Lenovo Networking Best Practices for Configuration and Installation

Total Page:16

File Type:pdf, Size:1020Kb

Lenovo Networking Best Practices for Configuration and Installation Front cover Lenovo Networking Best Practices for Configuration and Installation Benefit from the expansive Discover design strategies to knowledge of Lenovo Networking maximize network performance experts Learn about the latest switching Implement switch security and and routing features management features Scott Irwin Scott Lorditch Ted McDaniel William Nelson Matt Slavin Megan Gilge Lenovo Networking Best Practices for Configuration and Installation August 2015 SG24-8245-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Last update on August 2015 © Copyright Lenovo 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract Contents Notices . vii Trademarks . viii Preface . ix The team who wrote this book . ix Comments welcome. .x Chapter 1. Introduction. 1 1.1 Network design strategy . 2 1.2 Connecting the switches to the network and access nodes . 2 1.3 Lenovo networking switches . 2 1.4 About this book . 3 Chapter 2. Network design and topologies . 5 2.1 Sample topologies. 6 2.1.1 Full mesh topology with Virtual Link Aggregation . 6 2.1.2 Inverted U topology with failover. 7 2.1.3 Stacking: Full mesh. 9 2.1.4 Flex System Interconnect Fabric. 12 2.1.5 Traditional STP design with blocking . 14 2.2 Other design considerations . 16 2.2.1 FCoE with vLAG . 16 2.2.2 Isolated management network . 25 2.2.3 vLAG versus Stacking. 28 2.2.4 Easy Connect . 28 Chapter 3. Layer 1 technologies . 33 3.1 Considerations for cabling and transceivers . 34 3.1.1 10/100/1000 Mb and 1 Gb-only ports . 34 3.1.2 10 Gb connections . 35 3.1.3 40 Gb connections . 37 3.1.4 Transceiver considerations . 39 3.2 Considerations for low-level interface configurations . 41 3.2.1 Speed, duplex, and auto negotiation settings . 41 3.2.2 Flow control. 42 3.2.3 Jumbo Frame considerations . 42 Chapter 4. Layer 2 technologies . 47 4.1 Virtual Link Aggregation Group considerations. 48 4.1.1 Introduction to vLAG . 48 4.1.2 Understanding packet flow in a vLAG environment . 48 4.1.3 Understanding vLAG Tier IDs . 56 4.1.4 Importance of a proper health check network with vLAG . 57 4.1.5 ISL considerations . 58 4.1.6 Other considerations for vLAG . 59 4.2 Stacking . 60 4.3 VLAN considerations. 63 4.4 Private VLANs. 65 4.4.1 Why use private VLANs . 66 © Copyright Lenovo 2015. All rights reserved. iii 4.4.2 Full Private VLAN and Private VLAN Edge. 66 4.4.3 Private VLANs and STP . 67 4.4.4 Configuring Private VLANs . 67 4.4.5 Private VLANs and UFP . 68 4.4.6 Private VLANs and VLAG . 68 4.4.7 Verifying the Private VLAN . 69 4.5 Virtual Fabric Mode and UFP . 69 4.6 Layer 2 failover . 70 4.7 IGMP Snooping considerations. 70 4.8 Link aggregation . 71 4.8.1 Trunk hashing configuration . 73 4.8.2 Options for LACP configuration . 74 4.9 Spanning Tree Protocol . 78 4.9.1 STP fundamentals . 78 4.9.2 How STP is implemented on the Lenovo switches . 81 4.9.3 Loop Guard . 83 4.9.4 Lenovo port-specific Spanning Tree 0ptions. 84 4.9.5 Changing STP standards obsoletes some functions . 85 4.10 Storm Control considerations . 85 4.11 Switch Partition . 86 4.11.1 SPAR restrictions . 87 4.11.2 Configuring SPAR. 87 4.12 BootP and DHCP relay . 88 4.12.1 Layer 3 single switch. 88 4.12.2 Layer 3 with VRRP and vLAG. 90 4.13 Flex System Interconnect Fabric. 92 Chapter 5. Layer 3 technologies . 99 5.1 OSPF with VRRP and vLAG . ..
Recommended publications
  • Press Release May 25, 2021
    Press Release May 25, 2021 NEW PAN-INDUSTRY ECO RATING SCHEME LAUNCHED FOR MOBILE PHONES • Deutsche Telekom, Orange, Telefónica, Telia Company and Vodafone unveil new consumer labelling to identify more sustainable mobile phones • Eco Rating to roll out across Europe from June 2021, including phones from 12 vendors Five of Europe’s leading mobile operators have joined forces to update and launch a new pan- industry Eco Rating labelling scheme that will help consumers identify and compare the most sustainable mobile phones and encourage suppliers to reduce the environmental impact of their devices. The Eco Rating initiative has been created jointly by Deutsche Telekom, Orange, Telefónica (operating under the O2 and Movistar brands), Telia Company and Vodafone to provide consistent, accurate information at retail on the environmental impact of producing, using, transporting and disposing of smartphones and feature phones. Eco Rating will enable operators and their customers to encourage wider rating of phones and demonstrate the demand for more sustainable electronics. A range of new consumer phones from 12 mobile phone brands will be assessed by the Eco Rating initiative, with others expected to be announced in the future. Launch partners include Bullitt Group – Home of CAT and Motorola rugged phones, Doro, HMD Global - Home of Nokia Phones, Huawei, MobiWire, Motorola / Lenovo, OnePlus, OPPO, Samsung Electronics, TCL / Alcatel, Xiaomi and ZTE. Starting from June 2021, the mobile operators will begin to introduce the distinct Eco Rating labelling at point of sale across 24 countries in Europe where they are present. Customers can learn more about the initiative and see how the rating is calculated by visiting a new website at www.ecoratingdevices.com and www.teliacompany.com/ecorating Following a detailed assessment, each mobile phone handset will be given an overall Eco Rating score out of a maximum of 100 to signal the environmental performance of the device across its entire life cycle.
    [Show full text]
  • SL8500 Modular Library System
    StorageTek SL8500 Modular Library System Systems Assurance Guide Part Number: MT9229 May 2010 Revision: L Submit comments about this document by clicking the Feedback [+] link at: http://docs.sun.com StorageTek SL8500 Modular Library System - Systems Assurance Guide MT9229 Revision: L Copyright © 2004, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Encryption Suite
    comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 1 comForte´scomforte’s encryptionencryptio nsuite suite ProtectProtect passwords passwords andand confidentialconfidential applicationapplication data data on on HP HP NonStopE Nonsto psystems systems SSecurCSecurCS Se SecurTNcurTN Se SecurFTPcurFTP Sec SecurLiburLib Secu SecurSHrSH Secu SecurPrintrPrint communication is our Forte comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 2 Overview comForte offers a rich set of products The following diagram shows all products All our products take advantage of the most depending on the protocol you want to together. This diagram may look confusing widely used and accepted security protocols: encrypt. Even for a single protocol (such at first glance, but we do believe that our Depending on the product, connections are as Telnet) we offer different solutions rich set of products allows us to tailor our secured either via SSL (Secure Sockets Layer, depending on your requirements. solutions according to the customers’ now standardized by the IETF as Transport requirements rather than according to our Layer Security – TLS) or via SSH2 (Secure Shell product set. The purpose of this flyer is to protocol version 2). provide an overview of the different products and to help you find the right solution for All our solutions can restrict access to your your requirements. NonStop system to “encrypted only” and also provide some basic firewall capabilities. comforte_Encryption_Suite.qxp_comforte_Encryption_Suite 29.10.17 13:33 Seite 3 Telnet Encryption Many organizations are realizing that using Webbrowser access to NonStop 6530 single, integrated product. SecurTN replaces Telnet over a heterogenous TCP/IP network and 3270 applications and services, TELSERV, thereby eliminating the “256 session results in reduced security: all protective delivering them to users both inside only” limit of TELSERV.
    [Show full text]
  • Memory Lane and a Look Down the Road: China Progressing in NAND but Hurdles Remain
    21 July 2019 | 12:06PM EDT Made in the USA or China Memory lane and a look down the road: China progressing in NAND but hurdles remain Mark Delaney, CFA +1(212)357-0535 | [email protected] Goldman Sachs & Co. LLC Allen Chang +852-2978-2930 | [email protected] Goldman Sachs (Asia) L.L.C. We believe that China’s efforts to enter the global DRAM and NAND markets merit a Daiki Takayama +81(3)6437-9870 | deeper dive into how the memory industries have evolved over time, what impact [email protected] Goldman Sachs Japan Co., Ltd. China’s entry into other commodity tech industries (such as LEDs and solar) has had Toshiya Hari on fundamentals, where we believe the leading China-based memory companies +1(646)446-1759 | [email protected] Goldman Sachs & Co. LLC stand at present with their efforts to enter the market (and the challenges that still Satoru Ogawa +81(3)6437-4061 | exist for entering the market — with GlobalFoundries as an example that [email protected] leading-edge semi production is difficult even for well-funded efforts), and what we Goldman Sachs Japan Co., Ltd. Alexander Duval believe all this means for the stocks of the established memory, drive, and semi +44(20)7552-2995 | [email protected] equipment companies. Goldman Sachs International Timothy Sweetnam, CFA With over $150 bn of semiconductors shipped to China in 2018, per the +1(212)357-7956 | [email protected] Semiconductor Industry Association (SIA), and China domestic semi firms having Goldman Sachs & Co.
    [Show full text]
  • L13, L13 Yoga, S2 5Th Gen and S2 Yoga 5Th Gen User Guide Read This First
    L13, L13 Yoga, S2 5th Gen and S2 Yoga 5th Gen User Guide Read this first Before using this documentation and the product it supports, ensure that you read and understand the following: • Appendix A “Important safety information” on page 69 • Safety and Warranty Guide • Setup Guide Second Edition (October 2019) © Copyright Lenovo 2019. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS- 35F-05925. Contents About this documentation . iii Chapter 4. Accessories . 33 Purchase options . 33 Chapter 1. Meet your computer. 1 Docking station . 33 Front . 1 Front view . 34 Base . 3 Rear view . 35 Left . 5 Attach a docking station. 36 Right . 8 Detach a docking station . 37 Bottom . 10 Connect multiple external displays . 38 Features and specifications . 11 Statement on USB transfer rate . 12 Chapter 5. Secure your computer and information . 39 Chapter 2. Get started with your Lock the computer . 39 computer. 13 Use passwords . 39 Get started with Windows 10 . 13 Password types . 39 Windows account . 13 Set, change, and remove a password . 41 Windows user interface . 14 Use Power Loss Protection function . 42 Windows label . 15 Use the fingerprint reader (for selected models) . 42 Connect to networks . 15 Use face authentication (for selected models) . 43 Connect to the wired Ethernet . 15 Use firewalls and antivirus programs. 43 Connect to Wi-Fi networks. 15 Use Lenovo Vantage . 16 Chapter 6. Configure advanced Interact with your computer . 16 settings. 45 Use the keyboard shortcuts .
    [Show full text]
  • Tab M8 HD for Business + Smart Charging Station Reference
    PSREF Product Specifications Tab M8 HD for Business + Smart Charging Station Reference OVERVIEW 1. Volume button 3. Pogo pin connector (2-point) 2. Power button 4. USB-C 2.0 (data transfer / PD) Notes: • Card slot (not shown on the sample product above) is microSD card slot (WLAN model) or nano-SIM + microSD card slot (WWAN model) Tab M8 HD for Business + Smart Charging Station - September 14 2021 1 of 6 PSREF Product Specifications Tab M8 HD for Business + Smart Charging Station Reference PERFORMANCE Processor Processor Family MediaTek Processor Processor Processor Name Cores Max Frequency Memory Support Processor Graphics MediaTek Helio A22 ARM Cortex A53 Quad-core [email protected] LPDDR3 IMG PowerVR GE-class GPU Operating System Operating System[1] Android™ 9 (Pie) or later Notes: 1. Lenovo® tablets typically receive at least 1 Android OS upgrade cycle. May vary depending on models, countries, regions, retailers or operators. Please contact Lenovo support for more details Graphics Graphics Graphics Type Memory Key Features IMG PowerVR GE-class GPU Integrated Shared - Chipset Chipset MediaTek SoC (System on Chip) platform Memory Memory Type LPDDR4x Storage Storage Support • 32GB eMCP4x on systemboard • MicroSD card, supports FAT32 file up to 128GB, exFAT file up to 2TB Storage Type Disk Type Interface Offering Flash Memory eMMC 5.1 32GB Removable Storage Card Reader Nano-SIM + microSD card slot (WWAN model, supports FAT32 file up to 128GB, exFAT file up to 2TB) Multi-Media Speakers 2 side speakers, optimized with Dolby® Atmos® Microphone
    [Show full text]
  • Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks Phuong M
    CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks Phuong M. Cao, Yuming Wu, and Subho S. Banerjee, UIUC; Justin Azoff and Alex Withers, NCSA; Zbigniew T. Kalbarczyk and Ravishankar K. Iyer, UIUC https://www.usenix.org/conference/nsdi19/presentation/cao This paper is included in the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19). February 26–28, 2019 • Boston, MA, USA ISBN 978-1-931971-49-2 Open access to the Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19) is sponsored by CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks Phuong M. Cao1, Yuming Wu1, Subho S. Banerjee1, Justin Azoff2;3, Alexander Withers3, Zbigniew T. Kalbarczyk1, Ravishankar K. Iyer1 1University of Illinois at Urbana-Champaign, 2Corelight, 3National Center for Supercomputing Applications Abstract While only a small fraction of such attempts succeed, they This paper describes CAUDIT1, an operational system have led to major misuses in 51% of 1,800 surveyed organi- deployed at the National Center for Supercomputing Applica- zations, with a financial impact of up to $500,000 per organi- tions (NCSA) at the University of Illinois. CAUDIT is a fully zation [7]. automated system that enables the identification and exclusion This paper describes the production deployment of of hosts that are vulnerable to SSH brute-force attacks. Its CAUDIT at the National Center for Supercomputing Ap- key features include: 1) a honeypot for attracting SSH-based plications (NCSA) at the University of Illinois over a period attacks over a /16 IP address range and extracting key meta- of 463 days.
    [Show full text]
  • Item Model Processor Lenovo Thinkpad X230 Tablet Intel Core I7
    Item Model Processor Lenovo Thinkpad X230 Tablet Intel Core i7 Toshiba Satellite E45-B4200 Intel Core i5 HP F9H61UA#ABA Lenovo Thinkpad X220 Lenovo Thinkpad T430 Intel Core i5 Lenovo Thinkpad W510 Intel Core i7 Lenovo B570 Intel Core i3 HP Stream Intel Celeron N3060 HP ASUS Q524U Intel Core i7 7th Gen HP Chromebook Intel Dell Chromebook 11 P22T Sony VAIO VPCS138EC Intel Core i5 Samsung Chromebook 500C Intel Toshiba Satellite E45t-A4100 Intel Core i5 ZED Note Intel Quad Core Samsung Chromebook XE513C24 HP Mini 311-1037NR Intel Atom HP Stream Intel HP Chromebook 11-SMB0 US HP Stream Toshiba NB305-N413BN Intel Atom MSI A4000 Intel Pentium HP Chromebook Intel Sony VAIO VPCF1 Intel Core i7 Lenovo Thinkpad E431 Intel Core i3 Lenovo G50 AMD E1 ASUS F555L Intel Core i3 Toshiba Satellite C655D-S5200 AMD Vision HP Chromebook Intel Celeron N3060 Samsung Notebook 550P Intel Core i3 Lenovo Thinkpad X131e Intel Dell Lattitude E6420 Intel Core i5 Lenovo Thinkpad T410 Intel Core i5 Samsung Chromebook Intel Samsung Chromebook 303C HP Chromebook Sonny VAIO VPCS115FG Intel Core i3-330M Samsung Chromebook 500C Intel Samsung Chromebook 500C Intel Toshiba Chromebook CB35-A3120 Intel Acer Chromebook R 11 Intel Lenovo Thinkpad X230 Tablet Intel Core i5 Samsung Chromebook 500C Intel HP Stream Samsung Chromebook 500C Intel Samsung Chromebook 500C Intel Compaq Presario CQ62 AMD HP Stream Intel Toshiba Chromebook CB35-B3340 Intel HP Pavilion x360 Intel Pentium Samsung Chromebook 303C Samsung Chromebook 500C Intel Samsung Chromebook 500C Intel HP Stream Intel Samsung
    [Show full text]
  • Scripting the Openssh, SFTP, and SCP Utilities on I Scott Klement
    Scripting the OpenSSH, SFTP, and SCP Utilities on i Presented by Scott Klement http://www.scottklement.com © 2010-2015, Scott Klement Why do programmers get Halloween and Christmas mixed-up? 31 OCT = 25 DEC Objectives Of This Session • Setting up OpenSSH on i • The OpenSSH tools: SSH, SFTP and SCP • How do you use them? • How do you automate them so they can be run from native programs (CL programs) 2 What is SSH SSH is short for "Secure Shell." Created by: • Tatu Ylönen (SSH Communications Corp) • Björn Grönvall (OSSH – short lived) • OpenBSD team (led by Theo de Raadt) The term "SSH" can refer to a secured network protocol. It also can refer to the tools that run over that protocol. • Secure replacement for "telnet" • Secure replacement for "rcp" (copying files over a network) • Secure replacement for "ftp" • Secure replacement for "rexec" (RUNRMTCMD) 3 What is OpenSSH OpenSSH is an open source (free) implementation of SSH. • Developed by the OpenBSD team • but it's available for all major OSes • Included with many operating systems • BSD, Linux, AIX, HP-UX, MacOS X, Novell NetWare, Solaris, Irix… and yes, IBM i. • Integrated into appliances (routers, switches, etc) • HP, Nokia, Cisco, Digi, Dell, Juniper Networks "Puffy" – OpenBSD's Mascot The #1 SSH implementation in the world. • More than 85% of all SSH installations. • Measured by ScanSSH software. • You can be sure your business partners who use SSH will support OpenSSH 4 Included with IBM i These must be installed (all are free and shipped with IBM i **) • 57xx-SS1, option 33 = PASE • 5733-SC1, *BASE = Portable Utilities • 5733-SC1, option 1 = OpenSSH, OpenSSL, zlib • 57xx-SS1, option 30 = QShell (useful, not required) ** in v5r3, had 5733-SC1 had to be ordered separately (no charge.) In v5r4 or later, it's shipped automatically.
    [Show full text]
  • Centrify Putty Guide
    Centrify-enabled PuTTY User’s Guide September 2020 (release 2020) Centrify Corporation • • • • • • Legal Notice This document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth in such license agreement or non-disclosure agreement, Centrify Corporation provides this document and the software described in this document “as is” without warranty of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Centrify Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Centrify Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Centrify Corporation may make improvements in or changes to the software described in this document at any time.
    [Show full text]
  • Oracle Enterprise Session Border Controller – Acme Packet 4600 and Microsoft Skype for Business for Enterprise SIP Trunking with NTT Communications
    Oracle Enterprise Session Border Controller – Acme Packet 4600 and Microsoft Skype for Business for Enterprise SIP Trunking with NTT Communications Technical Application Note Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Table of Contents INTENDED AUDIENCE ......................................................................................................................................... ..4 DOCUMENT OVERVIEW ....................................................................................................................................... .4 INTRODUCTION ..................................................................................................................................................... .5 AUDIENCE ............................................................................................................................................................................................ .5 REQUIREMENTS .................................................................................................................................................................................. .5 ARCHITECTURE ..................................................................................................................................................................................
    [Show full text]
  • The Problem Faced and the Solution of Xiaomi Company in India
    ISSN: 2278-3369 International Journal of Advances in Management and Economics Available online at: www.managementjournal.info RESEARCH ARTICLE The Problem Faced and the Solution of Xiaomi Company in India Li Kai-Sheng International Business School, Jinan University, Qianshan, Zhuhai, Guangdong, China. Abstract This paper mainly talked about the problem faced and the recommend solution of Xiaomi Company in India. The first two parts are introduction and why Xiaomi targeting at the India respectively. The third part is the three problems faced when Xiaomi operate on India, first is low brand awareness can’t attract consumes; second, lack of patent reserves and Standard Essential Patent which result in patent dispute; at last, the quality problems after-sales service problems which will influence the purchase intention and word of mouth. The fourth part analysis the cause of the problem by the SWOT analysis of Xiaomi. The fifth part is the decision criteria and alternative solutions for the problems proposed above. The last part has described the recommend solution, in short, firstly, make good use of original advantage and increase the advertising investment in spokesman and TV show; then, in long run, improve the its ability of research and development; next, increase the number of after-sales service staff and service centers, at the same, the quality of service; finally, train the local employee accept company’s culture, enhance the cross-culture management capability of managers, incentive different staff with different programs. Keywords: Cross-cultural Management, India, Mobile phone, Xiaomi. Introduction Xiaomi was founded in 2010 by serial faces different problem inevitably.
    [Show full text]