Hitachi Compute Blade 500 Series User Manual page 63

Logical partitioning manager
Hide thumbs Also See for Compute Blade 500 Series:
Table of Contents

Advertisement

Table 1-43 Configuration of Promiscuous Mode
Configuration
Guest OS
Disable
Restricted/Through
Enable
Restricted
Through
The following is an example of using Promiscuous mode.
Promiscuous mode has to set to "Through" for using on the following
environment.
Table 1-44 Environment for Promiscuous Mode
Environment
Case1:
Bridge function has been installed to the
guest OS.
Case2:
Guest OS rewrites the MAC address.
Case3:
Using load balancing function with the
identical MAC address on the Multiple NICs.
When the bridge function has been installed to the guest OS.
Promiscuous mode has to set to "Through" against the internal virtual
network switch. Packet transferring at this case is below.
Hitachi Compute Blade 500 Series Logical partitioning manager User's Guide
LPAR manager
Screen
Receives only the packets to the target
LPARs (MAC addresses).
Receives only the packets to the target
LPARs (MAC addresses).
Receives all the packets in the same
network segment.
LPAR cannot transfer any packet.
LPAR cannot transfer any packet.
Load balancing function not works
correctly.
LPAR manager Functions
Packet Receiving
When Promiscuous mode is
"Restricted"
1-49

Advertisement

Table of Contents
loading

Table of Contents