Hitachi Compute Blade 2000 User Manual page 1364

Hide thumbs Also See for Compute Blade 2000:
Table of Contents

Advertisement

(3) Examples of promiscuous mode
Set the promiscuous mode to "Through" in the following environment.
#
Environment
(a)
Bridge is implemented in a guest OS.
(b)
MAC address is changed in a guest
OS.
(c)
Load balancing using the MAC
address shared by multiple NICs is
used.
(a)
Bridge is implemented in a guest OS:
When implementing the bridge in a guest OS, make sure to set the
promiscuous mode to "Through" for the internal virtual switch of LPAR
manager connected to the guest OS.
The following figure shows how to transfer a packet when the bridge is
implemented in the guest OS. When the promiscuous mode is set to Through
for each port1 of the virtual LAN switch (1a) and (2a), communication with
nodes is available across the bridge. That is because port1 of both virtual LAN
switches can transfer packets not to the MAC address of LPAR1 NIC.
LPAR manager
LPAR1
LPAR2
LPAR3
Bridge
1a
2a
1a
2a
1a
1
2
3
・・・・・
Virtual LAN Switch
(1a)
17
External Network -1
Since setting "Through" in port1
allows all packets to be transferred,
communication with nodes across
the bridge is available.
Behavior with promiscuous mode
"Restricted"
Cannot transfer any packet.
Cannot transfer any packet.
Load balancing (redundancy
function) does not work properly.
LPAR16
...............
2
16
1
2
3
16
・・・・・
Virtual LAN Switch
(2a)
17
External Network -2
x
:
setting
Through
:
setting
x
Restricted
: Port for external connection (always
17
: Physical NIC port
1313
Through)

Advertisement

Table of Contents
loading

Table of Contents