Bonding Methods Supported By The Protectier - IBM TS7650G User Manual

Deduplication gateway for protectier
Hide thumbs Also See for TS7650G:
Table of Contents

Advertisement

more than one physical port is assigned to a virtual interface, it is important to
configure the bonding methodology of this interface to align with the network
environment and fulfill the desired behavior in terms of performance and
redundancy.
See "Load distribution methodology" for the bonding methodologies supported by
ProtecTIER.
Load distribution methodology
This section describes the load distribution methodology.
Table 31 lists the bonding methods supported by the ProtecTIER server.
Table 31. Bonding methods supported by the ProtecTIER server
Mode
1 (High Availability)
0 (Round Robin)
4 (Dynamic IEEE 802.3ad,
switch-assist)
To modify the load balancing configuration, refer to "Configuring the application
IP interfaces" on page 11.
Subnetwork and VLAN separation
This section describes the recommended bonding to be used in FSI (that is,
Application1/ApplicationN).
It is very important to configure the ProtecTIER network such that each virtual
interface (IP) is on a different sub network and preferably a different VLAN in a
multi tier network infrastructure. This is important to segregate between the
backup traffic and other types of traffic for security and administrative reasons.
Selecting Bonding type and mode for FSI application interfaces
The default setting for the application interfaces is one application virtual interface
assigned to several physical network ports, depending on the model. This interface
is configured in a bond, mode 0 (Round-robin). It is recommended to change the
mode to 4 (IEEE 802.3ad) when a supporting switch is available. Note that the
switch needs to be configured for this mode, too. If there is no switch support for
IEEE 802.3ad, or the hosts are directly connected to ProtecTIER, the default mode
should not be changed.
Method
Description
HA
High Availability is set by default. Only one
interface in this bond is active. Should one of the
interfaces fail, the other interface becomes active,
and takes over communication.
RR
Outgoing traffic is spread evenly across all of the
adapter ports in the bond
L2
Outgoing traffic is spread using a default
transmit hash policy of layer 2 (source MAC ⊕
destination MAC)%N (number of slaves)
L2L3
Outgoing traffic is spread using a transmit hash
policy of MAC addresses and IP addresses of the
source and the destination
L3L4
Outgoing traffic is spread using a transmit hash
policy of IP addresses and ports of the source and
the destination
Chapter 9. Working with ProtecTIER for FSI
73

Advertisement

Table of Contents
loading

Table of Contents