Part 4: Advanced Switching Features
Part 5: IP Routing
24
G8264CS Application Guide for ENOS 8.4
Chapter
11, "Virtual Link Aggregation Groups," describes using Virtual Link
Aggregation Groups (VLAGs) to form LAGs spanning multiple VLAG‐capable
aggregator switches.
Chapter
10, "Spanning Tree Protocols," discusses how Spanning Tree Protocol
(STP) configures the network so that the switch selects the most efficient path
when multiple paths exist. Covers Rapid Spanning Tree Protocol (RSTP),
Per‐VLAN Rapid Spanning Tree (PVRST), and Multiple Spanning Tree Protocol
(MSTP).
Chapter
12, "Quality of Service," discusses Quality of Service (QoS) features,
including IP filtering using Access Control Lists (ACLs), Differentiated Services,
and IEEE 802.1p priority values.
Chapter
13, "Virtualization," provides an overview of allocating resources
based on the logical needs of the data center, rather than on the strict, physical
nature of components.
Chapter
14, "Virtual NICs," discusses using virtual NIC (vNIC) technology to
divide NICs into multiple logical, independent instances.
Chapter
16, "VMready," discusses virtual machine (VM) support on the
G8264CS.
Chapter
17, "FCoE and CEE," discusses using various Converged Enhanced
Ethernet (CEE) features such as Priority‐based Flow Control (PFC), Enhanced
Transmission Selection (ETS), and FIP Snooping for solutions such as Fibre
Channel over Ethernet (FCoE).
Chapter
18, "Fibre Channel," describes how to configure the G8264CS for use
with Fibre Channel networks.
Chapter
19, "Edge Virtual Bridging," (EVB) discusses the IEEE 802.1Qbg—a
standards‐based protocol that defines how virtual Ethernet bridges exchange
configuration information. EVB bridges the gap between physical and virtual
network resources, thus simplifying network management.
Chapter
20, "Static Multicast ARP," discusses the configuration of a static ARP
entry with multicast MAC address for Microsoft's Network Load Balancing
(NLB) feature to function efficiently.
Chapter
21, "Dynamic ARP Inspection," discusses this security feature that lets
a switch intercept and examine all ARP request and response packets in a
subnet, discarding those packets with invalid IP to MAC address bindings. This
capability protects the network from man‐in‐the‐middle attacks.
Chapter
22, "Basic IP Routing," describes how to configure the G8264CS for IP
routing using IP subnets, BOOTP, and DHCP Relay.
Chapter
23, "Internet Protocol Version 6," describes how to configure the
G8264CS for IPv6 host management.