0% found this document useful (0 votes)
262 views72 pages

Dell EMC Networking

The document discusses different types of computer networks including ARCnet, Ethernet, and Token Ring. It describes the topology and access methods of each, how Ethernet has evolved over time, and provides an overview of the OSI model layers.

Uploaded by

sts100
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
262 views72 pages

Dell EMC Networking

The document discusses different types of computer networks including ARCnet, Ethernet, and Token Ring. It describes the topology and access methods of each, how Ethernet has evolved over time, and provides an overview of the OSI model layers.

Uploaded by

sts100
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 72

Dell EMC Networking

Benefits of Networking

Data BackupRemote AccessEfficient CommunicationCost ReductionHigh Reliability

Efficient Communication: Networking allows employees to share files, access fellow employees' work,
and exchange ideas efficiently. It also helps in video streaming and voice calling.

Remote Access: Networking provides mobility of information. Users can access information from
anywhere by being virtually connected to the network.

Data Backup: Networking helps with data backup. It facilitates centrally controlled anti-virus protection.

Cost Reduction: Sharing hardware and software resources and abridging to microcomputer-based
networks instead of using mainframes reduces costs.

High Reliability and High Interoperability: Ethernet is a mature protocol that has the possibility to
connect devices from various vendors.

ARCnet vs. Ethernet vs. Token Ring


It was great when we first started getting personal computers, but we wanted to use
them to talk to one another. We wanted to share information and ideas. So, soon there
was an effort to connect the computers together, but where to start?

In the beginning, there were three networks:

 ARCnet
 Ethernet
 Token Ring
Before we get to the big three types of networks, we will discuss the Topology and
Network Access rules first.

Topology Types
Rules of Network Access
Besides topology, another question arose about the rules we should use to control how
the information traverses the network.

 Aloha was the first set of rules. It was often referred to as "send and pray"—send
the data and pray it gets there.
 CSMA/CD was used by Ethernet and stands for Carrier Sense Multiple Access
and Collision Detection. This sent out a carrier signal that the data would ride on. The
data would move along on a shared wire bus topology. Prior to sending information, a
device sending data would check if a carrier already existed and not send until the
segment of wire was clear of traffic. The segment could be up to 500 meters long, so
two devices could both get onto the wire at the same time. When this happened, a
collision would occur. The devices would detect this, wait a random amount of time to
get back on, and one device would then send out the carrier and transmit their packet.
 Token Passing is where only the device that has the Token can communicate.
Each device passes data from node to node in a ring or bus topology.

The Three Networks and their Features and


Benefits
Now we will compare network types:

 ARCnet
Topology: Bus
Access Method: Token Passing
 Supporters included: DataPoint Corp
 First to market, but did not have a strong following
 Ethernet
Topology: Bus originally, and eventually star with the introduction of the
switch
Access Method: Originally CSMA/CD, which became less significant with
the introduction of the switch because of the availability of the full duplex
feature
 Supporters included: DEC Intel, Xerox, and 3Com
 Inexpensive and easy to deploy
 Token Ring
Topology: Token Ring
Access Method: Token Passing
 Major supporter included: IBM
 Proven technology

Battle of the Networks


The battle was on. The first to fade away was ARCnet. It did not have the following and
prestige to compete with the other two technologies.

Token Ring had the giant IBM pushing its agenda. Token Ring started at 4 Mbps and
then increased to 16 Mbps. Many people thought Token Ring had the technological
advantage.

Ethernet had its supporters, but it was battling Big Blue (IBM). When Ethernet changed
from a coaxial cable-based network to a twisted pair environment, it gained some
momentum. When Fast Ethernet came out, it all but ended the Token Ring challenge.
When 1Gbps Ethernet came out, Token Ring was history.
© 2020 Dell Inc. or its subsidiaries. All Rights Reserved.
Ethernet is the predominant network of choice for data communications, accounting for over 90
percent of all networks in the world.

Ethernet started out as bus topology, but then became a star topology with introduction of
10Base-T twisted pair cabling. When Ethernet transitioned to a star environment, it did not drop
CSMA/CD, but it became less important to its operation.

Original Shared Ethernet


The Ethernet 5-4-3-2-1 rule meant that you could have a maximum of 5 segments, 4
repeaters, 3 Data Segments, 2 IRLs, and 1 collision domain.

An IRL is an inter-repeater link, a segment that only has two repeaters on it and nothing
else. It is used to extend the network only.

Segment lengths depend on the type of coaxial cable used. 10BASE5 used thicknet
cable and could go 500 meters. 10BASE2 used thinnet cable and could go 185 meters.
Each end of the segment had to be terminated with a 50 ohm resister pack.

In the original Ethernet, all 5 segments were part of the collision domain. A collision
could occur between any two devices on any of the 5 segments.
5 segments
4 repeaters
3 data segments
2 inter-repeater links
1 collision domain

Ever-Changing Ethernet

 Cable types have changed from coaxial to twisted pair and more.
 Speed changed from 10 Mbps to 40 Gbps and higher.
 MAC address learning changed from bridges to switches.
 Topology changed from bus to star. Hubs are a star-wired bus, and a switch is a
star-wired bridge.
 New advancements include switching, stacking, link aggregation, VLANs, and
routing.

Evolution of Ethernet Cables


Thicknet cable is also called "Goldenrod" cable because of its yellow color. Vampire taps could
be installed every 2.5 meters where the black stripe was located. 50 ohm terminators were at
both ends of a segment of cable.

Thinnet cable used bayonet connectors with T connectors and 50 ohm


terminators.
Thinne
t

Twisted pair cables are used to connect either hubs or switches to end stations. Twisted pair
cable categories have different specifications to work with different speeds. Cat 5 and Cat 6 are
common in today's networks.

Twinax cables are used in 10Gbps environments. They use SFP+ (small form-factor pluggable
+) connectors with an embedded transceiver.

Fiber cables can be used in many situations and many speeds. They are
Fibe commonly used with the higher-speed connections or secure environments.
r

100Mbps – FastEthernet

1Gbps – commonly used today for end user devices

10Gbps – Often used for interconnect devices or high end data centre devices

40Gbps – can be used for a 40Gbps connection, stack connection or 4x10Gbps connections

100Gbps – not common very expensive only a few vendors

Hub is to Bus as Switch is to Bridge


Although a switch and a hub can look the same, a hub is more like an Ethernet segment

A switch is more like a multi-port bridge that works at line speed. The whole switch is
one part of a larger broadcast domain up to the router. The other side of the router is
another broadcast domain. Each switch port is its own collision domain, and it has its
own transmit (TX) and receive (RX) line so there will be no collisions.
Bridges Evolved into Today's Layer 2
Switches
Switches are like bridges in that they both learn MAC addresses and store them in their MAC
address table.

On the other hand, switches and bridges are different because bridges connect to a shared
segment, and switches connect each device individually using a twisted pair cable. The
connection on the switch has both transmit (TX) and receive wires (RX) within each twisted pair
cable.
The phrase Please Do Not Throw Sausage Pizza Away is an effective way to
remember the layers.

 Physical = Please
 Data Link = Do
 Network = Not
 Transport = Throw
 Session = Sausage
 Presentation = Pizza
 Application = Away

Physical Layer
The first layer, the physical layer, has two different specifications associated to it:
Physical Medium and Transmission Protocol.

 The Physical Medium specifies how the information will be carried from


origination to the destination—over which cable type or wireless medium.
 The Transmission Protocols are the rules identifying how the ones and zeros
are generated and how these bits are coded into the transmission.

Data Layer
Layer 2 of the OSI Model is the data link layer. The data link is responsible for transmitting
and receiving frames.

A frame is a series of bits in a digital transmission. It consists of bits that show the receiver the
beginning and end of the payload data within the series of bits it receives.

In the OSI model, a frame is the protocol data that is a result of the final layer in data
encapsulation before it is transmitted to the physical layer.
Data Encapsulation
Encapsulation is a protocol that logically separates functions in the network. They are
abstracted from their invisible structures by inclusion within higher-level objects.

The data at each layer controls information attached to it through Protocol Data Units (PDU).
Each PDU has a name, depending on each header, which attaches it to the each OSI layer.
The data is handed to the next layer after it is stripped off, which only the neighboring layer of
the destination reads.

Network Layer
Layer three of the OSI Model is the network layer. The network layer is used when data
needs to travel from one network to a different network. Ethernet uses IP
addressing with different network addresses to differentiate between networks. Routers
are devices used to provide connections between the different networks.
Transport Layer
Layer four of the OSI Model is the transport layer. Each protocol uses a different
software port where each protocol has its own unique number to communicate.

The transport layer creates a connection to the other side. Some connections are
short-lived, and others are long-lived.
The transport layer maintains reliable data transmission and provides for:

 Acknowledgement of received segments


 Retransmission of segments not acknowledged
 Proper re-sequencing of segments
 Flow control to manage the data so no data is lost
Data is transmitted and received in the same order. If the data is received out of
order, the communication fails. Rather than transmitting a packet and having an
acknowledgement sent for each packet, a window is established. A window specifies
the number of packets the transmitting device can send before an acknowledgement is
received. When the acknowledgement is sent, the next packet that has not yet been
received is sent. If no acknowledgement is received by the sender in a given period of
time, the packet or packets are re-transmitted.
Session Layer
The session layer is layer 5 of the OSI Model.

The session layer contains session communication between two devices. For example,
suppose there is an iSCSI session between a server and an array. The session usually follows
formal communication setup, data transfer, and teardown processes.
Presentation Layer
The presentation layer is the sixth layer in the OSI Model. The presentation layer provides
formatting of data characters (ASCII), graphics (JPEG, PiCT, and TIFF), music (MIDI), and
video (MPEG). It also has the ability for data encryption using Data Encryption Standards
(DES).

Application Layer
The application layer is the highest layer at layer 7 of the OSI Model. It contains the
applications that use the services of the network. This layer translates commands into
language familiar to the lower layers.
What Is Addressing and Why Are There
Different Types?

Computer MAC addressing is like how people address each other. People have a first and last
name, which we use to address each other. Each device on a network has a unique number.
The first six digits are the vendor ID, which is comparable to your last name, and the last six
digits are a unique identifier, which is like your first name.

IP addressing is more like the address of our house or apartment, but once it gets there, your
name will ensure it gets to the right person. IP addressing uses a 32-bit address to identify
where the devices are located anywhere in the world.

MAC Addresses
The Media Access Control (MAC) address is a hexadecimal number, 12 digits long.

 The first six digits are the Organizationally Unique Identifier (OUI), which
identifies the vendor of the equipment.
 The last six digits are the Universally Administered Address (UAA), which is a
unique number associated given out by the vendor.
Every single MAC address is a unique hexadecimal number that is built into the network
interface of every Ethernet device.

Where are MAC Addresses in the Frame?

The frame is divided into seven different sections:

 The Preamble uses repetition of seven 8-bit patterns (10101010), which alerts


the receiving system that the frame is coming. It is a square wave pattern, and it is used
to synchronize the receivers prior to the beginning of the frame.
 The Start Frame Delimiter (SFD) is 1 byte sequence (10101011). The two
consecutive 1s are used for indicating the first bit of the frame.
 The Destination MAC Address identifies the destination of the packet and is
stored in this 6-byte field. The first bit specifies whether it needs to be sent to a single
user or to a group of stations. The second bit distinguishes between a local or global
address.
 The Source Address is 6 bytes used for storing the physical address of the last
device that forwarded the frame.
 The Length field can be used for length and type. It indicates the length of the
data field, which can be up to 1520 bytes long.
 The DATA field contains the information field and Logical Link Control (LLC)
data. LLC is used for enabling data exchange between end users. There can be a pad
at the end of the DATA field, which is used to ensure that the frame is always at least
64-bytes long. This is necessary for successful collision-detection operation.
 The Frame Check Sequence (FCS) has a 32-bit Cyclic Redundancy Check
(CRC), which is used for error checking within the frame.

Learning MAC Addresses


Each port on the switch learns the MAC addresses that are sending on that port. For
most connections, it learns one MAC address.

The one exception on this diagram is the connection between switches. Because this is
a flat layer 2 network, all of the devices from one of the switches will be learned on the
port that connects those switches. In this example, each switch will learn all MAC
addresses on the network. These addresses will be in the MAC address table on each
of the switches.
IP Addresses
32 bit Binary-
00001010 10011000 00011011 11111011
Dotted Decimal Notation- 10.152.27.251

Binary Mask-
11111111 11111111 00000000 00000000
Dotted Decimal Notation- 255.255.0.0
CIDR Notation- 10.152.27.251/16
 
IP addresses are a 32-bit address used to identify networks and hosts. They can also be
represented as a dotted decimal notation. The mask is used to identify how many bits will be
used for network identification. The rest will be used for host identification.

CIDR stands for Classless Internet Domain Routing. It is another way of representing masking.
Some switches support it while others do not.

IP Classes
There are five network classes, A through E.

 Class A uses 8 bits for network identification and 24 bits for host IDs. Note:
Addresses 127.0.0.0 to 127.255.255.255 are reserved for loopback and diagnostics.
 Class B uses 16 bits for network IDs and 16 bits for host IDs.
 Class C uses 24 bits for network IDs and 8 bits for host IDs.
 Class D is reserved for multicasting.
 Class E is used for research and experimental use.
The classes were how masks were originally set up. Then, there was a change to
Variable Length Subnet Masks (VLSM) where you could select any number of bits for
network and hosts. For simplicity, many people still used the class designations and
stay on the 8-bit boundaries for their masks.

Routing
Each uses a 24-bit mask. All layer 2 broadcasts are contained on each network. All of the other
traffic will pass between the two networks unless denied by the router using an access control
list (ACL). The router will get traffic between the two networks, and then MAC addressing will
get the packet to its final destination. Each PC's default gateway must be configured to point to
their local router.

Private Networks

A private network is a network that uses private IP address space. These addresses are
commonly used for home, office, and enterprise LANs. Private IP address spaces were
originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of
IPv6.

Addresses in the private space are not allocated to any specific organization, and anyone may
use these addresses without approval. However, IP packets addressed from them cannot be
transmitted through the public internet. Therefore, if such a private network needs to connect to
the internet, it must do so via a network address translator (NAT) gateway.

What is the numbering system we use every day? Decimal or Base 10.

What numberings systems do computers use? It could be binary, octal, or hexadecimal (also
known as hex).

Most people today use Decimal or Base 10 as a representation to count. In the Decimal system,
there are 10 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

There is a progression of value that starts at the 1's place at the right and multiplies by 10 each
higher digit placement to the left.

Most computers today use binary or Base 2.

In the binary system there are two digits: 0 and 1

There is a progression of value that starts at the 1's place at the right and multiplies by two each
higher digit placement to the left.

Binary has two digits: a 1 and a 0. This is very easy to represent with computers where a 1 is a
transition from negative to positive and a 0 is a transition from positive to negative. Today there
are many more schemes and coding used to represent 1s and 0s.
A single digit is referred to as a bit. 8 bits is a byte, 4 bits is a nibble, and 16 bits is a word. You
can also use binary to represent much larger numbers. Just like we used different columns in
Decimal to indicate 1's, 10's, and 100’s, in binary we have 1’s, 2’s, 4’s, 8’s, 16’s, 32’s, and so
on.

IP addresses use dotted decimal notation. Each group of eight binary characters or
octets are converted to decimal and separated by dots or periods.

Let us convert one octet from binary to decimal:

An IP address is made up of four octets or 32 bits. It is common to write IP addresses in


dotted decimal notation, where each octet is represented by a decimal number. Once
the 32 bits are separated into four octets, each octet is converted to decimal. In the
example, there are 1’s in the 128, 64, 4, and 2 columns. When added together, they
represent one of the octets in the IP address. In this case, the number is 198.
"AND" IP Address and Mask

Mask dotted decimal notation- 255.255.0.0


Network “and” value- 10.152.0.0

A mask is used to identify how many bits are used for the network address space. The example
is using a 16-bit mask. We then need to do an AND function against the IP address, and the
result will be the network address. AND requires both bits to be 1’s for the result to be a 1. The
result is that the network address for the 10.152.27.251 /16 address is 10.152.0.0 network. It will
not always be that simple.

Now we will look at hexadecimal.


Another numbering system used with computers is hexadecimal or Base 16.
In the hexadecimal system, there are 16 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, E, F.
Remember A=10, B=11, C=12, D=13, E=14, F=15.

There is a progression of value that starts at the 1's place at the right and multiplies by 16 each
higher digit placement to the left.

In binary to hexadecimal conversion, each group of four binary characters (nibble) are
converted to Hexadecimal.

Let us convert two groups of 4 bits from binary to hexadecimal:

Subnetting and Variable Length Subnet


Masks (VLSM)
IPv4 Subnetting
Subnetting is the method used to separate one physical network into multiple smaller logical
subnets. An IP address includes a network segment and a host segment. Subnets are created
by using bits from the host section of the address and using these bits to create smaller subnets
as part of the original network. Subnetting lets a company add subnets without acquiring new
network addresses.
The first three classes are used for defining networks and hosts. The first octet identifies the
Class; 1–126 are Class A, 128–191 are Class B, and 192–223 are Class C. The default network
bit allotment is 8 bits for Class A, 16 bits for Class B, and 24 bits for Class C.

Class A
Address____________________________________________________________Class A
Address
Mask 255.0.0.0 or /8________________________________________________________
Mask 255.255.0.0 or /16
8 bits Network addressing____________________________________________________16
bits of network addressing
________________________________________________________________________ 8 of
those bits are subnet bits
24 bits of Host addressing____________________________________________________16
bits of Host Addressing

Each Class has certain bits in the IP address defined for network and hosts. The use of subnets
allows us to allocate bits that would have been used for hosts to be used for additional network
allocation instead. The left diagram shows the typical class assignment of Network and Host bits
for a Class A address. The right diagram shows the use of subnets; this is accomplished by
specifying more bits for networking using the longer mask.

Subnet Mask Octets

In order to extend the mask, we need to use additional bits. We can use any number of bits to
increase the mask. Using consecutive bits is the norm. Therefore, the dotted decimal mask
octet can be any of the octets shown above. Depending on the network operating system, you
may use either dotted decimal notation or CIDR notation.

Next, we will put this information to good use and learn how to find out on which subnet an
address is.

Finding the Subnet of an IP Address


Which subnet does 153.152.27.251/20 belong to?

 Binary - 10011001 10011000 00011011 11111011


 " Mask" - 11111111 11111111 11110000 00000000
 " and " - 10011001 10011000 00010000 00000000
 Mask Dotted Decimal Notation - 255.255.240.0
 Subnet “and” value - 153.152.16.0
Let us use the information we have learned to find the subnet for an address.

 The first step is convert the IP address from dotted decimal notation to binary.
 Next, perform a logical AND operation with the binary IP address and the mask.
Note the mask is 20 bits long.
 The first two octets are easy. Both are the same as the octets of the IP address.
 The third octet uses only the first four bits from the IP address. The last 12 bits
will be zeroes.
 Last, convert the AND data to the dotted decimal notation, and see that the
subnet is 153.152.16.0.
Next, we will find out how to determine the broadcast address of a network.

Find the Broadcast Address of a Network


What is the broadcast address of the network that uses 192.168.90.209 /28?

 Binary - 11000000 10101000 01011010 11010001


 " Mask" - 11111111 11111111 11111111 11110000
 " and " - 11000000 10101000 01011010 11010000
 Mask Dotted Decimal Notation - 255.255.255.240
 Broadcast address - 192.168.90.208
To get the broadcast address, take the network address and turn all host bits to 1’s:
192.168.90.223

How Many Subnets and Hosts


How many subnets and hosts can you get from the network 172.21.0.0 /23 ?

172.21.0.0 is a Class B address, which use 16 bits of network.

(Subnet mask) – (Class network bits) = subnet bits


23 – 16 = 7 bits of subnet addresses (0-127) or 128 total

(Total IP bits) – (subnet mask) = host bits


32 – 23 = 9 bits for hosts
512 – 2 = 510 (do not use all 1’s or all 0’s for hosts)

 Start with calculating the number of subnets available. The process to calculate
the number of subnets and hosts starts with identifying the Class of the IP address.
Take the number of Class network bits and subtract that from the number of bits in the
network mask. That will give the number of bits used just for subnets. In the example,
we have 23 bits – 16 bits = 7 bits of subnet.
 Using 7 bits, that is class A, so we can count from 0-127, which is 128 different
subnets.
 Now, calculate the number of hosts. Start with the number bits in an IP address,
which is 32, and subtract the network mask from the remainder. This is the the number
of bits used to count hosts. In our example, 32 – 23 = 9 bits for hosts.
 9 bits lets us count from 0-511, or 512 hosts, but we can not use all 1’s or all 0’s.
Therefore, we need to subtract 2 from the total 512 – 2 = 510. So the total subnetworks
is 128, and the total number of hosts is 510 in this example.
The last process we will explain is getting the range of host IP addresses used.

Find the Range of Host IP Addresses


What is the range of host addresses available that also includes 10.239.101.104/20?

 Binary - 00001010 11101111 01100101 01101000


 " Mask" - 11111111 11111111 11110000 00000000
 " and " - 00001010 11101111 01100000 00000000
 Network "and" value - 10.239.96.00
 First valid address in the range - 10.239.96.1
 Last valid address in the range - 10.239.111.254
To find the range of host addresses, first find the network value. Then identify the first
host as the network value plus the 1 bit on the fourth octet. The last valid host is all 1s
for the host except the digit for the 1s is a 0.

ARP
ARP stands for Address Resolution Protocol. It is used to resolve IP addresses into MAC
addresses.

Suppose one device wants to communicate to, for example, IP address 10.3.87.12. However, it
does not have that address in its cache. It must send an ARP Broadcast to all devices in the
VLAN.

The other device with that IP will respond to the ARP request: "I am 10.3.87.12."
When it responds, it will have the MAC address as well as the IP address.

So now we can send over the Layer 2 switch using the MAC address.

The Dell Networking X-Series is a family of smart managed 1 GbE and 10 GbE Ethernet
switches that are designed for small and medium businesses. X-Series is ideal for smaller
networks or remote/branch offices with limited IT staff who crave enterprise-class network
control that is fused with consumer-like ease.
X-Series switches use DNOS 3 technology.
The intuitive graphical user interface (GUI) of Dell Networking X-Series switches makes setup
and management simple for network administrators.

Dell EMC PowerSwitch N-Series


The Dell EMC PowerSwitch N series is a family of energy-efficient and cost-effective 1 GbE and
10 GbE switches that are designed for modernizing and scaling network infrastructure. All
N-Series models feature autosensing (1Gb/100Mb/10Mb) ports and DNOS 6 technology.
Dell EMC PowerSwitch S-Series
The product line offers a range of modular and fixed configuration 1/10/40GbE systems
that are designed principally for data-center top-of-rack (ToR) and aggregation
applications.
This includes the S6000 high-density 40 GbE virtualization switch, the S5000 modular
converged SAN/LAN switch, and the S4810 or S4820T ToR switches supporting 1 GbE,
10 GbE, and 40 GbE capabilities.

Dell EMC PowerSwitch S Series 1GbE switches are optimized for high-performance
data-center environments:

 Deliver low-latency, superb performance and high density with hardware and
software redundancy
 Offer Active Fabric designs using S- or Z-Series core switches to create a two-
tier, 1/10/40 GbE data-center network architecture
 Provide ideal solutions for ToR applications in enterprise, Web 2.0, and cloud
service providers’ data-center networks

Deploy modern workloads and applications designed for the open networking era with
an optimized data-center top-of-rack (ToR) networking solution that:

 Includes the 10GbE S4000-ON Series and S4100-ON Series switches,1/10G


BASE-T S4048T-ON, S4128T-ON and S4148T-ON switches, and 10GbE S4148FE,
S4248FB-ON, and S4248FLB-ON switch
 The S4148U-ON has Fibre Channel ports for connections to Storage Area
Networks
 Delivers low-latency, superb performance and high density with hardware and
software redundancy
 Offers Active Fabric designs using S- or Z-Series core switches to create a two-
tier, 1/10/40 GbE data -enter network architecture
 Provides an ideal solution for applications in high-performance data-center and
computing environments

Gain the flexibility to transform data centers with high-capacity network fabrics that are
easy to deploy, cost-effective, and provide a clear path to a software-defined data
center. They offer:

 High density for 40GbE deployments in ToR, middle-of-row, and end-of-row


deployments
 A choice of S6000-ON and S6010-ON 40GbE switches and the S6100-ON
10/25/40/50/100GbE modular switch
 S6100-ON modules that include: 16-port 40GbE QSFP+; 8-port 100GbE
QSFP28; combo module with four 100GbE CXP ports and four 100GbE QSFP28 ports
 An ideal solution for modern workloads and applications designed for the open
networking era
Dell EMC PowerSwitch Z-Series

Dell EMC PowerSwitch Z-Series of core/aggregation switches provide optimal flexibility,


performance, density, and power efficiency for data center.

All Z-Series models feature DNOS 9 and 10 technology.


Dell Networking C9000 Series Switches
The Dell Networking C-Series is a family of chassis-based switches that are designed to support
1 GbE and 10 GbE switch aggregation for enterprise campus and business wiring closets.
C-Series also supports 1/10GbE server aggregation and 10/40GbE core operations/campus
connections for data centers.
All C-Series models feature DNOS 9 technology.
PowerEdge M-Series Blade Switches
PowerEdge MX7000 Blade Switches
 Three I/O networking fabrics, two general purposes, and one storage specific,
each with redundant modules
Physical Setup Objectives
After completing this module, you will be able to:

 Mount the switch into a rack


 Install optional switch modules
 Install cabling
 Start up and validate that the switch is working
Types of Rack Installations
The various types of rack installations are listed below:

 Brackets or ears
 Rapid Rails
 Chassis switch
 Optional modules installation

Cable Labeling
Where possible, use the customer's cable labeling standards.

If there are no cable labeling standards in place:

 Label option 1 (preferred):


 Use sequential numbers, with unique numbers per cable. For example
0001, 0002,….
 Ensure that the numbering system does not conflict with any currently
existing cable numbering.
 Using a Prefix can help clarify, for example: Dell.0001or Rack6.0001.
Benefits of this option:

 Flexibility: The cable can be moved between ports without relabeling.


 It is quick to create the labels.
Label option 2:

 Include the devices and ports where the port is connected on both ends. For
example, Switch01 Gi1/0/20 or Server02 Onboard NIC1.
Drawbacks of this option:

 The label can be outdated if cable is moved.


 The label can cause operational errors, as a port may be disconnected without
verifying the other end of the cable.

Cable Installation Considerations


To install the cables, follow these considerations:
 Cables should not obstruct airflow.
 Cables should be clearly labeled.
 Use cable ties to create bundles that are neatly tied to the side of the rack.
 Alleviate stress on the connectors by leaving some slack in the cables.

MX7000 Overview
I/O Modules

Scalable Architecture
Inter-chassis cabling
Initial Switch Connection Objectives
After completing this module, you will be able to:

 Create the initial switch connections.


 Enter basic command-line navigation commands.
 Enter common configuration commands.
 Enter common validation commands
 Save and restore configuration files.

 Initial Switch Connection



 erial Console
 When performing any type of configuration on a switch, you must be familiar with
the different methods that are used to connect to them. A connection to a switch
can be established through the serial console, Telnet, SSH, or Web interface.
With some exceptions, initially you are required to connect to a switch through a
serial console to configure it for other connection methods.

Serial Port Connection Steps


The steps for serial port connection are:

 Identify Switch console port.


 Select and connect a serial console cable from the switch to the management console.
Use a USB to Serial adapter if needed.
 Install USB to serial adapter drivers on the computer that is used as the console.
 Start the terminal emulator software and configure it to point to the correct serial COM
port.
 For the correct COM port, enter the speed, data bits, parity, and stop bits into the
terminal emulator-specific settings.

Switch Serial Connector Types


CLI Overview
 CLI is a basic command-line interpreter similar to the UNIX C Shell.
 The CLI on switches is used to control and define the device parameters and
features.
 The CLI has a hierarchical and modular structure providing the user better
control and insight into the commands and levels of configuration. It uses:
 Keywords — mandatory used to compose the command until the first
parameter. Keywords state a command.
 Parameters — mandatory or optional based on context Parameters
specify configuration options.

Parameter options are:


 Positional, where the position of the parameter matters
 Key, where the position does not matter

Example
In the command snmp-server community dellpvt rw:

 snmp-server and community are keywords
 dellpvt rw are key parameters
 dellpvt specifies the community string
 rw specifies the SNMP permissions

CLI Modes
Three CLI modes, each with specific types of commands, are available to users.
CLI Keyboard Shortcuts
The table below lists the basic keyboard shortcuts in CLI:
The question mark (?) has three uses:

 Use the ? by itself, it is used just like the help command.


o Enter help at the prompt to obtain a list of keywords and a brief functional
description of those keywords.

o
o

- console(config)# ?

o Use the ? directly behind a character or characters without a space.


 Enter ? after a keyword to display a list of possible keywords
containing the character or letter.
- console(config)# i?
interface
ip
ipv6

o Leave one space between the ? and a keyword or keywords.


 Enter a keyword, then a space and ? to obtain a list of keywords
that can be used in the CLI. There must be a space before the ? for
this to work.

- console#ipv6 ?
access-list named access-list
neighbor add an IPv6 static neighbor
prefix-list Build a prefix list
route establish static routes
router enable an IPV6routing process

- console#ipv6 route ?
X:X:X:X::X IPV6 prefix x:x:::y

There is no default IP address on most Dell Networking switches.

 An IP address must be assigned to a switch port, LAG, VLAN, management


interface. For management access, the subnet mask must be specified (can use CIDR
notation).
OS 9 VLAN_Example: OS 9 Management Example:
- console#config - console#config
- console(config)#interface vlan 1 - console(config)#interface management 0/0
- console(config-if)#ip address 172.16.0.20 / - console(config-if)#ip address 192.16.0.21
16 /24
- console(config-if)#exit - console(config-if)#exit
- console(config)# - console(config)#
OS 6 Management Example:
- console#config
OS 10 VLAN_Example: - console(config)#interface OOB
-OS10(config)# interface vlan 10 - console(config-if)#ip address 192.168.0.21 /
-OS10(conf-if-vl-10)# ip address 1.1.1.2/24 24
- console(config-if)#exit
- console(config)#

 Use the show ip interface command to view the IP address you configured.


 Use the show ip interface OOB to view the IP address that is assigned to the
Out-of-Band (OOB) interface.
 Switches can be configured to pull a Dynamic Host Configuration Protocol
(DHCP) address.

After the switch initially boots, the first time you try to run the enable command it gives
the following messages:

 enable
 Dell#00:00:54 %STKUNIT0-M:CP %SEC-4-
ENABLE_PASSW_NOT_Configured: Enable password is required for authentication
but not configured
 00:00:54: %STKUNIT)-M:CP %SEC-3-
AUTHENTICATION_ENABLE_SUCCESS: Enable password authentication success on
console
You must enter config mode and add an enable password:

 Dell#config
 Dell (config)#enable password P@ssw0rd
 Note: "P@ssw0rd" is just an example, not the required password.
An access profile is required for login via management interface (except the console).
This example sets up an admin level username and password at level 15, which is the
highest level available.

 Example (legacy):
- console#configure
- console(config)#username admin password - password level 15
- console(config)#exit
- console#
 Example (latest models): Create a user name and password and assign a
privilege level.
- OS10#configure
- OS10(config)# username user07 password paSsw0$d role netadmin priv-lvl 10
- OS10(config)#exit
- OS10#


 To view accounts, use the show users accounts command.
 Upon access via telnet, user is prompted for login credentials.
Run this command to change the hostname. Type "configure" to enter this mode and
type "exit" to leave this mode.
In this example, the hostname is being changed to "text."

 Prompt changes to (config)#


 Provides access to global and interface configuration commands:
 Dell(config)# hostname text
 Prompt is changed to the hostname
 text(config)#
 text(config)#do copy run start

When booting a switch OS9 for the first time, the switch is in jump-start reload type
mode. This causes problems saving the configuration and will cause the following
message to appear on the console screen. Change the reload-type to normal-reload.

 2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER:


DHCP DISCOVER sent on Ma 0/0. - repeated 5 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 5 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 4 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 4 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 5 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 5 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 4 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 4 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 5 times
2w6d21h: %STKUNIT0-M:CP %JUMPSTART-5-JUMPSTART_DISCOVER: DHCP
DISCOVER sent on Ma 0/0. - repeated 5 times
Dell#
 Press the Enter key to stop the continuous jumpstart error message and
return to a command prompt.
 OS9(config)#reload-type ?
jump-start Reload with the default jump start config
normal-reload Reload with the normal reload
 OS9(config)#reload-type normal-reload
 OS9#show reload-type
Reload-Type : jump-start [Next boot : normal-reload]
config-download : enable
dhcp-timeout : Infinity
 OS9#reload

Reboot the system manually using the reload command in EXEC mode. You are prompted to
confirm the operation.

OS10# reload
Proceed to reboot the system? [confirm yes/no]:yes
Saving system configuration
Proceed to reboot the system? [confirm yes/no]:yes

Types of Configuration Files


1. Running-configuration is the current configuration of the device, which is created by
copying the startup-configuration on boot.
2. Startup-configuration contains the configuration that is applied at device startup.
3. After a switch is booted, the order of application changes: Running-Configuration -->
Startup-Configuration

Common Save and Restore Configuration


Commands
These are the commands that are used for OS3, OS6 and OS9 to Save, Revert and
Copy the configuration.
Changes made to the configuration only affect the running-config and are not applied to
the startup-config. When the switch is rebooted, all changes are lost. To save the
configuration changes to the startup-config, run this command.
Dell#copy running-config startup-config
File with same name already exists.
Proceed to copy the file [confirm yes/no]: yes
!
4154 bytes successfully copied
1d1h30m: %STKUNIT0-M:CP %FILEMGR-5-FILESAVED: Copied running-config to
startup-config in flash by default
Dell#
A common shortcut for the copy running-config startup-config command is Dell#copy
run start.

If changes are saved to the startup-config, running this command reverts it to the initial
startup state.
Dell#copy startup-config running-config
!
4154 bytes successfully copied
1d1h31m: %STKUNIT0-M:CP %SYS-5-CONFIG_LOAD: Loading configuration file
1d1h31m: %STKUNIT0-M:CP %SYS-5-CONFIG_I: Configured from console by
console
Dell>1d1h31m: %STKUNIT0-M:CP %SEC-5-LOGIN_SUCCESS: Login successful
for user on line console
Dell>

The running configuration contains the current OS system configuration and consists of
a series of commands. Copy the running configuration to a remote server or local
directory(USB) as a backup or for viewing and editing. The running configuration is
copied as a text file that you can view and edit with a text editor. The copy can be given
any name and can be brought to another machine and applied to the new machine.
Dell#copy startup-config usbflash://startupconfig
Do not remove usbflash, copy operation is in progress!!

4154 bytes successfully copied


Dell#
To copy the specified file from the USB flash device to the specified file in internal flash
use the following command:
Dell#copy usb://filename{backup-config | image | running-config |
script filename| startup-config | filename

The following command format only is applicable for the Dell Networking OS versions. If
you are using third-party OS software, refer to the configuration guides provided with
those releases.
If the original switch is still functioning and the customer has not backed up a copy,
connect a laptop to the management port of the switch. Ensure that the laptop has a
functioning TFTP server installed.
To back up the configuration:
 Assign the laptop an IP address on the switch's network to enable
communication.
 Establish a console connection to the switch's command-line interface (CLI).
 In the console session, use the copy running-config
tftp://hostip/filepath command to back up the configuration to the laptop TFTP
server.
Note:If the defective switch does not power on and the customer has not made a
backup, the configuration is lost and it cannot be retrieved.

The following command format only is applicable for the Dell Networking OS versions. If
you are using third party OS software, refer to the configuration guides provided with
those releases.
To restore the backup configuration:

 Move the laptop to the replacement switch, and establish a console session and
an Ethernet connection.
 Place the config file in the root directory of a TFTP server on a directly connected
laptop.
 Use the command copy tftp://hostip/filepath running-config to copy
the configuration to the replacement switch.
 Verify that everything has been registered in the running configuration of the
replacement system. You can run a diff command between the output of show
running-configuration and the customer-given configuration.
 Save the configuration with the command copy run start.

OS10 Configuration and Save Commands


 Candidate-configuration stores configuration changes prior to committing them
to running-configuration.
 Running-configuration is the current configuration of the device, which is
created by copying Startup-configuration on boot.
 Startup-configuration contains the configuration that is applied at device
startup.
 Once the switch is booted, the order of application changes:
Candidate-Configuration --> Running-Configuration --> Startup-Configuration
The Candidate-Configuration file:

 Tracks all changes made on the switch in real time


 Can be applied at any level in the CLI
 Enables all changes at all configuration levels to be made at once
 Can be locked to avoid modifications from other users
Commands include:

 The  commit command applies changes from candidate-configuration to the


running-configuration
 The  discard command removes all changes made to the candidate-
configuration
 The  show candidate-configuration command shows contents of the
candidate-configuration

This is an example of the show candidate-configuration command output.
Before committing the changes to the running-config, check to see the differences
between the candidate-configuration and the running-configuration.

 The first command shows the candidate-configuration.


 The second command shows the running-configuration.
 The third command shows the difference between the candidate-configuration
and the running-configuration. When committed, this is what the new running-
configuration will be.
The config directory holds the startup.xml file.

 Startup.xml is the same as startup-configuration file.


 To make a backup of the startup-configuration file, make a copy of the
startup.xml file (as done on the previous page).
 If the startup.xml is deleted and the switch is rebooted, the default startup.xml file
is copied back to the directory.

Common Validation Commands


The following tab shows common validation commands that are used in OS6, OS9, and
OS10. To learn more, click each tab.
The show running-configuration command shows the commands in the running-
configuration configured on the switch. Use the spacebar to show another page and the Enter
key to show just one more line.
The show startup-configuration command shows the commands saved to the startup-
configuration, which will be used on the next reboot of the switch. Use the spacebar to show
another page and the Enter key to show just one more line.
To test the ability to communicate between IP devices, ping is a good troubleshooting
command to use.

Verifying Interface Status in OS6, OS9 and


OS10
Like in OS 9, if the status is Down/Down, make sure the port is administratively enabled by
entering the no shutdown command on the interface. If the port status is Up/Down, check the
port and cables. if it is Up/Up, everything is good.

One command to check interface configuration is show interface tengigabitethernet 1/0/1.

If the interface is Up/Up, that means it is up and running.

OS9

Looking at the interface status is a good troubleshooting tool. If the status is Down/Down, make
sure the port is administratively enabled by entering the no shutdown command on the
interface. If the port status is Up/Down, check the port and cables. If it is Up/Up, everything is
good.

One command to check interface configuration is show interface Gigabit 0/0.


If the interface is UP/DOWN that might be an indication of one or more of these
conditions:

 Speed/duplex negotiation problem between the switch and the device it connects
to.
 If connecting to another vendor's device, try to set flow control send and
receive to off and the speed to no negotiate or no negotiation-auto on the interface.
 Transmit fiber or receive fiber or both are removed from the switch, removed
from the system, or are faulty.
 The remote system’s port is administratively down.
 Verify that the fibers are connected to both the local and remote systems on the
correct port. Clean and verify the fiber. If the interface is still showing UP/DOWN, move
the fiber to another port on another line card on the switch. If the port is still down, move
the fiber to another port on the remote system.

The show interface status command is a good way to view the status of all the ports in an
easy-to-read format.
OS10

To view basic interface information, use the show interface, show running-configuration,


and show interface status commands. Stop scrolling output from a show command by
entering CTRL+C. Display information about a physical or virtual interface in EXEC mode,
including up/down status, MAC and IP addresses, and input/output traffic counters.

Firmware Updates
When a device boots, it decompresses the system image from flash memory and runs
it. When a new image is downloaded, it is saved in the area that is allocated for a
secondary system image copy.
Image Upgrade Methods:

 Trivial File transfer protocol (TFTP)


 Serial with XMODEM- (only used in emergency situations when it is the only
option available)
 USB (only applicable to some models)

Updating the Firmware and Boot Code


Instructions for upgrading firmware are in the release notes for each specific revision
and model. Make sure the release notes for the version upgrade being attempted are
used, as there are differences between upgrade procedures.
Specific instructions are not included on this page because of the criticality of following
the release notes of the firmware being installed.
High-level generic firmware upgrade instructions:

 View the currently running version of code using the command show version.
 For OS 3 and OS 6, search for the switch model on dell.com/support
 For OS 9 and OS 10 firmware, the customer typically has an account on Dell
Digital Locker for updates.
 Copy files to the TFTP server. Note that the customer controls whether or not
you may add your TFTP server to their environment and may require you to use their
TFTP server.
 Locate the release notes: The upgrade instructions are part of the release notes.
Follow the upgrade procedure for the unit type you have, either single switch or stack
upgrade. If there is new boot code, it is typically upgraded first.
 Upgrade the nonactive partition first. Mark as active. Reboot the switch.
 Validate that the switch is running the new firmware and if valid, upgrade the
other partition. If invalid, redirect to the old version code and contact Tech Support to
investigate the issue.

 Stack Firmware Synchronization



 Always verify the firmware version before adding a unit to the stack. It is a best practice
to have the same version of code on the new unit as the stack version.
 Why is this important? When you add a new switch to a stack, the Stack Firmware
Synchronization feature automatically synchronizes with the version running on the
stack master. If the new switch becomes the master, it could change the version of the
entire stack if it is not already the same as the stack.
 The synchronization operation may result in either an upgrade or a downgrade of
firmware on the mismatched stack member.
 Every unit in a stack conforms to the configuration of the master unit, only one firmware
download is required for the whole stack.

Replaceable Units
A Replaceable Unit—or part—is a component of a device that can be replaced in the
field. Dell may ship the part directly to the customer, or you might deliver and install it.
Commonly replaced switch parts include:

 Chassis fans
 Power supply units (PSUs)
 Add-on modules
About replaceable parts:

 Some parts must be replaced by a qualified technician; for example, a backplane


or a chassis.
 For switches, customers can replace most of the parts themselves. However, you
may replace a part if the customer requests it.
 Fans are always hot-swappable—replaced without requiring an outage—on
switches with removable fan packs.
 If the switch has redundant PSUs, they are hot-swappable.
When parts are not replaceable:

 If the part is not replaceable, replace the entire switch.


 Aerohive® wireless switches and access points that are sold by Dell have no
replaceable parts. For more information about these products, go
to http://www.aerohiveworks.com.
 Ruckus® products also have no replaceable parts. For more information, go
to https://www.ruckuswireless.com.

Part Replacement Best Practices


 Determine if the unit is hot-swappable:

 Check the documentation for the product. See Module 6: Additional


Support.
 If the unit is not hot-swappable, or if you are not sure, arrange an
acceptable downtime with the customer. Turn off the switch, and disconnect power
cables.
 Always use an Electrostatic Discharge (ESD) strap when handling internal parts.
 If you are replacing an internal unit or an entire switch, back up the switch
configuration.
 Wireless switches are supplied by Dell partners. Usually, they send a
replacement switch if there are any problems.

Replacing a Fan Module


Complete the following steps within one minute or the switch temperature could rise
above safe thresholds, and the switch could shut down:

 Pinch the orange release tab as shown on the video, and pull out the fan module.
 Insert the new fan module until it locks into place.
To play the video, click the Play button. To enlarge the video, click the Full
Screen button on the lower right.
Important: This video shows fan replacement on S4200 Series switches. Other
switches use similar procedures. Always check the documentation at the site listed in
the Additional Support module.

Reversing Fan Airflow


H-Series switches have reversible fans. If the new fan for an H-Series switch has the
incorrect airflow, follow these steps:

 Attach the Wrist Strap.


 Disconnect power.
 Remove the four thumbscrews from the back of the switch.
 Slide the back cover off.
 Rotate the fan units to the correct direction.
 Replace the cover so the arrow shows through the hole in the cover.
 Tighten the thumbscrews.
 Reconnect the power.
To show the video, click the Play button. To enlarge the video, click the Full
Screen button on the lower right.
Note: This video shows the H10XX. Other switch models may have different airflows
and corresponding part numbers.

How to Determine if a PSU is AC or DC


The customer's rack configuration determines the correct current—AC or DC.
Verify that the replacement PSU is the correct type.

 Physical Inspection:
 Model number of the PSU shows if it is AC or DC.
 Differentiate AC from DC by looking at PSU connector pins.
 Using CLI:
 To determine all fan directions:
show inventory
 To determine if a PSU is not working:
show environment pem
Replacing a PSU
This example describes S4200-ON Series switches. Other switches use similar
procedures. Always check the documentation.

 The S4200-ON Series—S4248FB-ON and S4248FBL-ON—switch ships with two


AC or DC PSUs.
 The S4200-ON Series switch supports AC or DC power supplies with two air-flow
directions, normal and reverse. Normal direction is from the I/O to the PSU side.
Reverse direction is from the PSU side to the I/O side.
 Full redundancy requires two PSUs, but the switch can operate with a single
PSU.
Steps:

 Verify which PSU has failed.


 Remove the power cable from the failed PSU.
 Release the thumbscrew or pinch the clip, and pull out the unit.
 Insert the new PSU until it locks. If it has thumbscrews, tighten them.
 Attach the power cable to the new PSU.

Replacing the Route Processing Module


Route processing modules are used in MX7000 modular chassis. 

To replace a route processing module, follow these guidelines:

 The procedure on the Steps tab shows an example of replacing an internal


module. Other switches use similar procedures. Always check the documentation
 Install the fan modules before you install RPMs in a C9010 switch.
 RPMs are hot-swappable.
 Although the C9010 switch can operate with one RPM, Dell Networking
recommends two RPMs for redundancy and to provide more bandwidth to each line
card.
 If the system uses two RPMs, both RPMs must have the same software image.
 If the C9010 operates with only one RPM, install it in slot 10—the top RPM slot
labeled R0—or slot 11—the bottom RPM slot labeled R1.
 If the system uses two RPMs, the RPM in slot 10 is master and the RPM in slot
11 is standby by default.
 To control airflow for adequate system cooling and ensure personal safety and
electromagnetic interference (EMI) containment during operation, install a blank in an
empty RPM slot. Always replace an RPM or a blank panel immediately.
To replace a route processing module, follow these steps:

 See Figure 1. Open the left and right ejector levers—item 1—on an RPM by
pressing in the orange tab—item 2. Rotate both levers to the right, so that they snap
into the open position.
 See Figure 2. Hold the new card assembly by the metal carrier edges. Avoid
touching the printed circuit board and connector pins.
 The arrow in slot 10—item 2 in the Figure 2, labelled R0 on the chassis—
identifies the slot in which you insert the first RPM. Align the card with the guide and
gently slide it into the slot by holding the two ejector levers in the fully open position and
pushing the card forward. You should feel the backplane connectors on the RPM
engage with the chassis backplane.
 Push in the levers—item 3 in Figure 2—until the thumb tabs pop-up and the card
is fully inserted in the slot. The ejector levers hide under the card.
 If the C9010 uses two RPMs, insert the second RPM into slot 11—labelled R1 on
the chassis—below the first RPM by following Steps 1 through 4.
 If the C9010 uses only one RPM, install a blank panel to cover slot 11. To install
the panel, hold the levers and insert the blank to cover the open slot. Push in the lever
to secure the blank in place.

Replacing a Line Card


Line cards are used in C9000 Series Switches. 

Double-click images to enlarge them.

To replace a line card, follow these guidelines:

 In a C9010 switch, install the fan modules before you install line cards.
 On the C9010, line card slots are labeled 0 through 9. You can insert any line
card type into any line card slot.
 Install an operational line card module or a line card blank in each line card slot.
Line card blanks are smaller than the blank panels for RPMs.
 Always replace a line card or blank panel immediately.
 C9010 line cards are hot-swappable.
 When you install a line card, do not press on the port connectors.
Preparing for Switch Replacement
 Work with the customer to schedule appropriate downtime.
 Inspect the rack area to see if there is space to replace the switch.
 Determine whether the existing switch can be removed easily.
 On the existing switch, label the cables with port information to represent which
cable goes to which port. Refer to the Physical Setup section for the correct procedure.
 Ensure that the current configuration is backed up as described in the Initial
Switch Configuration section. Many customers prefer to do this themselves, but others
may ask you to do it.
 If the replacement switch is a different model from the original, you may not be
able to restore the backup file to the new switch. Sometimes, an engineer must design a
new configuration to support the same features. Contact Dell EMC Support for
assistance.

Stage Replacement Switch


 Unpack the replacement switch onto an ESD-safe surface.
 Connect a cable from the serial port of the laptop to the console port of the
chassis. Use a DB9 converter if the laptop does not have a serial port. Alternatively, if
the switch shipped with a USB cable for the initial configuration, you can use that
instead of a serial cable.
 Start a PuTTY or HyperTerminal program on the laptop.
 Enable the program to log all output to a file on the laptop
 Turn on the replacement switch, still not racked up.
 Check if the software version of the replacement switch is the same as what the
defective switch was running. Use the show os-version command.
o If the versions do not match, follow the upgrade procedure in the Switch
Firmware section.
o If the version is correct, restore the configuration or have the customer do
it. If the new switch requires a different configuration, contact Dell EMC Support.
 Turn off the switch. Take it to the rack to replace the defective switch.

Rack Placement
Follow these steps for rack placement:

 Usually, you should place the new switch in the same slot as the existing one.
 Sometimes, the existing switch may be blocked by a Power Distribution Unit
(PDU) or some other device. If so, discuss the problem with the customer before
beginning work.
 If there is an empty slot in the rack that is next to the old switch, consider using it
for the new switch. This enables you to plug each cable into the new switch after
removing it from the old switch.
 Placing the new switch in a rack that is not next to the existing one depends on
whether the cables can reach the new location.

Physically Replacing Switch


 Remove all labeled cables from the defective switch.
 Unrack the defective switch.
 Remove the rails or ears from the defective switch.
 Attach the rails or ears to the new switch as shown in the Physical Setup section
of this course.
 Mount the replacement switch.
 Reconnect the cables according to the labels.
 Turn on the new switch.
 Restore the original configuration as described in the Initial Switch
Configuration section. Many customers prefer to do this themselves, but others may ask
you to do it.
 Instruct the customer to verify network functionality using show commands,
pings, and so on.

 Switch Insertion and Removal

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy