified management, ability to balance the load on several links but I am concerned about uptime during the upgrade firmware (5-10 minutes?) and the possibility of a total interruption of the battery breaks.
On the other hand Force10 perhaps more capable stacking that for example. 6224 switches, I had a lot of problems of overlap with.
Forgive me if this is the wrong place to ask, but I couldn't find a Force10 forum? :-)
Thank you
Respect of
Kristoffer
The MXL switches support Virtual Link Trunking (VLT) later this year, which will solve this problem.
Tags: Dell Switches
Similar Questions
-
Force10 MXL - VLAN is not routing.
I'm trying to set up a simple installation Layer 3 on stacked MXL Force10 switches.
ManagementEthernet 0/0 90.21.0.175 YES manual upward, upward
VLAN 33 10.1.33.1 YES manual upward, upward
VLAN 101 10.1.32.1 YES manual upward, upward
VLAN 103 192.168.103.1 YES manual upward, upwardMXL-stack #sho vlan
Q: U - no identified, the T - tag
Ports Status Description Q NUM
* 1 U active Te 0/3-6, 11-14, 17-23, 25-32
U Te 1/3-6, 11-14, 16-23, 25-31EENET active 33 U Te 1/15<>
101 production Dynamics network T Te 0/1-2, 7-8, 15-16, 24, 44<==10.1.33.x>==10.1.33.x>
T Te 1/8,24,32
External network active 103 T Te 0/8,16,24<==192.168.103.x>==192.168.103.x>
T Te 1/1-2, 8, 24, 32
U Te 1/7Route ip MXL-stack #sho
Destination Gateway Dist/metric was last modified
----------- ------- ----------- -----------
C Direct 10.1.32.0/24, Vl 101 0/0 3d2h
C Direct 10.1.33.0/24, Vl 33 0/0 00:13:51
C Direct 192.168.103.0/24, Vl 103 0/0 3d1hBattery Switch MXL
Ping result message
192.168.103.13 fail
10.1.32.21 success
10.1.33.10 success192.168.103.13 - default gateway is 192.168.103.1
Ping result message
192.168.103.1 success
192.168.103.11 success
10.1.32.1 success
10.1.32.21 fail
10.1.33.1 fail - 192.168.103.1 inaccessible Destination network10.1.32.21 - default gateway is 10.1.32.1
Ping result message
192.168.103.1 success
192.168.103.13 fail
10.1.33.1 success
10.1.33.10 success10.1.33.10 - default gateway is 10.1.33.1
Ping result message
192.168.103.1 success
192.168.103.13 fail
10.1.32.1 success
10.1.32.21 successI have my hosts on my different threads pointed to the stack for their default gateways, and I want my MXL battery to switch packets at layer 3 connectivity between subnets. The part which I stem is why is my vlan 103 does not communicate? I can't even he ping of the MXL battery that has the vlan on it. This should be the easiest thing in the world, but it is a failure. Someone has an idea?
I am pleased to hear that the routing has started working. I agree, it seems strange that would not work one day and then work the next day. Were all devices removed or added to the network between the two days? Or any small changes to config?
To remove a configuration you issue clear config
http://www.force10networks.com/CSPortal20/TechTips/0080_HowDoISaveMyConfiguration.aspx
The latest firmware is 9.3.0.0. Which provides overall improvements and would be calling and updated.
iSupport portal (Web): http://www.force10networks.com/support/
E-mail: [email protected]
Phone (USA and Canada): 866-965-5800
Phone (International): + 1-408-965-5800Can monitor to see if the problem back to the top again.
-
Force10 MXL and blades - mapping of Interfaces
Hello
I know it's a recurring topic but I am facing a strange problem in the last M1000e chassis that I was sent.
According to: mapping is very clear. For example, the first interface of the first plank must be connected via the Midplane to te0/1 (first in the IOM1 interface), but when I set up the battery of the A2 Force10 MXL (just a pile between A1 and A2) became the master so I changed the priorities to ensure that A1 is the master. Once this is done, I realized that the first interface of the first blade was linked to the Te1/1, the first IOM2 interface. Is it possible to change this? I have several chassis and I want to set all the same way...
Thank you!
What servers are used? Just to be clear, while MXL in A2 was the master, the LOM 1 port connected to 0/1 and the LOM 2 port connected to 1/1? Then when you changed a switch to A1, now port 1 shows that 1/1 LOM and LOM 2 port connected to 0/1?
The ports are all physically defined by the M1000e chassis.
Have you tried:
-unstacking switches
-Can ensure that ports appear correctly so that not stacked.
-Set the priority and then put.
-Check the enumeration. -
Connect to Force10 MXL N4032 using cables QSFP + DA 40 G
Hello
I'm trying to connect a N4032 switch to a switch chassis Force10 MXL using QSFP + modules and a DA 40 G cable. Now, the problem I have is that when I plug the cable 40G QSFP DA I don't have a link, both switches show that the QSFP + optical has been inserted, and that the perspective is supported on two models of switches.
The MXL is on the firmware 9.8.0.0 and the N4032 on 6.2.1.6.
QSFP map show slot on the show N4032 command:
Power admin card configured
ID of the slot status State Pluggable model
----- ------ ------- ------- -------------------------------- ---------
1/0 Enable full activate Dell N4032 number of networking
1/1 full Activate activate card QSFP Dell YesOptics QSFP + is connected to the port of1/1/1 on the N4032 and returns order status interface to see more:
Physical admin link link LACP Flow physics
INTF Type Mode Mode status trap Mode Mode
--------- ------ ------- ---------- ---------- ------ ------- ------- -------
TE1/0/1 Select Auto 10 G full turn off Active
TE1/0/2 Select Auto 10 G full turn off Active
TE1/0/3 select Auto 10 G full turn off Active
TE1/0/4 turn down turn off idle
TE1/0/5 turn down turn off idle
TE1/0/6 turn down turn off idle
TE1/0/7 activate Auto 10 G full activate deactivate Active
TE1/0/8 enable Auto 10 G full activate deactivate Active
TE1/0/9 turn down turn off idle
TE1/0/10 turn down turn off idle
TE1/0/11 select Auto 10 G full turn off Active
TE1/0/12 enable Auto 10 G full activate deactivate Active
TE1/0/13 turn down turn off idle
TE1/0/14 turn down turn off idle
TE1/0/15 turn on Auto 10 G full activate deactivate Active
TE1/0/16 enable Auto 10 G full activate deactivate Active
TE1/0/17 enable Auto 10 G full activate deactivate Active
TE1/0/18 turn down turn off idle
TE1/0/19 turn down turn off idle
TE1/0/20 turn down turn off idle
TE1/0/21 Enable Auto 1000 Full Up enable disable Active
TE1/0/22 Enable Auto 1000 Full Up enable disable Active
TE1/0/23 Enable Auto 1000 Full Up enable disable Active
TE1/0/24 turn down turn off idle
Of1/1/1 turn down turn off idle
Of1/1/2 active 40 maximum G low turn off idle
TE1/1/1 active 10G full detach turn off s/o
TE1/1/2 Active 10 G full detach turn off s/o
TE1/1/3 active 10G full detach turn off s/oAs you can see that switch captures yet the speed of the optics. Now if I take the same cable and plug it between the 2 x N4032 switches - ports immediately show a link.
Newspapers of the MXL show optics QSFP Fo0/33, it shows the status of the admin of the ports as upward, but the State of the interface is down. Now if I take the same cable of DA and plug it between the 2 MXL in the chassis, the interface state changes until almost immediately. The two MXL is configured in a VLT, but I tried to get the link to the top with the VLT and without the VLT, does anyway.
This shows that cables of DA are fully functional, the ports I plug are functional - even when one end of the cable plugged into the N4032 and the other end in the MXL Force10, the link is not started.
I have the show out of all 4 switches, if necessary technical support.
Thank you
Dave
This problem has been resolved with the help of Technical Support.
It was a mismatch of negotiation between switches.
The fix has been add to the config of the port on the Force10 MXL:
interface fortyGigE 0/33
INTF-type cr4 autoneg
-
Then a Force10 MXL blade handle no FCoE traffic?
Hello. I inherit a M1000e with few blades of the Force10 MXL switch installed. The chassis has no other 10GBASE-T switches. Since I have no plans on using FCoE, a Force10 MXL can be used for standard Ethernet (non-FCoE) traffic? Or do I have to buy another switch?
Thank you.
Absolutely, to see the second page of the data sheet. It contains additional information about the available modules, how internal traffic is manipulated and external.
The manuals are a great place to start. There is that a starter guide to help set up initial, and then a CLI and user guide to help configure additional features.
Let us know if you have any other questions.
-
DCB - Force10 MXL and Equallogic PS6210 - worth it or not?
Hello all
I have a new 3-blade M620 virtualization environment, 2 x MXL Force10 switches and 2 x Equallogic PS6210 - there is the possibility of using DCB - is it useful to configure DCB, will I get the gains and better stability, or for a small environment should I just use the configuration standard iscsi?
Ideas or alternative options gratefully received.
Thank you
Hello
If the switches are dedicated for iSCSI use, then there is no advantage to the use of DCB. DCB in itself does not have iSCSI faster. I just made sure non-iSCSI traffic doesn't interfere by providing iSCSI with a higher priority. All other traffic is going in a "lossy" class of service.
Also, you will need DCB converged network adapters to use BCD on the hosts. Most of the iSCSI software adapters do not support DCB.
Kind regards
-
Force10 S25 - stacking. Is the required stacking module?
I would like to know if the S25N can be stacked using the buit of SFP ports in the chassis, or acquired the required stacking module?
So that to stack switches, stackable modules must be used. Here is a good guide on the process.
http://www.force10networks.com/CSPortal20/TechTips/0057_HowDoIStackSSeriesUnitsTogether.aspx
-
My MXL blades have been set up by Dell Technology Services and work fine, but I would like to make a few changes now and not being Setup is not a network engineer, I have a problem with the docs I could find on the config of Force 10. Specifically, I want to do 3 things:
(1) change the SSH root password
(2) remove a port to a LAG (port channel) group
(3) add a new VLAN to some ports in the switch, including the one I just removed the lag, but abandon the SHIFT since the new VLAN
Can someone point me to a doc that explains how to do this kind of things?
Also, is it possible to access the console somehow by SSH in the CMC? I swear I've seen Dell Tech Services people who do somehow, but I don't know how they did it. Maybe I misunderstood what they were doing. It would be nice to not have the addresses of IP config exposed and control access through the permissions of CMC.
Thank you.
Hi amunter,
You can SSH to the CMC racadm commands and use to set it up. You just need to use PuTTY or other terminal program and go to the CMC host name or IP address.
You should be able to change the password in this way
(Force10) > activate
(Force10) #config
(Force10) (Config) #username admin passwd un_mot_de_passe
You can remove a port of a port channel in the channel of the port and using the command config no channel-member interface
Page 395
You can assign a VLAN to a port with the command interface vlan id - vlan
Page 910
-
MXL 990 Microphone will not install on Vista 64
I recently bought a MXL 990 USB, but Windows Vista 64 microphone it won't install. The microphone does not a driver and it does not work , because it installs instantly on my XP system. I have consulted the MXL TEC and searched the Web and all the pages of Microsoft for answers, but found nothing. I ran software Microsoft Fix It, but it found no problem. My system updates automatically, but I searched some other updates for audio drivers without success. Again,that what mike does not require a pilot , however, the system requires one tries to find an and cannot (because they do not exist and are not necessary with this mike). Setting procedure is not possible because the microphone is not recognized and does not present as an option. Help, please!
Please try plugging a "known to work with Vista" USB Audio device.
If it is recognized, without disconnecting, plug the MXL 990 and see
If Windows will recognize and install properly as a microphone. If so,.
the first device can be disabled as a device audio, but not disconnected.
She needs to stay connected while you use the MXL 990; Unplug the unit
the other device will cause the mic to continue to appear as a good
device, but it will stop working, and no audio program will see his
presence. If you return to this topic and see the fix, please report it
back and tell me if it worked for you, because it's a workaround that
solved my problem of Win 7 990.
-
stacking vs vlt - S4810 and MXL 10/40
Hello
I looked through the battery vs vlt article http://hasanmansur.com/2012/10/15/force10-s4810-stacking-vs-vlt/ and curious to know what Dell recommends for MXL and S4810 going on these days. I guess that even if these are the different types of switches, configuration, restrictions and features etc are similar.
It seems that the firmware update is the key of the differential between the stack and the vlt. So update fw would get all the fabric on the configuration of the battery, but what of SUVs? VLT works very well when the fw update while peers are actually on different version?
Thank you
as much as I saw it, the only drawback is updated firmware that should be all the fabric on the configuration of the battery down. On the other hand, how vlt works during the upgradeHowever of the firmware in the different version update
Regarding the VLT upgrade process, I was wrong, you do the second job first, then the primary. Just be sure to check that OTF notes for all stages of development.
With a battery, you apply the image to the master and then propagate the upgrade of the master to other switches. This is the entire stack must restart to activate the new image.
-
Configure access ssh_key based switch MXL. Not "based on the host."
I have read the documentation and cannot get to a cohesive whole procedure in order to get the simple key-based authentication to work.
The docs separate this task in a wide variety of measures in order to activate authentication "host-based", but I don't want to. I use two laptops and 2 different offices in various locations. "Host-based" is not going to work for me. I need an authentication of purely "function key". You need an example of what involved specific steps and the order to execute them. I find that this process is pretty simple on the HP based including the new Arubas switches. But this MXL documentation is difficult to decipher.
It seems as it is a one-at-a-time operation, but it is more advanced and allows you to better separate, and so I'm happy with it so far.
1. create the user with administrator privileges
SN - MXL (conf) "JUtilisateur" somepass privilège 15 password #username2 enable authentication rsa
SN - MXL (conf) ssh rsa authentication #ip activate3. copy your public key in the MXL (pull)
SN - MXL #copy scp: flash:
Address or name of the host remote []: 172.16.11.10
Port number of the server [22]:
Source file name []:.ssh/juser_rsa.pub
User name to host remote login: "JUtilisateur"
Password to the remote to connect host:
The destination [juser_rsa.pub] file name:
!!
403 bytes copied successfully4. now log in as user, and run:
SN - MXL #ip ssh juser_rsa.pub my authorized key of rsa authentication
RSA keys added to the list of authorized Keys user.
Delete the juser_rsa.pub file: (yes/no)? Yes5. I had to create the file ~.ssh/config with the following statement:
host mxl
Host name 172.16.11.1
The user juser
IdentityFile ~/.ssh/juser_rsaThis means that the PRIVATE key is referenced. Note: Make sure that your config file is has 644 permissions.
6 test
$ ssh mxl
The option of SupportAssist EULA acceptance has not been selected. SupportAssist
can be activated once the EULA of SupportAssist has been accepted. Use of the:
command "Activate support-assist" to accept the EULA and activate SupportAssist.MON-MXL #.
And I am. Either way, I want to get rid of that little nag, as this MXL stack is not in a country supported by DELL. Anyone know how to remove the horse?
-
LAG, VLANS and Trunking Force10
I'm with vSphere and I a vSwitch with several groups of ports configured, including 2 assigned to VLAN ID and a network of management with no Vlan ID. This vSwitch will use physical NIC grouped to route this traffic to a physical Dell Force10 MXL switch. My understanding of the standard networking, a trunk port must be configured and VLAN must be added to this as labeled trunk port, while the traffic that has no Vlan ID is left unidentified and by default is the vlan by default (usually Vlan 1). The attached picture is the topology I and I need to make this work, but do not have a lot of experience with Force10 switches and so far, it looks very different. In addition, if it is relevant, the external switch in the diagram is actually 2 Force10 switches separated stacked, and there are two connections to the other switch (currently a 6224 not managed) between the firewall and F10s, which is a separate issue - those must be configured as an OFFSET on the F10s and the 6224? One or the other? Or? If anyone can help with the configuration for this topology? Please help me out here. Thank you!
Currently, the best method to get assistance and recommendations with Force10 equipment, is through the Force10 support group. They will be more quickly and accurately help you with this inquiry.
www.force10networks.com/.../ContactSupportGen.aspx
Watching a white Force10 pages looks like a trunk can be configured with these commands.
Configure VLANs tagged for an Interface of Port Trunk
#configurer MXL2 MXL2 vlan (conf) #interface 11
MXL2 (conf-if-vl-11) #tagged tengigabitethernet 0/1
MXL2 (conf-if-vl-11) #no shutdown
MXL2 (conf-if-vl-11) #exit
MXL2 (conf) #interface vlan 12
MXL2 (conf-if-vl-12) #tagged tengigabitethernet 0/1
MXL2 (conf-if-vl-12) #no shutdown
MXL2 (conf-if-vl-12) #exit
MXL2 (conf) #exit MXL2 #.
en.Community.Dell.com/.../download.aspx
Thank you.
-
VLANning questions about blades MXL
Hello
I have a new M100e with a SAN PS4110xs case, a few servers blade and two switches Force10 MXL (switches and SAN on fabric)
I put it all in place and works fine, but using the default VLAN for all
I want to connect the switches to a Juniper EX3300 via SFP ports + and send the subnet SAN out so that I can connect remotely to the IP address of the EqualLogic for VMM integration management
However, every time I try to put SAN ports in a VLAN separate-, before even that I look into the chutes for the Juniper - I lose all connectivity on the San.
I created a new VLAN (VLAN120), but as soon as I set the ports inside they cannot ping each other.
int vlan120
Tagged te0/1 (this is the port of SAN)
Tagged te0/12 (it is a single server)
Tagged te0/16 (that's the other server)
as soon as I do that I lose all connectivity to the San and server cannot ping each other via the iSCSI network.
I tried to use 'no label' instead of 'tag' with the same effect.
The VLAN is active (non-stop)
I am at a loss for what is the question.
Any help gratefully received.
Select this option.
I understood the question - I got 2 trunk in the Juniper VLAN120 links - as soon as I disabled the second interface everything arises in life
Now I need to try to find a way to implement a SHIFT between the two MXL in the stack and a Juniper ex3300 - I managed to get the connectivity that I need, but with only a single link - as it is a remote site I want redundancy :-)
-
Force10 vlan exclusivity?
I had a whale of a Saturday in my COLO today trying (and failing) to complete what would have been a very simple task. I still don't understand why this happened, or how to solve this problem, but it's here.
Installation of the equipment:
Stacked Force10 MXL going on inside a M1000e chassis with cluster VMware ESXi 5.5 inside, supported by all storage Equallogis M4001x.
3 servers blades inside all NPAR running to copy all links are marked.
I've been running 4 VLAN for always: 1. internal networking for virtual hosts. 2 Vmotion ISCSI 3. 4. external connectivity with other hosts on outside LAN subnets. It's good and dandy. I need to set up connectivity to the Internet now and have added a 5th VLAN to my battery and label ports properly wear 'inner' connectivity to the virtual machine that needs the external connection. Simple. Now:
VLAN 10. Is Vmotion
VLAN 20 is iSCSI
VLAN 100 is my internal LAN
VLAN 200 is external LAN subnets
VLAN 300 is the Internet,
Here it comes... when I plug the cable (VLAN300) between my Internet switch MXL Internet... HOORAY!
AND... (VLAN200) is inaccessible. Now, I can SSH into my M1000e, but can't reach it from inside the organization.
Until - I unplug the cable to the VLAN200 and then plug plug back then... VLAN200 becomes available, but VLAN300 is now inaccessible.
I tested this 9 ways of Saturday night today, and this is what I learned. I can't find any logging on MXL battery that will give me a clue as to why this is happening, nor can I explain myself. I have antique HP switches that can handle this type of connectivity, but these interconnections of Force10 edge-impossible? What gives?
Is there a parameter of maxvlans on those things that just won't allow these two VLANs internal and external to exist together?
Has anyone seen something like this? I plan on calling DELL support on this first thing Monday if I can't get some help here. Thanks for your comments that you leave me.
I just sent an email, you can reply to the email with the switch configs.
Thank you
-
Configuration of MXL port for PS-M4110 storage array
Dear all,
I have to configure my Force10 MXL GbE 10/40 for PS-M4110 storage array. I have two PS-M4110 connected to ports 0/13 and 0/15. I have configured the following way.
FTOS (conf) # don't activate any dcb
FTOS (conf) # enable iscsi
Configuring the ports 0/13 and 0/15 (ditto)
OTF (conf-if-you-0/15) con #sho
!
interface TenGigabitEthernet 0/13
no ip address
MTU 12000
hybrid portmode
switchport
FlowControl rx tx off
spanning tree bpmh edge-port
spanning tree rstp edge port
spanning tree portfast 0
spanning tree pvst edge-port
Profile-compellent iSCSI
no downtimeI just need to know if these settings are correct. And what I have to configure iscsi target (3 260 860) ip address of the port-(A.B.C.D) as well? If Yes, then what IP should be given here? Group-IPaddress?
I used this guide as a reference.
http://Dell.to/1uxp4LW
And it seems that you have everything in place. The guide recommends not to use iscsi optimization for large san deployments. You can browse the guide too, just to double check.
Maybe you are looking for
-
which driver to download for my hp probook 430 g1?
which driver for wireless download for my hp probook 430 g1? in support, there are a lot of what I can download? I have a mediatek mt7630e
-
I work in a major retailer of telephone. I don't know if there are obvious information than i or my manager have not yet been given, but customers keep entering passwords on phones, which leads to becoming them disabled. Of course, that restore us
-
Fingerprint Software does not work with Firefox after an update
Hello the first thread that I started this topic is closed, so I have to make a new... As mentioned here http://forums.computers.Toshiba-Europe.com/forums/thread.jspa?threadID=25776&TSTART=15 Fingerprint Software no longer works with Firefox after up
-
ThinkPad L520 CD/DVD drive recognize or write to disks
Hi all. I hope that as a beginner I'm posting in the right place and not on a topic already discussed. I had my L520 for over a year now and had not already need to burn stuff on the disc, so I don't know if my problem is new or old. Essentially the
-
When I move the single window to see another he is trolling of the window that is moved. How can I stop this?