Dell EMC Networking
Dell EMC Networking
Benefits of Networking
Efficient Communication: Networking allows employees to share files, access fellow employees' work,
and exchange ideas efficiently. It also helps in video streaming and voice calling.
Remote Access: Networking provides mobility of information. Users can access information from
anywhere by being virtually connected to the network.
Data Backup: Networking helps with data backup. It facilitates centrally controlled anti-virus protection.
Cost Reduction: Sharing hardware and software resources and abridging to microcomputer-based
networks instead of using mainframes reduces costs.
High Reliability and High Interoperability: Ethernet is a mature protocol that has the possibility to
connect devices from various vendors.
ARCnet
Ethernet
Token Ring
Before we get to the big three types of networks, we will discuss the Topology and
Network Access rules first.
Topology Types
Rules of Network Access
Besides topology, another question arose about the rules we should use to control how
the information traverses the network.
Aloha was the first set of rules. It was often referred to as "send and pray"—send
the data and pray it gets there.
CSMA/CD was used by Ethernet and stands for Carrier Sense Multiple Access
and Collision Detection. This sent out a carrier signal that the data would ride on. The
data would move along on a shared wire bus topology. Prior to sending information, a
device sending data would check if a carrier already existed and not send until the
segment of wire was clear of traffic. The segment could be up to 500 meters long, so
two devices could both get onto the wire at the same time. When this happened, a
collision would occur. The devices would detect this, wait a random amount of time to
get back on, and one device would then send out the carrier and transmit their packet.
Token Passing is where only the device that has the Token can communicate.
Each device passes data from node to node in a ring or bus topology.
ARCnet
Topology: Bus
Access Method: Token Passing
Supporters included: DataPoint Corp
First to market, but did not have a strong following
Ethernet
Topology: Bus originally, and eventually star with the introduction of the
switch
Access Method: Originally CSMA/CD, which became less significant with
the introduction of the switch because of the availability of the full duplex
feature
Supporters included: DEC Intel, Xerox, and 3Com
Inexpensive and easy to deploy
Token Ring
Topology: Token Ring
Access Method: Token Passing
Major supporter included: IBM
Proven technology
Token Ring had the giant IBM pushing its agenda. Token Ring started at 4 Mbps and
then increased to 16 Mbps. Many people thought Token Ring had the technological
advantage.
Ethernet had its supporters, but it was battling Big Blue (IBM). When Ethernet changed
from a coaxial cable-based network to a twisted pair environment, it gained some
momentum. When Fast Ethernet came out, it all but ended the Token Ring challenge.
When 1Gbps Ethernet came out, Token Ring was history.
© 2020 Dell Inc. or its subsidiaries. All Rights Reserved.
Ethernet is the predominant network of choice for data communications, accounting for over 90
percent of all networks in the world.
Ethernet started out as bus topology, but then became a star topology with introduction of
10Base-T twisted pair cabling. When Ethernet transitioned to a star environment, it did not drop
CSMA/CD, but it became less important to its operation.
An IRL is an inter-repeater link, a segment that only has two repeaters on it and nothing
else. It is used to extend the network only.
Segment lengths depend on the type of coaxial cable used. 10BASE5 used thicknet
cable and could go 500 meters. 10BASE2 used thinnet cable and could go 185 meters.
Each end of the segment had to be terminated with a 50 ohm resister pack.
In the original Ethernet, all 5 segments were part of the collision domain. A collision
could occur between any two devices on any of the 5 segments.
5 segments
4 repeaters
3 data segments
2 inter-repeater links
1 collision domain
Ever-Changing Ethernet
Cable types have changed from coaxial to twisted pair and more.
Speed changed from 10 Mbps to 40 Gbps and higher.
MAC address learning changed from bridges to switches.
Topology changed from bus to star. Hubs are a star-wired bus, and a switch is a
star-wired bridge.
New advancements include switching, stacking, link aggregation, VLANs, and
routing.
Twisted pair cables are used to connect either hubs or switches to end stations. Twisted pair
cable categories have different specifications to work with different speeds. Cat 5 and Cat 6 are
common in today's networks.
Twinax cables are used in 10Gbps environments. They use SFP+ (small form-factor pluggable
+) connectors with an embedded transceiver.
Fiber cables can be used in many situations and many speeds. They are
Fibe commonly used with the higher-speed connections or secure environments.
r
100Mbps – FastEthernet
10Gbps – Often used for interconnect devices or high end data centre devices
40Gbps – can be used for a 40Gbps connection, stack connection or 4x10Gbps connections
A switch is more like a multi-port bridge that works at line speed. The whole switch is
one part of a larger broadcast domain up to the router. The other side of the router is
another broadcast domain. Each switch port is its own collision domain, and it has its
own transmit (TX) and receive (RX) line so there will be no collisions.
Bridges Evolved into Today's Layer 2
Switches
Switches are like bridges in that they both learn MAC addresses and store them in their MAC
address table.
On the other hand, switches and bridges are different because bridges connect to a shared
segment, and switches connect each device individually using a twisted pair cable. The
connection on the switch has both transmit (TX) and receive wires (RX) within each twisted pair
cable.
The phrase Please Do Not Throw Sausage Pizza Away is an effective way to
remember the layers.
Physical = Please
Data Link = Do
Network = Not
Transport = Throw
Session = Sausage
Presentation = Pizza
Application = Away
Physical Layer
The first layer, the physical layer, has two different specifications associated to it:
Physical Medium and Transmission Protocol.
Data Layer
Layer 2 of the OSI Model is the data link layer. The data link is responsible for transmitting
and receiving frames.
A frame is a series of bits in a digital transmission. It consists of bits that show the receiver the
beginning and end of the payload data within the series of bits it receives.
In the OSI model, a frame is the protocol data that is a result of the final layer in data
encapsulation before it is transmitted to the physical layer.
Data Encapsulation
Encapsulation is a protocol that logically separates functions in the network. They are
abstracted from their invisible structures by inclusion within higher-level objects.
The data at each layer controls information attached to it through Protocol Data Units (PDU).
Each PDU has a name, depending on each header, which attaches it to the each OSI layer.
The data is handed to the next layer after it is stripped off, which only the neighboring layer of
the destination reads.
Network Layer
Layer three of the OSI Model is the network layer. The network layer is used when data
needs to travel from one network to a different network. Ethernet uses IP
addressing with different network addresses to differentiate between networks. Routers
are devices used to provide connections between the different networks.
Transport Layer
Layer four of the OSI Model is the transport layer. Each protocol uses a different
software port where each protocol has its own unique number to communicate.
The transport layer creates a connection to the other side. Some connections are
short-lived, and others are long-lived.
The transport layer maintains reliable data transmission and provides for:
The session layer contains session communication between two devices. For example,
suppose there is an iSCSI session between a server and an array. The session usually follows
formal communication setup, data transfer, and teardown processes.
Presentation Layer
The presentation layer is the sixth layer in the OSI Model. The presentation layer provides
formatting of data characters (ASCII), graphics (JPEG, PiCT, and TIFF), music (MIDI), and
video (MPEG). It also has the ability for data encryption using Data Encryption Standards
(DES).
Application Layer
The application layer is the highest layer at layer 7 of the OSI Model. It contains the
applications that use the services of the network. This layer translates commands into
language familiar to the lower layers.
What Is Addressing and Why Are There
Different Types?
Computer MAC addressing is like how people address each other. People have a first and last
name, which we use to address each other. Each device on a network has a unique number.
The first six digits are the vendor ID, which is comparable to your last name, and the last six
digits are a unique identifier, which is like your first name.
IP addressing is more like the address of our house or apartment, but once it gets there, your
name will ensure it gets to the right person. IP addressing uses a 32-bit address to identify
where the devices are located anywhere in the world.
MAC Addresses
The Media Access Control (MAC) address is a hexadecimal number, 12 digits long.
The first six digits are the Organizationally Unique Identifier (OUI), which
identifies the vendor of the equipment.
The last six digits are the Universally Administered Address (UAA), which is a
unique number associated given out by the vendor.
Every single MAC address is a unique hexadecimal number that is built into the network
interface of every Ethernet device.
The one exception on this diagram is the connection between switches. Because this is
a flat layer 2 network, all of the devices from one of the switches will be learned on the
port that connects those switches. In this example, each switch will learn all MAC
addresses on the network. These addresses will be in the MAC address table on each
of the switches.
IP Addresses
32 bit Binary-
00001010 10011000 00011011 11111011
Dotted Decimal Notation- 10.152.27.251
Binary Mask-
11111111 11111111 00000000 00000000
Dotted Decimal Notation- 255.255.0.0
CIDR Notation- 10.152.27.251/16
IP addresses are a 32-bit address used to identify networks and hosts. They can also be
represented as a dotted decimal notation. The mask is used to identify how many bits will be
used for network identification. The rest will be used for host identification.
CIDR stands for Classless Internet Domain Routing. It is another way of representing masking.
Some switches support it while others do not.
IP Classes
There are five network classes, A through E.
Class A uses 8 bits for network identification and 24 bits for host IDs. Note:
Addresses 127.0.0.0 to 127.255.255.255 are reserved for loopback and diagnostics.
Class B uses 16 bits for network IDs and 16 bits for host IDs.
Class C uses 24 bits for network IDs and 8 bits for host IDs.
Class D is reserved for multicasting.
Class E is used for research and experimental use.
The classes were how masks were originally set up. Then, there was a change to
Variable Length Subnet Masks (VLSM) where you could select any number of bits for
network and hosts. For simplicity, many people still used the class designations and
stay on the 8-bit boundaries for their masks.
Routing
Each uses a 24-bit mask. All layer 2 broadcasts are contained on each network. All of the other
traffic will pass between the two networks unless denied by the router using an access control
list (ACL). The router will get traffic between the two networks, and then MAC addressing will
get the packet to its final destination. Each PC's default gateway must be configured to point to
their local router.
Private Networks
A private network is a network that uses private IP address space. These addresses are
commonly used for home, office, and enterprise LANs. Private IP address spaces were
originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of
IPv6.
Addresses in the private space are not allocated to any specific organization, and anyone may
use these addresses without approval. However, IP packets addressed from them cannot be
transmitted through the public internet. Therefore, if such a private network needs to connect to
the internet, it must do so via a network address translator (NAT) gateway.
What is the numbering system we use every day? Decimal or Base 10.
What numberings systems do computers use? It could be binary, octal, or hexadecimal (also
known as hex).
Most people today use Decimal or Base 10 as a representation to count. In the Decimal system,
there are 10 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
There is a progression of value that starts at the 1's place at the right and multiplies by 10 each
higher digit placement to the left.
There is a progression of value that starts at the 1's place at the right and multiplies by two each
higher digit placement to the left.
Binary has two digits: a 1 and a 0. This is very easy to represent with computers where a 1 is a
transition from negative to positive and a 0 is a transition from positive to negative. Today there
are many more schemes and coding used to represent 1s and 0s.
A single digit is referred to as a bit. 8 bits is a byte, 4 bits is a nibble, and 16 bits is a word. You
can also use binary to represent much larger numbers. Just like we used different columns in
Decimal to indicate 1's, 10's, and 100’s, in binary we have 1’s, 2’s, 4’s, 8’s, 16’s, 32’s, and so
on.
IP addresses use dotted decimal notation. Each group of eight binary characters or
octets are converted to decimal and separated by dots or periods.
A mask is used to identify how many bits are used for the network address space. The example
is using a 16-bit mask. We then need to do an AND function against the IP address, and the
result will be the network address. AND requires both bits to be 1’s for the result to be a 1. The
result is that the network address for the 10.152.27.251 /16 address is 10.152.0.0 network. It will
not always be that simple.
There is a progression of value that starts at the 1's place at the right and multiplies by 16 each
higher digit placement to the left.
In binary to hexadecimal conversion, each group of four binary characters (nibble) are
converted to Hexadecimal.
Class A
Address____________________________________________________________Class A
Address
Mask 255.0.0.0 or /8________________________________________________________
Mask 255.255.0.0 or /16
8 bits Network addressing____________________________________________________16
bits of network addressing
________________________________________________________________________ 8 of
those bits are subnet bits
24 bits of Host addressing____________________________________________________16
bits of Host Addressing
Each Class has certain bits in the IP address defined for network and hosts. The use of subnets
allows us to allocate bits that would have been used for hosts to be used for additional network
allocation instead. The left diagram shows the typical class assignment of Network and Host bits
for a Class A address. The right diagram shows the use of subnets; this is accomplished by
specifying more bits for networking using the longer mask.
In order to extend the mask, we need to use additional bits. We can use any number of bits to
increase the mask. Using consecutive bits is the norm. Therefore, the dotted decimal mask
octet can be any of the octets shown above. Depending on the network operating system, you
may use either dotted decimal notation or CIDR notation.
Next, we will put this information to good use and learn how to find out on which subnet an
address is.
The first step is convert the IP address from dotted decimal notation to binary.
Next, perform a logical AND operation with the binary IP address and the mask.
Note the mask is 20 bits long.
The first two octets are easy. Both are the same as the octets of the IP address.
The third octet uses only the first four bits from the IP address. The last 12 bits
will be zeroes.
Last, convert the AND data to the dotted decimal notation, and see that the
subnet is 153.152.16.0.
Next, we will find out how to determine the broadcast address of a network.
Start with calculating the number of subnets available. The process to calculate
the number of subnets and hosts starts with identifying the Class of the IP address.
Take the number of Class network bits and subtract that from the number of bits in the
network mask. That will give the number of bits used just for subnets. In the example,
we have 23 bits – 16 bits = 7 bits of subnet.
Using 7 bits, that is class A, so we can count from 0-127, which is 128 different
subnets.
Now, calculate the number of hosts. Start with the number bits in an IP address,
which is 32, and subtract the network mask from the remainder. This is the the number
of bits used to count hosts. In our example, 32 – 23 = 9 bits for hosts.
9 bits lets us count from 0-511, or 512 hosts, but we can not use all 1’s or all 0’s.
Therefore, we need to subtract 2 from the total 512 – 2 = 510. So the total subnetworks
is 128, and the total number of hosts is 510 in this example.
The last process we will explain is getting the range of host IP addresses used.
ARP
ARP stands for Address Resolution Protocol. It is used to resolve IP addresses into MAC
addresses.
Suppose one device wants to communicate to, for example, IP address 10.3.87.12. However, it
does not have that address in its cache. It must send an ARP Broadcast to all devices in the
VLAN.
The other device with that IP will respond to the ARP request: "I am 10.3.87.12."
When it responds, it will have the MAC address as well as the IP address.
So now we can send over the Layer 2 switch using the MAC address.
The Dell Networking X-Series is a family of smart managed 1 GbE and 10 GbE Ethernet
switches that are designed for small and medium businesses. X-Series is ideal for smaller
networks or remote/branch offices with limited IT staff who crave enterprise-class network
control that is fused with consumer-like ease.
X-Series switches use DNOS 3 technology.
The intuitive graphical user interface (GUI) of Dell Networking X-Series switches makes setup
and management simple for network administrators.
Dell EMC PowerSwitch S Series 1GbE switches are optimized for high-performance
data-center environments:
Deliver low-latency, superb performance and high density with hardware and
software redundancy
Offer Active Fabric designs using S- or Z-Series core switches to create a two-
tier, 1/10/40 GbE data-center network architecture
Provide ideal solutions for ToR applications in enterprise, Web 2.0, and cloud
service providers’ data-center networks
Deploy modern workloads and applications designed for the open networking era with
an optimized data-center top-of-rack (ToR) networking solution that:
Gain the flexibility to transform data centers with high-capacity network fabrics that are
easy to deploy, cost-effective, and provide a clear path to a software-defined data
center. They offer:
Brackets or ears
Rapid Rails
Chassis switch
Optional modules installation
Cable Labeling
Where possible, use the customer's cable labeling standards.
Include the devices and ports where the port is connected on both ends. For
example, Switch01 Gi1/0/20 or Server02 Onboard NIC1.
Drawbacks of this option:
MX7000 Overview
I/O Modules
Scalable Architecture
Inter-chassis cabling
Initial Switch Connection Objectives
After completing this module, you will be able to:
Example
In the command snmp-server community dellpvt rw:
snmp-server and community are keywords
dellpvt rw are key parameters
dellpvt specifies the community string
rw specifies the SNMP permissions
CLI Modes
Three CLI modes, each with specific types of commands, are available to users.
CLI Keyboard Shortcuts
The table below lists the basic keyboard shortcuts in CLI:
The question mark (?) has three uses:
- console(config)# ?
- console#ipv6 ?
access-list named access-list
neighbor add an IPv6 static neighbor
prefix-list Build a prefix list
route establish static routes
router enable an IPV6routing process
- console#ipv6 route ?
X:X:X:X::X IPV6 prefix x:x:::y
After the switch initially boots, the first time you try to run the enable command it gives
the following messages:
enable
Dell#00:00:54 %STKUNIT0-M:CP %SEC-4-
ENABLE_PASSW_NOT_Configured: Enable password is required for authentication
but not configured
00:00:54: %STKUNIT)-M:CP %SEC-3-
AUTHENTICATION_ENABLE_SUCCESS: Enable password authentication success on
console
You must enter config mode and add an enable password:
Dell#config
Dell (config)#enable password P@ssw0rd
Note: "P@ssw0rd" is just an example, not the required password.
An access profile is required for login via management interface (except the console).
This example sets up an admin level username and password at level 15, which is the
highest level available.
Example (legacy):
- console#configure
- console(config)#username admin password - password level 15
- console(config)#exit
- console#
Example (latest models): Create a user name and password and assign a
privilege level.
- OS10#configure
- OS10(config)# username user07 password paSsw0$d role netadmin priv-lvl 10
- OS10(config)#exit
- OS10#
To view accounts, use the show users accounts command.
Upon access via telnet, user is prompted for login credentials.
Run this command to change the hostname. Type "configure" to enter this mode and
type "exit" to leave this mode.
In this example, the hostname is being changed to "text."
When booting a switch OS9 for the first time, the switch is in jump-start reload type
mode. This causes problems saving the configuration and will cause the following
message to appear on the console screen. Change the reload-type to normal-reload.
Reboot the system manually using the reload command in EXEC mode. You are prompted to
confirm the operation.
OS10# reload
Proceed to reboot the system? [confirm yes/no]:yes
Saving system configuration
Proceed to reboot the system? [confirm yes/no]:yes
If changes are saved to the startup-config, running this command reverts it to the initial
startup state.
Dell#copy startup-config running-config
!
4154 bytes successfully copied
1d1h31m: %STKUNIT0-M:CP %SYS-5-CONFIG_LOAD: Loading configuration file
1d1h31m: %STKUNIT0-M:CP %SYS-5-CONFIG_I: Configured from console by
console
Dell>1d1h31m: %STKUNIT0-M:CP %SEC-5-LOGIN_SUCCESS: Login successful
for user on line console
Dell>
The running configuration contains the current OS system configuration and consists of
a series of commands. Copy the running configuration to a remote server or local
directory(USB) as a backup or for viewing and editing. The running configuration is
copied as a text file that you can view and edit with a text editor. The copy can be given
any name and can be brought to another machine and applied to the new machine.
Dell#copy startup-config usbflash://startupconfig
Do not remove usbflash, copy operation is in progress!!
The following command format only is applicable for the Dell Networking OS versions. If
you are using third-party OS software, refer to the configuration guides provided with
those releases.
If the original switch is still functioning and the customer has not backed up a copy,
connect a laptop to the management port of the switch. Ensure that the laptop has a
functioning TFTP server installed.
To back up the configuration:
Assign the laptop an IP address on the switch's network to enable
communication.
Establish a console connection to the switch's command-line interface (CLI).
In the console session, use the copy running-config
tftp://hostip/filepath command to back up the configuration to the laptop TFTP
server.
Note:If the defective switch does not power on and the customer has not made a
backup, the configuration is lost and it cannot be retrieved.
The following command format only is applicable for the Dell Networking OS versions. If
you are using third party OS software, refer to the configuration guides provided with
those releases.
To restore the backup configuration:
Move the laptop to the replacement switch, and establish a console session and
an Ethernet connection.
Place the config file in the root directory of a TFTP server on a directly connected
laptop.
Use the command copy tftp://hostip/filepath running-config to copy
the configuration to the replacement switch.
Verify that everything has been registered in the running configuration of the
replacement system. You can run a diff command between the output of show
running-configuration and the customer-given configuration.
Save the configuration with the command copy run start.
OS9
Looking at the interface status is a good troubleshooting tool. If the status is Down/Down, make
sure the port is administratively enabled by entering the no shutdown command on the
interface. If the port status is Up/Down, check the port and cables. If it is Up/Up, everything is
good.
Speed/duplex negotiation problem between the switch and the device it connects
to.
If connecting to another vendor's device, try to set flow control send and
receive to off and the speed to no negotiate or no negotiation-auto on the interface.
Transmit fiber or receive fiber or both are removed from the switch, removed
from the system, or are faulty.
The remote system’s port is administratively down.
Verify that the fibers are connected to both the local and remote systems on the
correct port. Clean and verify the fiber. If the interface is still showing UP/DOWN, move
the fiber to another port on another line card on the switch. If the port is still down, move
the fiber to another port on the remote system.
The show interface status command is a good way to view the status of all the ports in an
easy-to-read format.
OS10
Firmware Updates
When a device boots, it decompresses the system image from flash memory and runs
it. When a new image is downloaded, it is saved in the area that is allocated for a
secondary system image copy.
Image Upgrade Methods:
View the currently running version of code using the command show version.
For OS 3 and OS 6, search for the switch model on dell.com/support
For OS 9 and OS 10 firmware, the customer typically has an account on Dell
Digital Locker for updates.
Copy files to the TFTP server. Note that the customer controls whether or not
you may add your TFTP server to their environment and may require you to use their
TFTP server.
Locate the release notes: The upgrade instructions are part of the release notes.
Follow the upgrade procedure for the unit type you have, either single switch or stack
upgrade. If there is new boot code, it is typically upgraded first.
Upgrade the nonactive partition first. Mark as active. Reboot the switch.
Validate that the switch is running the new firmware and if valid, upgrade the
other partition. If invalid, redirect to the old version code and contact Tech Support to
investigate the issue.
Replaceable Units
A Replaceable Unit—or part—is a component of a device that can be replaced in the
field. Dell may ship the part directly to the customer, or you might deliver and install it.
Commonly replaced switch parts include:
Chassis fans
Power supply units (PSUs)
Add-on modules
About replaceable parts:
Pinch the orange release tab as shown on the video, and pull out the fan module.
Insert the new fan module until it locks into place.
To play the video, click the Play button. To enlarge the video, click the Full
Screen button on the lower right.
Important: This video shows fan replacement on S4200 Series switches. Other
switches use similar procedures. Always check the documentation at the site listed in
the Additional Support module.
Physical Inspection:
Model number of the PSU shows if it is AC or DC.
Differentiate AC from DC by looking at PSU connector pins.
Using CLI:
To determine all fan directions:
show inventory
To determine if a PSU is not working:
show environment pem
Replacing a PSU
This example describes S4200-ON Series switches. Other switches use similar
procedures. Always check the documentation.
See Figure 1. Open the left and right ejector levers—item 1—on an RPM by
pressing in the orange tab—item 2. Rotate both levers to the right, so that they snap
into the open position.
See Figure 2. Hold the new card assembly by the metal carrier edges. Avoid
touching the printed circuit board and connector pins.
The arrow in slot 10—item 2 in the Figure 2, labelled R0 on the chassis—
identifies the slot in which you insert the first RPM. Align the card with the guide and
gently slide it into the slot by holding the two ejector levers in the fully open position and
pushing the card forward. You should feel the backplane connectors on the RPM
engage with the chassis backplane.
Push in the levers—item 3 in Figure 2—until the thumb tabs pop-up and the card
is fully inserted in the slot. The ejector levers hide under the card.
If the C9010 uses two RPMs, insert the second RPM into slot 11—labelled R1 on
the chassis—below the first RPM by following Steps 1 through 4.
If the C9010 uses only one RPM, install a blank panel to cover slot 11. To install
the panel, hold the levers and insert the blank to cover the open slot. Push in the lever
to secure the blank in place.
In a C9010 switch, install the fan modules before you install line cards.
On the C9010, line card slots are labeled 0 through 9. You can insert any line
card type into any line card slot.
Install an operational line card module or a line card blank in each line card slot.
Line card blanks are smaller than the blank panels for RPMs.
Always replace a line card or blank panel immediately.
C9010 line cards are hot-swappable.
When you install a line card, do not press on the port connectors.
Preparing for Switch Replacement
Work with the customer to schedule appropriate downtime.
Inspect the rack area to see if there is space to replace the switch.
Determine whether the existing switch can be removed easily.
On the existing switch, label the cables with port information to represent which
cable goes to which port. Refer to the Physical Setup section for the correct procedure.
Ensure that the current configuration is backed up as described in the Initial
Switch Configuration section. Many customers prefer to do this themselves, but others
may ask you to do it.
If the replacement switch is a different model from the original, you may not be
able to restore the backup file to the new switch. Sometimes, an engineer must design a
new configuration to support the same features. Contact Dell EMC Support for
assistance.
Rack Placement
Follow these steps for rack placement:
Usually, you should place the new switch in the same slot as the existing one.
Sometimes, the existing switch may be blocked by a Power Distribution Unit
(PDU) or some other device. If so, discuss the problem with the customer before
beginning work.
If there is an empty slot in the rack that is next to the old switch, consider using it
for the new switch. This enables you to plug each cable into the new switch after
removing it from the old switch.
Placing the new switch in a rack that is not next to the existing one depends on
whether the cables can reach the new location.